MY188366A - A system and method for establishing trustworthiness of an application - Google Patents

A system and method for establishing trustworthiness of an application

Info

Publication number
MY188366A
MY188366A MYPI2012005264A MYPI2012005264A MY188366A MY 188366 A MY188366 A MY 188366A MY PI2012005264 A MYPI2012005264 A MY PI2012005264A MY PI2012005264 A MYPI2012005264 A MY PI2012005264A MY 188366 A MY188366 A MY 188366A
Authority
MY
Malaysia
Prior art keywords
application
module
trustworthiness
secure container
interceptor module
Prior art date
Application number
MYPI2012005264A
Inventor
Faizal Mubarak Mohd
Abd Aziz Norazah
Hazwan Halim Muhamad
Ahmad Zaid
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2012005264A priority Critical patent/MY188366A/en
Priority to PCT/MY2013/000215 priority patent/WO2014088395A1/en
Publication of MY188366A publication Critical patent/MY188366A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Abstract

A system (10) for establishing trustworthiness of an application is provided. The system comprises: a trusted host platform (12); an interceptor module (14) associated with said trusted host platform (12); a secure container (16) in communication with said interceptor module(14), said secure container (16) being embedded with a formal proof code module(18); and an integrity detection system (20) in communication with said interceptor module (14); characterised in that said interceptor module (14) is provided with means for intercepting said application to hold the executable process of the application and communicate executable code of said application to said secure container (16), and in that said formal proof code module (18) is provided with means for checking and verifying said executable code to determine trustworthiness of said application.
MYPI2012005264A 2012-12-05 2012-12-05 A system and method for establishing trustworthiness of an application MY188366A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2012005264A MY188366A (en) 2012-12-05 2012-12-05 A system and method for establishing trustworthiness of an application
PCT/MY2013/000215 WO2014088395A1 (en) 2012-12-05 2013-11-29 A system and method for establishing trustworthiness of an application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2012005264A MY188366A (en) 2012-12-05 2012-12-05 A system and method for establishing trustworthiness of an application

Publications (1)

Publication Number Publication Date
MY188366A true MY188366A (en) 2021-12-06

Family

ID=50029180

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2012005264A MY188366A (en) 2012-12-05 2012-12-05 A system and method for establishing trustworthiness of an application

Country Status (2)

Country Link
MY (1) MY188366A (en)
WO (1) WO2014088395A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138904B (en) * 2015-08-25 2018-06-15 华为技术有限公司 A kind of access control method and device
US10853090B2 (en) * 2018-01-22 2020-12-01 Hewlett Packard Enterprise Development Lp Integrity verification of an entity

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6167520A (en) * 1996-11-08 2000-12-26 Finjan Software, Inc. System and method for protecting a client during runtime from hostile downloadables
US6694434B1 (en) * 1998-12-23 2004-02-17 Entrust Technologies Limited Method and apparatus for controlling program execution and program distribution
US7673137B2 (en) * 2002-01-04 2010-03-02 International Business Machines Corporation System and method for the managed security control of processes on a computer system

Also Published As

Publication number Publication date
WO2014088395A1 (en) 2014-06-12

Similar Documents

Publication Publication Date Title
MX362308B (en) Method and system for verifying an access request.
WO2012058629A3 (en) System and method for inductively pairing devices to share data or resources
GB2494738B (en) Detecting stored cross-site scripting vulnerabilities in web applications
EP4318489A3 (en) Compatibility check for continuous glucose monitoring application
WO2017171987A8 (en) System, apparatus and method for performing secure memory training and management in a trusted environment
GB2509036A (en) Providing a network-accessible malware analysis
MX2016005769A (en) Sensor data time alignment.
TR201902104T4 (en) Systems and methods for secure communication.
GB201015283D0 (en) Data security in a cloud computing environment
WO2013103812A3 (en) Providing secure execution of mobile device workflows
WO2013040042A9 (en) Systems and methods of performing link setup and authentication
MX2013007804A (en) Data improvement system and method.
MX356520B (en) Fault handling method, device and system based on network function virtualization.
EP2713548A4 (en) Key generation, backup and migration method and system based on trusted computing
IN2015DN00884A (en)
GB201010546D0 (en) Method of indentity verification
MY173137A (en) Run-time error repairing method, device and system
GB2507015A (en) Communication with a virtual trusted runtime bios
GB2504226A (en) System, apparatus, and method for aligning registers
WO2012087582A3 (en) Secure and private location
GB2533727A (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
GB2506803A (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
GB2511017A (en) Providing a malware analysis using a secure malware detection process
GB2497366B (en) Phishing processing method and system and computer readable storage medium applying the method
WO2011163263A3 (en) System and method for n-ary locality in a security co-processor