TW200809573A - Prevention of executable code modification - Google Patents

Prevention of executable code modification Download PDF

Info

Publication number
TW200809573A
TW200809573A TW096106790A TW96106790A TW200809573A TW 200809573 A TW200809573 A TW 200809573A TW 096106790 A TW096106790 A TW 096106790A TW 96106790 A TW96106790 A TW 96106790A TW 200809573 A TW200809573 A TW 200809573A
Authority
TW
Taiwan
Prior art keywords
executable
page
executable code
code
computer
Prior art date
Application number
TW096106790A
Other languages
English (en)
Chinese (zh)
Inventor
Scott A Field
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of TW200809573A publication Critical patent/TW200809573A/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • G06F12/1491Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
TW096106790A 2006-03-01 2007-02-27 Prevention of executable code modification TW200809573A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/365,364 US20070234330A1 (en) 2006-03-01 2006-03-01 Prevention of executable code modification

Publications (1)

Publication Number Publication Date
TW200809573A true TW200809573A (en) 2008-02-16

Family

ID=38475416

Family Applications (1)

Application Number Title Priority Date Filing Date
TW096106790A TW200809573A (en) 2006-03-01 2007-02-27 Prevention of executable code modification

Country Status (7)

Country Link
US (1) US20070234330A1 (enExample)
EP (1) EP1989627A4 (enExample)
JP (1) JP4890569B2 (enExample)
KR (1) KR20080103976A (enExample)
CN (1) CN101395587B (enExample)
TW (1) TW200809573A (enExample)
WO (1) WO2007103192A2 (enExample)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070294426A1 (en) 2006-06-19 2007-12-20 Liquid Computing Corporation Methods, systems and protocols for application to application communications
US8856938B2 (en) * 2008-07-30 2014-10-07 Oracle America, Inc. Unvalidated privilege cap
KR101895453B1 (ko) * 2011-11-09 2018-10-25 삼성전자주식회사 이기종 컴퓨팅 환경에서 보안 강화 방법 및 장치
CN103268440B (zh) * 2013-05-17 2016-01-06 广东电网公司电力科学研究院 可信内核动态完整性度量方法
US20140366045A1 (en) * 2013-06-07 2014-12-11 Microsoft Corporation Dynamic management of composable api sets
CN104462956B (zh) * 2013-09-23 2017-07-25 安一恒通(北京)科技有限公司 一种获得操作系统控制权的方法和装置
US20180012024A1 (en) * 2015-01-30 2018-01-11 Hewlett-Packard Development Company, L.P. Processor state determination
US10803165B2 (en) * 2015-06-27 2020-10-13 Mcafee, Llc Detection of shellcode
CN112100954B (zh) * 2020-08-31 2024-07-09 北京百度网讯科技有限公司 验证芯片的方法、装置和计算机存储介质

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3916385A (en) * 1973-12-12 1975-10-28 Honeywell Inf Systems Ring checking hardware
US4809160A (en) * 1985-10-28 1989-02-28 Hewlett-Packard Company Privilege level checking instruction for implementing a secure hierarchical computer system
US5483649A (en) * 1994-07-01 1996-01-09 Ybm Technologies, Inc. Personal computer security system
US6775779B1 (en) * 1999-04-06 2004-08-10 Microsoft Corporation Hierarchical trusted code for content protection in computers
US6529985B1 (en) * 2000-02-04 2003-03-04 Ensim Corporation Selective interception of system calls
US6748592B1 (en) * 2000-02-14 2004-06-08 Xoucin, Inc. Method and apparatus for protectively operating a data/information processing device
US20040034794A1 (en) * 2000-05-28 2004-02-19 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US6986052B1 (en) * 2000-06-30 2006-01-10 Intel Corporation Method and apparatus for secure execution using a secure memory partition
US7350204B2 (en) * 2000-07-24 2008-03-25 Microsoft Corporation Policies for secure software execution
US6854046B1 (en) * 2001-08-03 2005-02-08 Tensilica, Inc. Configurable memory management unit
KR100538659B1 (ko) * 2001-08-13 2005-12-26 콸콤 인코포레이티드 컴퓨터 장치의 저장 영역에 대한 애플리케이션 레벨 액세스 특권을 부여하는 방법 및 장치
US6745307B2 (en) * 2001-10-31 2004-06-01 Hewlett-Packard Development Company, L.P. Method and system for privilege-level-access to memory within a computer
US7308576B2 (en) * 2001-12-31 2007-12-11 Intel Corporation Authenticated code module
WO2003090052A2 (en) * 2002-04-18 2003-10-30 Advanced Micro Devices Inc. A computer system including a secure execution mode - capable cpu and a security services processor connected via a secure communication path
US7073042B2 (en) * 2002-12-12 2006-07-04 Intel Corporation Reclaiming existing fields in address translation data structures to extend control over memory accesses
US7594111B2 (en) * 2002-12-19 2009-09-22 Massachusetts Institute Of Technology Secure execution of a computer program
TWI229817B (en) * 2003-01-07 2005-03-21 Wistron Corp Kernel-mode operating system of application program and method thereof
US20050108516A1 (en) * 2003-04-17 2005-05-19 Robert Balzer By-pass and tampering protection for application wrappers
US7480655B2 (en) * 2004-01-09 2009-01-20 Webroor Software, Inc. System and method for protecting files on a computer from access by unauthorized applications
US7437759B1 (en) * 2004-02-17 2008-10-14 Symantec Corporation Kernel mode overflow attack prevention system and method
US20060036830A1 (en) * 2004-07-31 2006-02-16 Dinechin Christophe De Method for monitoring access to virtual memory pages
US20060047959A1 (en) * 2004-08-25 2006-03-02 Microsoft Corporation System and method for secure computing
KR100704721B1 (ko) * 2004-09-10 2007-04-06 (주) 세이프아이 실시간 감시를 통한 컴퓨터 보호 방법 및 이에 따라 보호되는 컴퓨터 보호 시스템과 실행가능한 파일이 보호되는 시스템
US7673345B2 (en) * 2005-03-31 2010-03-02 Intel Corporation Providing extended memory protection
US7607173B1 (en) * 2005-10-31 2009-10-20 Symantec Corporation Method and apparatus for preventing rootkit installation

Also Published As

Publication number Publication date
JP4890569B2 (ja) 2012-03-07
US20070234330A1 (en) 2007-10-04
WO2007103192A3 (en) 2007-11-01
EP1989627A2 (en) 2008-11-12
CN101395587A (zh) 2009-03-25
JP2009528632A (ja) 2009-08-06
CN101395587B (zh) 2011-09-07
KR20080103976A (ko) 2008-11-28
EP1989627A4 (en) 2009-11-04
WO2007103192A2 (en) 2007-09-13

Similar Documents

Publication Publication Date Title
CN102411693B (zh) 虚拟机的继承产品激活
KR102255767B1 (ko) 가상 머신 감사를 위한 시스템 및 방법들
JP5924829B2 (ja) データトラフィックへの未認証アクセスの軽減
US7478246B2 (en) Method for providing a scalable trusted platform module in a hypervisor environment
KR101263061B1 (ko) 점대점 상호연결 시스템 상에서의 보안 환경 초기화 명령의실행
JP5013882B2 (ja) 保護ドメインに基づいたセキュリティ用の方法及び装置
US9424430B2 (en) Method and system for defending security application in a user's computer
TW200809573A (en) Prevention of executable code modification
JP5611598B2 (ja) Usbトークン上の暗号化キーコンテナ
US9678687B2 (en) User mode heap swapping
CN110348252A (zh) 基于信任区的操作系统和方法
CN104318182A (zh) 一种基于处理器安全扩展的智能终端隔离系统及方法
CN1656432A (zh) 用于复位平台配置寄存器的系统和方法
US10929537B2 (en) Systems and methods of protecting data from malware processes
WO2023103697A1 (zh) 一种计算机系统中的通信方法及相关产品
US20170091444A1 (en) Hardware-enforced code paths
JP2010508572A (ja) トラステッドプラットフォームモジュールを共有するためのシステム及び方法
CN110874468A (zh) 应用程序安全保护方法以及相关设备
US20070239979A1 (en) Method and apparatus to protect policy state information during the life-time of virtual machines
US7840964B2 (en) Mechanism to transition control between components in a virtual machine environment
Sadeghi et al. Taming “trusted platforms” by operating system design
US7849055B2 (en) Method and system for limiting instances of a client-server program within a restricted distributed network
CN119271580A (zh) 设备的内存访问权限的确定方法、系统和电子设备
US20240220298A1 (en) Life cycle management for device input/output interfaces in virtualized environments
CN118332556A (zh) 一种基于虚拟内存技术的可信执行环境内存隔离系统及方法