SG135173A1 - Method for preventing malicious software from execution within a computer system. - Google Patents
Method for preventing malicious software from execution within a computer system.Info
- Publication number
- SG135173A1 SG135173A1 SG200701830-2A SG2007018302A SG135173A1 SG 135173 A1 SG135173 A1 SG 135173A1 SG 2007018302 A SG2007018302 A SG 2007018302A SG 135173 A1 SG135173 A1 SG 135173A1
- Authority
- SG
- Singapore
- Prior art keywords
- computer system
- execution
- application program
- instructions
- permuted
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/561—Virus type analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Devices For Executing Special Programs (AREA)
- Storage Device Security (AREA)
- Retry When Errors Occur (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/353,893 US8694797B2 (en) | 2006-02-14 | 2006-02-14 | Method for preventing malicious software from execution within a computer system |
US11/353,896 US8041958B2 (en) | 2006-02-14 | 2006-02-14 | Method for preventing malicious software from execution within a computer system |
Publications (1)
Publication Number | Publication Date |
---|---|
SG135173A1 true SG135173A1 (en) | 2007-09-28 |
Family
ID=37908644
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG200701830-2A SG135173A1 (en) | 2006-02-14 | 2007-02-13 | Method for preventing malicious software from execution within a computer system. |
Country Status (5)
Country | Link |
---|---|
JP (1) | JP4575350B2 (de) |
DE (1) | DE102007005887B4 (de) |
FR (1) | FR2897452B1 (de) |
GB (1) | GB2436442B (de) |
SG (1) | SG135173A1 (de) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6895666B2 (ja) * | 2015-04-07 | 2021-06-30 | ランセーフ セキュリティー,インク. | バイナリ及びメモリ多様性による難読化システム及び方法関連出願の相互参照 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000056966A (ja) * | 1998-08-07 | 2000-02-25 | Nippon Telegr & Teleph Corp <Ntt> | マイクロプロセッサシステムおよびマイクロプロセッサ動作解析防止方法 |
JP4042280B2 (ja) * | 1999-12-21 | 2008-02-06 | 富士ゼロックス株式会社 | 実行プログラムの生成方法及び実行プログラム生成装置、実行プログラムの実行方法、並びに、コンピュータ可読プログラム記憶媒体 |
US6507904B1 (en) * | 2000-03-31 | 2003-01-14 | Intel Corporation | Executing isolated mode instructions in a secure system running in privilege rings |
FR2841997B1 (fr) * | 2002-07-08 | 2005-11-11 | Gemplus Card Int | Securisation d'application telechargee notamment dans une carte a puce |
JP4568489B2 (ja) * | 2003-09-11 | 2010-10-27 | 富士通株式会社 | プログラム保護方法、プログラム保護プログラムおよびプログラム保護装置 |
US7424620B2 (en) | 2003-09-25 | 2008-09-09 | Sun Microsystems, Inc. | Interleaved data and instruction streams for application program obfuscation |
US7363620B2 (en) | 2003-09-25 | 2008-04-22 | Sun Microsystems, Inc. | Non-linear execution of application program instructions for application program obfuscation |
US7493483B2 (en) | 2004-02-19 | 2009-02-17 | International Business Machines Corporation | Method to prevent vulnerability to virus and worm attacks through instruction remapping |
-
2006
- 2006-12-27 JP JP2006351470A patent/JP4575350B2/ja active Active
-
2007
- 2007-02-01 DE DE102007005887.1A patent/DE102007005887B4/de active Active
- 2007-02-13 FR FR0753234A patent/FR2897452B1/fr not_active Expired - Fee Related
- 2007-02-13 SG SG200701830-2A patent/SG135173A1/en unknown
- 2007-02-14 GB GB0702890A patent/GB2436442B/en active Active
Also Published As
Publication number | Publication date |
---|---|
GB0702890D0 (en) | 2007-03-28 |
GB2436442B (en) | 2008-04-16 |
IE20080383A1 (en) | 2008-08-20 |
JP2007220091A (ja) | 2007-08-30 |
FR2897452B1 (fr) | 2016-12-09 |
IE20070090A1 (en) | 2007-09-19 |
DE102007005887A1 (de) | 2007-08-30 |
FR2897452A1 (fr) | 2007-08-17 |
DE102007005887B4 (de) | 2019-06-13 |
JP4575350B2 (ja) | 2010-11-04 |
GB2436442A (en) | 2007-09-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008067357A3 (en) | System for overriding bytecode, which should be interpreted, with native code, which can be directly executed | |
EP2107489A3 (de) | Verschleierung von Computerprogrammcodes | |
GB2509438A (en) | Compiling code for enhanced application binary interface (abi) with decode time instruction optimization | |
WO2008074382A8 (en) | Obfuscating computer program code | |
TW200701059A (en) | Data access and permute unit | |
GB2442495B (en) | Method and apparatus for handling dynamically linked function cells with respect to program code conversion | |
MY154086A (en) | Data processing apparatus and method | |
EP2677424A3 (de) | OpenCL-Kompilieren | |
WO2007118154A3 (en) | System and method for checking the integrity of computer program code | |
TW200636581A (en) | Methods and apparatus for instruction set emulation | |
WO2008106439A3 (en) | Name indexing for name matching systems | |
MY158864A (en) | Decoding Instructions from Multiple Instruction Sets | |
EP2503457A4 (de) | Lade- und fehlerbeseitigungsverfahren und fehlerbeseitigungssystem dafür | |
GB2470157A (en) | Methods, systems and computer program products for updating software on a data processing system based on transition rules between classes of compatible versi | |
CN103413074B (zh) | 一种通过api实现软件保护的方法和装置 | |
WO2014082422A1 (zh) | 一种代码改动的检测方法和装置 | |
WO2019126797A3 (en) | System and method for executing instructions | |
Møller | Technical perspective: WebAssembly: A quiet revolution of the Web | |
TW200615797A (en) | Computer-working-environment apparatus | |
GB201205560D0 (en) | Location text | |
TW200636569A (en) | Method for providing an auxiliary bios code utilizing time expiry control, and related device | |
GB2488941A (en) | Concurrent execution of request processing and analytics of requests | |
WO2018176814A1 (zh) | 个性化组件实现方法及装置 | |
BR102013015403A8 (pt) | Processo de confiabilidade de dados em um computador, computador próprio para fornecer um dado de saída, conjunto de comunicação que comporta tal computador, e sistema de gestão ferroviária que compreende tal conjunto | |
TW200709041A (en) | Computer system or processor with method of performing a shadow register operation |