MY188366A - A system and method for establishing trustworthiness of an application - Google Patents
A system and method for establishing trustworthiness of an applicationInfo
- Publication number
- MY188366A MY188366A MYPI2012005264A MYPI2012005264A MY188366A MY 188366 A MY188366 A MY 188366A MY PI2012005264 A MYPI2012005264 A MY PI2012005264A MY PI2012005264 A MYPI2012005264 A MY PI2012005264A MY 188366 A MY188366 A MY 188366A
- Authority
- MY
- Malaysia
- Prior art keywords
- application
- module
- trustworthiness
- secure container
- interceptor module
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Multi Processors (AREA)
- Storage Device Security (AREA)
Abstract
A system (10) for establishing trustworthiness of an application is provided. The system comprises: a trusted host platform (12); an interceptor module (14) associated with said trusted host platform (12); a secure container (16) in communication with said interceptor module(14), said secure container (16) being embedded with a formal proof code module(18); and an integrity detection system (20) in communication with said interceptor module (14); characterised in that said interceptor module (14) is provided with means for intercepting said application to hold the executable process of the application and communicate executable code of said application to said secure container (16), and in that said formal proof code module (18) is provided with means for checking and verifying said executable code to determine trustworthiness of said application.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MYPI2012005264A MY188366A (en) | 2012-12-05 | 2012-12-05 | A system and method for establishing trustworthiness of an application |
| PCT/MY2013/000215 WO2014088395A1 (en) | 2012-12-05 | 2013-11-29 | A system and method for establishing trustworthiness of an application |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MYPI2012005264A MY188366A (en) | 2012-12-05 | 2012-12-05 | A system and method for establishing trustworthiness of an application |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MY188366A true MY188366A (en) | 2021-12-06 |
Family
ID=50029180
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MYPI2012005264A MY188366A (en) | 2012-12-05 | 2012-12-05 | A system and method for establishing trustworthiness of an application |
Country Status (2)
| Country | Link |
|---|---|
| MY (1) | MY188366A (en) |
| WO (1) | WO2014088395A1 (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105138904B (en) * | 2015-08-25 | 2018-06-15 | 华为技术有限公司 | A kind of access control method and device |
| US10853090B2 (en) * | 2018-01-22 | 2020-12-01 | Hewlett Packard Enterprise Development Lp | Integrity verification of an entity |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6167520A (en) * | 1996-11-08 | 2000-12-26 | Finjan Software, Inc. | System and method for protecting a client during runtime from hostile downloadables |
| US6694434B1 (en) * | 1998-12-23 | 2004-02-17 | Entrust Technologies Limited | Method and apparatus for controlling program execution and program distribution |
| US7673137B2 (en) * | 2002-01-04 | 2010-03-02 | International Business Machines Corporation | System and method for the managed security control of processes on a computer system |
-
2012
- 2012-12-05 MY MYPI2012005264A patent/MY188366A/en unknown
-
2013
- 2013-11-29 WO PCT/MY2013/000215 patent/WO2014088395A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2014088395A1 (en) | 2014-06-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MX362308B (en) | Method and system for verifying an access request. | |
| WO2014078585A3 (en) | Methods, systems and computer readable media for detecting command injection attacks | |
| GB2494738B (en) | Detecting stored cross-site scripting vulnerabilities in web applications | |
| WO2012058629A3 (en) | System and method for inductively pairing devices to share data or resources | |
| EP3869332A3 (en) | Roots-of-trust for measurement of virtual machines | |
| GB201015283D0 (en) | Data security in a cloud computing environment | |
| WO2013103812A3 (en) | Providing secure execution of mobile device workflows | |
| MX2013007804A (en) | Data improvement system and method. | |
| WO2013040042A9 (en) | Systems and methods of performing link setup and authentication | |
| GB201010546D0 (en) | Method of indentity verification | |
| IN2015DN00884A (en) | ||
| GB2504226A (en) | System, apparatus, and method for aligning registers | |
| MX356520B (en) | Fault handling method, device and system based on network function virtualization. | |
| GB2569915A (en) | Handling sensitive data in application using external processing | |
| IN2015DN01210A (en) | ||
| GB2505104A (en) | Malware detection | |
| GB2506803A (en) | Apparatus and method for enhancing security of data on a host computing device and a peripheral device | |
| MX353246B (en) | FUEL DISTRIBUTOR USER INTERFACE SYSTEM ARCHITECTURE. | |
| GB201307478D0 (en) | Systems and methods for data access protection | |
| WO2011163263A3 (en) | System and method for n-ary locality in a security co-processor | |
| WO2012087582A3 (en) | Secure and private location | |
| BR112014019044A8 (en) | APPARATUS, METHOD AND COMPUTER PROGRAM FOR A MOBILE RELAY STATION TRANSCEIVER, SYSTEM AND MEDIA FOR MASS TRANSPORT | |
| GB2533727A (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
| GB2511017A (en) | Providing a malware analysis using a secure malware detection process | |
| GB2497366B (en) | Phishing processing method and system and computer readable storage medium applying the method |