RU2254608C2 - Способ защиты хода выполнения программы - Google Patents

Способ защиты хода выполнения программы Download PDF

Info

Publication number
RU2254608C2
RU2254608C2 RU2002109465/09A RU2002109465A RU2254608C2 RU 2254608 C2 RU2254608 C2 RU 2254608C2 RU 2002109465/09 A RU2002109465/09 A RU 2002109465/09A RU 2002109465 A RU2002109465 A RU 2002109465A RU 2254608 C2 RU2254608 C2 RU 2254608C2
Authority
RU
Russia
Prior art keywords
program
execution
calling
checksum
called
Prior art date
Application number
RU2002109465/09A
Other languages
English (en)
Russian (ru)
Other versions
RU2002109465A (ru
Inventor
Михаэль БАЛЬДИШВАЙЛЕР (DE)
Михаэль БАЛЬДИШВАЙЛЕР
Original Assignee
Гизеке Унд Девриент Гмбх
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Гизеке Унд Девриент Гмбх filed Critical Гизеке Унд Девриент Гмбх
Publication of RU2002109465A publication Critical patent/RU2002109465A/ru
Application granted granted Critical
Publication of RU2254608C2 publication Critical patent/RU2254608C2/ru

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/28Error detection; Error correction; Monitoring by checking the correct order of processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4482Procedural
    • G06F9/4484Executing subprograms

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Detection And Correction Of Errors (AREA)
  • Storage Device Security (AREA)
  • Debugging And Monitoring (AREA)
RU2002109465/09A 1999-09-20 2000-09-18 Способ защиты хода выполнения программы RU2254608C2 (ru)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19944991A DE19944991B4 (de) 1999-09-20 1999-09-20 Verfahren zur Sicherung eines Programmablaufs
DE19944991.0 1999-09-20

Publications (2)

Publication Number Publication Date
RU2002109465A RU2002109465A (ru) 2003-11-10
RU2254608C2 true RU2254608C2 (ru) 2005-06-20

Family

ID=7922630

Family Applications (1)

Application Number Title Priority Date Filing Date
RU2002109465/09A RU2254608C2 (ru) 1999-09-20 2000-09-18 Способ защиты хода выполнения программы

Country Status (8)

Country Link
US (1) US6934887B1 (enExample)
EP (1) EP1224546B1 (enExample)
JP (1) JP4732651B2 (enExample)
CN (1) CN1144126C (enExample)
AU (1) AU7288400A (enExample)
DE (1) DE19944991B4 (enExample)
RU (1) RU2254608C2 (enExample)
WO (1) WO2001022223A1 (enExample)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2591020C1 (ru) * 2015-06-01 2016-07-10 Российская Федерация, от имени которой выступает Государственная корпорация по атомной энергии "Росатом" (Госкорпорация "Росатом") Способ контроля хода выполнения программы пользователя, исполняющейся на вычислительных узлах вычислительной системы

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2002340566A1 (en) 2001-10-17 2003-04-28 Infineon Technologies Ag Method and device for guaranteeing a calculation in a cryptographic algorithm
WO2003034268A2 (de) 2001-10-17 2003-04-24 Infineon Technologies Ag Verfahren und vorrichtung zum absichern einer exponentiations-berechnung mittels dem chinesischen restsatz (crt)
CN1682484B (zh) * 2002-09-11 2012-03-21 德国捷德有限公司 受保护的密码计算
FR2857473B1 (fr) * 2003-07-11 2005-09-16 Oberthur Card Syst Sa Procede de securisation de l'execution d'un programme informatique, notamment dans une carte a microcircuit
DE102004021088A1 (de) * 2004-04-29 2005-11-17 Giesecke & Devrient Gmbh Verfahren zum Schützen von Daten eines Datenträgers gegen DFA-Angriffe
JP2006018765A (ja) * 2004-07-05 2006-01-19 Infocom Corp ソフトウエアの一時的な修正方法およびプログラム
US8347078B2 (en) 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
US8887287B2 (en) * 2004-10-27 2014-11-11 Alcatel Lucent Method and apparatus for software integrity protection using timed executable agents
US8336085B2 (en) 2004-11-15 2012-12-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
US8464348B2 (en) * 2004-11-15 2013-06-11 Microsoft Corporation Isolated computing environment anchored into CPU and motherboard
US8176564B2 (en) 2004-11-15 2012-05-08 Microsoft Corporation Special PC mode entered upon detection of undesired state
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US9436804B2 (en) 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US8353046B2 (en) 2005-06-08 2013-01-08 Microsoft Corporation System and method for delivery of a modular operating system
EP1739519A1 (en) * 2005-06-30 2007-01-03 Axalto SA Method to secure the execution of a program against attacks by radiation or other
JP4844102B2 (ja) * 2005-11-30 2011-12-28 富士ゼロックス株式会社 サブプログラム及びそのサブプログラムを実行する情報処理装置
JP4783163B2 (ja) * 2006-01-19 2011-09-28 Okiセミコンダクタ株式会社 マイクロコントローラ
WO2008040377A1 (en) * 2006-10-06 2008-04-10 Agere Systems Inc. Protecting secret information in a programmed electronic device
FR2910144A1 (fr) * 2006-12-18 2008-06-20 St Microelectronics Sa Procede et dispositif de detection errones au cours de l'execution d'un programme.
CN102183896B (zh) * 2010-12-07 2015-11-25 北京广利核系统工程有限公司 一种利用Matlab测试核电站保护逻辑的系统
FR2990533B1 (fr) * 2012-05-09 2015-02-13 Morpho Procede de suivi d'execution d'un logiciel et logiciel pour la mise en oeuvre du procede
DE102014018208A1 (de) * 2014-12-08 2016-06-09 Giesecke & Devrient Gmbh Verfahren zum Betreiben eines Sicherheitsmoduls
FR3030084B1 (fr) 2014-12-12 2018-02-09 Oberthur Technologies Procede d’execution d’un programme par un processeur et entite electronique comportant un tel processeur
WO2017071763A1 (en) * 2015-10-29 2017-05-04 Hewlett-Packard Development Company, L.P. Checking a security value calculated for a part of a program code
FR3134907A1 (fr) 2022-04-26 2023-10-27 STMicroelectronics (Grand Ouest) SAS Procédé de surveillance d’une exécution d’une portion de code programme et système sur puce correspondant

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SU1191912A1 (ru) * 1984-05-16 1985-11-15 Рыбинский Авиационный Технологический Институт Устройство дл контрол хода программ
US5651111A (en) * 1994-06-07 1997-07-22 Digital Equipment Corporation Method and apparatus for producing a software test system using complementary code to resolve external dependencies
US5761414A (en) * 1995-12-06 1998-06-02 Mitsuba Corporation Method for detecting execution errors of a microprocessor
RU96119983A (ru) * 1995-02-08 1998-12-27 Сега Энтерпрайсиз, Лтд. Устройство обработки информации с функцией защитного контроля

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3502387A1 (de) * 1985-01-25 1986-07-31 Klöckner-Moeller Elektrizitäts GmbH, 5300 Bonn Verfahren zur ueberwachung von mikroprozessorsystemen und speicherprogrammierbaren steuerungen
JPH04127340A (ja) * 1990-09-19 1992-04-28 Canon Inc 電子機器
JP2721294B2 (ja) * 1993-01-29 1998-03-04 本田技研工業株式会社 コンピュータシステムのオンライン監視システム
JPH0784786A (ja) * 1993-09-09 1995-03-31 Casio Comput Co Ltd プログラム実行制御方法
US5768591A (en) 1995-09-08 1998-06-16 Iq Systems Method of de-bugging host-processor software in a distributed processing system having a host processor and at least one object oriented processor
US5757914A (en) * 1995-10-26 1998-05-26 Sun Microsystems, Inc. System and method for protecting use of dynamically linked executable modules
US5909580A (en) 1996-02-08 1999-06-01 Inprise Corporation Development system and methods with direct compiler support for detecting invalid use and management of resources and memory at runtime
JP3683031B2 (ja) * 1996-04-17 2005-08-17 株式会社リコー プログラム保護装置
DE19701166A1 (de) * 1997-01-15 1998-07-23 Siemens Ag Verfahren zur Überwachung der bestimmungsgemäßen Ausführung von Softwareprogrammen
JPH11215120A (ja) * 1998-01-27 1999-08-06 Fujitsu Ltd 通信装置
US6654954B1 (en) * 1998-02-17 2003-11-25 International Business Machines Corporation Computer system, program product and method utilizing executable file with alternate program code attached as a file attribute
US6314532B1 (en) * 1998-12-04 2001-11-06 Lucent Technologies Inc. Method and system for recovering from a software failure
US6766458B1 (en) * 2000-10-03 2004-07-20 Networks Associates Technology, Inc. Testing a computer system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SU1191912A1 (ru) * 1984-05-16 1985-11-15 Рыбинский Авиационный Технологический Институт Устройство дл контрол хода программ
US5651111A (en) * 1994-06-07 1997-07-22 Digital Equipment Corporation Method and apparatus for producing a software test system using complementary code to resolve external dependencies
RU96119983A (ru) * 1995-02-08 1998-12-27 Сега Энтерпрайсиз, Лтд. Устройство обработки информации с функцией защитного контроля
US5761414A (en) * 1995-12-06 1998-06-02 Mitsuba Corporation Method for detecting execution errors of a microprocessor

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2591020C1 (ru) * 2015-06-01 2016-07-10 Российская Федерация, от имени которой выступает Государственная корпорация по атомной энергии "Росатом" (Госкорпорация "Росатом") Способ контроля хода выполнения программы пользователя, исполняющейся на вычислительных узлах вычислительной системы

Also Published As

Publication number Publication date
WO2001022223A1 (de) 2001-03-29
JP4732651B2 (ja) 2011-07-27
AU7288400A (en) 2001-04-24
US6934887B1 (en) 2005-08-23
EP1224546B1 (de) 2015-09-02
CN1144126C (zh) 2004-03-31
CN1375084A (zh) 2002-10-16
DE19944991A1 (de) 2001-04-12
JP2003510684A (ja) 2003-03-18
DE19944991B4 (de) 2004-04-29
EP1224546A1 (de) 2002-07-24

Similar Documents

Publication Publication Date Title
RU2254608C2 (ru) Способ защиты хода выполнения программы
JP4172745B2 (ja) プロセッサによる命令シーケンスの実行を監視する方法および監視装置
RU2146399C1 (ru) Способ записи данных в энергонезависимое запоминающее устройство, способ использования устройства на интегральных схемах, устройство на интегральных схемах
US20090288161A1 (en) Method for establishing a trusted running environment in the computer
US20170255384A1 (en) Efficient secure boot carried out in information processing apparatus
CN118051919B (zh) 数据处理方法、芯片、电子设备以及存储介质
US7447916B2 (en) Blocking of the operation of an integrated circuit
US5286962A (en) IC card for prevention of fraudulent use
US8495734B2 (en) Method and device for detecting an erroneous jump during program execution
JP2003504740A (ja) モノリシック安全保護モジュールにおける敏感な情報の処理の安全保護方法、および関連する安全保護モジュール
US8375253B2 (en) Detection of a fault by long disturbance
EP1295200A2 (en) Data processing method and device for protected execution of instructions
CN110502380B (zh) 一种哈希算法协处理器自检的方法
CN106935266B (zh) 从存储器中读取配置信息的控制方法、装置和系统
JPH03147086A (ja) Icカード
US8527835B2 (en) Method for secure data transfer
US7593258B2 (en) Protection of the flow of a program executed by an integrated circuit or of data contained in this circuit
CN116611075A (zh) XIP启动时预防攻击芯片的检测方法、os检测固件及系统
JP2020009305A (ja) Icチップ、icカード及びプログラム
US9483641B2 (en) Method and device for the performance of a function by a microcircuit
CN114036512A (zh) 一种防止芯片被破解的方法、装置、设备及存储介质
EP1271317A1 (en) System-on-chip with time redundancy operation
US7533412B2 (en) Processor secured against traps
US8161293B2 (en) Protection of the execution of a program executed by an integrated circuit
US7806319B2 (en) System and method for protection of data contained in an integrated circuit

Legal Events

Date Code Title Description
PC41 Official registration of the transfer of exclusive right

Effective date: 20180111

MM4A The patent is invalid due to non-payment of fees

Effective date: 20180919