SG135173A1 - Method for preventing malicious software from execution within a computer system. - Google Patents

Method for preventing malicious software from execution within a computer system.

Info

Publication number
SG135173A1
SG135173A1 SG200701830-2A SG2007018302A SG135173A1 SG 135173 A1 SG135173 A1 SG 135173A1 SG 2007018302 A SG2007018302 A SG 2007018302A SG 135173 A1 SG135173 A1 SG 135173A1
Authority
SG
Singapore
Prior art keywords
computer system
execution
application program
instructions
cross
Prior art date
Application number
SG200701830-2A
Inventor
David C Challener
Mark C Davis
Peter Hortensius
Rod D Waltermann
Original Assignee
Lenovo Singapore Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US11/353,893 priority Critical patent/US8694797B2/en
Priority to US11/353,896 priority patent/US8041958B2/en
Application filed by Lenovo Singapore Pte Ltd filed Critical Lenovo Singapore Pte Ltd
Publication of SG135173A1 publication Critical patent/SG135173A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/561Virus type analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Abstract

A method for preventing malicious software from execution within a computer system is disclosed. A permutation is performed on a subset of instructions within an application program to yield a permuted sequence of instructions before any actual execution of the application program on the computer system. A permutation sequence number-of the permuted sequence of instructions is stored in a permuted instruction pointer table. The permuted sequence of instructions is executed in an execution module that is capable of translating the permuted sequence of instructions to an actual machine code of a processor within the computer system according to the permutation sequence number of the permuted sequence of instructions stored in the permated, instruction pointer table. A method for preventing malicious software from execution within a computer system is disclosed. Before any actual execution of an application program on a computer system, the application program needs to be cross-compiled to yield a set of cross-compiled code of the application program. The set of cross- compiled code of the application program can then be executed in an execution module that is capable of recognizing and translating the set of cross- compiled code of the application program to the actual machine code of the processor.
SG200701830-2A 2006-02-14 2007-02-13 Method for preventing malicious software from execution within a computer system. SG135173A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/353,893 US8694797B2 (en) 2006-02-14 2006-02-14 Method for preventing malicious software from execution within a computer system
US11/353,896 US8041958B2 (en) 2006-02-14 2006-02-14 Method for preventing malicious software from execution within a computer system

Publications (1)

Publication Number Publication Date
SG135173A1 true SG135173A1 (en) 2007-09-28

Family

ID=37908644

Family Applications (1)

Application Number Title Priority Date Filing Date
SG200701830-2A SG135173A1 (en) 2006-02-14 2007-02-13 Method for preventing malicious software from execution within a computer system.

Country Status (6)

Country Link
JP (1) JP4575350B2 (en)
DE (1) DE102007005887A1 (en)
FR (1) FR2897452B1 (en)
GB (1) GB2436442B (en)
IE (2) IE20070090A1 (en)
SG (1) SG135173A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000056966A (en) * 1998-08-07 2000-02-25 Nippon Telegr & Teleph Corp <Ntt> Micro processor system, and micro processor operation analysis preventing method
JP4042280B2 (en) * 1999-12-21 2008-02-06 富士ゼロックス株式会社 Generation method and the execution program generation apparatus executing a program, method execution of the execution program, and computer-readable program storage medium
US6507904B1 (en) * 2000-03-31 2003-01-14 Intel Corporation Executing isolated mode instructions in a secure system running in privilege rings
FR2841997B1 (en) * 2002-07-08 2005-11-11 Gemplus Card Int Application Securisation including downloaded to a smart card
JP4568489B2 (en) * 2003-09-11 2010-10-27 富士通株式会社 Program protection method, program protection program and a program protector

Also Published As

Publication number Publication date
JP4575350B2 (en) 2010-11-04
GB2436442A (en) 2007-09-26
JP2007220091A (en) 2007-08-30
DE102007005887A1 (en) 2007-08-30
IE20070090A1 (en) 2007-09-19
GB2436442B (en) 2008-04-16
IE20080383A1 (en) 2008-08-20
FR2897452B1 (en) 2016-12-09
FR2897452A1 (en) 2007-08-17
GB0702890D0 (en) 2007-03-28

Similar Documents

Publication Publication Date Title
TWI277898B (en) Logic circuit to process trace descriptor(s) having dependency descriptor(s), and computer system, method of processing instructions, and machine-readable medium to provide instructions to perform the same
GB0624224D0 (en) Improvements in resisting the spread of unwanted code and data
TW200949601A (en) Microprocessor apparatus providing for secure interrupts and exceptions
TW200416594A (en) Improved computing architecture and related system and method
TWI279715B (en) Method, system and machine-readable medium of translating and executing binary of program code, and apparatus to process binaries
WO2012068544A3 (en) Performing actions on a computing device using a contextual keyboard
WO2008085449A3 (en) Secure booting a computing device
TW200517952A (en) Method and apparatus for counting instruction execution and data accesses for specific types of instructions
TW200627275A (en) Computer security management, such as in a virtual machine or hardened operating system
WO2007146731A3 (en) Cluster computing support for application programs
WO2006062849A3 (en) Proactive computer malware protection through dynamic translation
EP2490147A3 (en) A secure processor and a program for a secure processor
MX2007005771A (en) Searching for and providing objects using byte-by-byte comparison.
MXPA05009278A (en) Rfid server internals design.
TWI397009B (en) Data processing apparatus of basic input/output system
TW200844789A (en) File conversion in restricted process
GB2429554A (en) Method and apparatus to vectorize multiple input instructions
TW200820751A (en) System and method for operation scheduling
CY1111535T1 (en) DOUBLE DIRECTION data transfer in a simple operation i / o
WO2006116650A3 (en) Method, system and apparatus for a transformation engine for use in the processing of structured documents
NZ562065A (en) Integrated system, tools, and methods for designing automated business process applications
TW201023029A (en) System and method for processing dual-phase regular expression comparison
TW201128534A (en) Method and system for generating software transaction-level modeling (TLM) model
WO2010107523A3 (en) Interpretation and execution of a customizable database request using an extensible computer process and an available computing environment
TW200941339A (en) Uses of known good code for implementing processor architectural modifications