TW200905559A - System and method of interlocking to protect software-mediated program and device behaviours - Google Patents

System and method of interlocking to protect software-mediated program and device behaviours Download PDF

Info

Publication number
TW200905559A
TW200905559A TW097106229A TW97106229A TW200905559A TW 200905559 A TW200905559 A TW 200905559A TW 097106229 A TW097106229 A TW 097106229A TW 97106229 A TW97106229 A TW 97106229A TW 200905559 A TW200905559 A TW 200905559A
Authority
TW
Taiwan
Prior art keywords
code
expression
software
program
constant
Prior art date
Application number
TW097106229A
Other languages
English (en)
Chinese (zh)
Inventor
Harold Joseph Johnson
Yuan Xiang Gu
Yongxin Zhou
Original Assignee
Cloakware Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloakware Corp filed Critical Cloakware Corp
Publication of TW200905559A publication Critical patent/TW200905559A/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/046Masking or blinding of operations, operands or results of the operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/20Manipulating the length of blocks of bits, e.g. padding or block truncation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Stored Programmes (AREA)
TW097106229A 2007-02-23 2008-02-22 System and method of interlocking to protect software-mediated program and device behaviours TW200905559A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/709,654 US8752032B2 (en) 2007-02-23 2007-02-23 System and method of interlocking to protect software-mediated program and device behaviours
US11/980,392 US8161463B2 (en) 2007-02-23 2007-10-31 System and method of interlocking to protect software—mediated program and device behaviors

Publications (1)

Publication Number Publication Date
TW200905559A true TW200905559A (en) 2009-02-01

Family

ID=39709589

Family Applications (1)

Application Number Title Priority Date Filing Date
TW097106229A TW200905559A (en) 2007-02-23 2008-02-22 System and method of interlocking to protect software-mediated program and device behaviours

Country Status (8)

Country Link
US (5) US8752032B2 (enExample)
EP (2) EP2126776B1 (enExample)
CN (2) CN101622627B (enExample)
AR (1) AR065443A1 (enExample)
CA (2) CA2678951C (enExample)
IN (1) IN2009DN05762A (enExample)
TW (1) TW200905559A (enExample)
WO (1) WO2008101341A1 (enExample)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI452533B (zh) * 2010-10-08 2014-09-11 Microsoft Corp 維護隱私的計量
US10599482B2 (en) 2017-08-24 2020-03-24 Google Llc Method for intra-subgraph optimization in tuple graph programs
TWI689946B (zh) * 2017-08-24 2020-04-01 美商谷歌有限責任公司 用於元組圖形程式之類型推論之系統及跨越網路執行元組圖形程式之方法
US10887235B2 (en) 2017-08-24 2021-01-05 Google Llc Method of executing a tuple graph program across a network
TWI725616B (zh) * 2019-02-25 2021-04-21 華邦電子股份有限公司 保護半導體積體電路以防範逆向工程的方法及半導體裝置
TWI786879B (zh) * 2020-10-21 2022-12-11 美商夏瑞特科技實驗室股份有限公司 藉由算數及/或逐位元單元執行條件敘述的方法及系統

Families Citing this family (158)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7581103B2 (en) * 2001-06-13 2009-08-25 Intertrust Technologies Corporation Software self-checking systems and methods
GB2405958A (en) * 2003-08-20 2005-03-16 Macrovision Europ Ltd Code obfuscation and controlling a processor by emulation
US8752032B2 (en) 2007-02-23 2014-06-10 Irdeto Canada Corporation System and method of interlocking to protect software-mediated program and device behaviours
US8358703B2 (en) 2007-03-23 2013-01-22 Thomson Licensing Modifying a coded bitstream
US8588459B2 (en) * 2007-06-14 2013-11-19 Thomson Licensing Modifying a coded bitstream
CN101911153B (zh) * 2008-01-21 2014-08-20 日本电信电话株式会社 秘密计算系统、秘密计算方法、秘密计算装置
US7890480B2 (en) * 2008-02-11 2011-02-15 International Business Machines Corporation Processing of deterministic user-defined functions using multiple corresponding hash tables
US9081962B2 (en) * 2008-04-30 2015-07-14 Graeme Harkness Anti-tamper techniques
US8800048B2 (en) * 2008-05-20 2014-08-05 Microsoft Corporation Software protection through interdependent parameter cloud constrained software execution
US8429637B2 (en) * 2008-09-02 2013-04-23 Apple Inc. System and method for conditional expansion obfuscation
US8020125B1 (en) * 2008-09-10 2011-09-13 Cadence Design Systems, Inc. System, methods and apparatus for generation of simulation stimulus
US20100218037A1 (en) * 2008-09-16 2010-08-26 File System Labs Llc Matrix-based Error Correction and Erasure Code Methods and Apparatus and Applications Thereof
US8484630B2 (en) * 2008-12-23 2013-07-09 International Business Machines Corporation Code motion based on live ranges in an optimizing compiler
FR2942559B1 (fr) * 2009-02-24 2016-05-20 European Aeronautic Defence And Space Company - Eads France Procede de protection du code source d'un programme d'ordinateur.
CN102449951B (zh) * 2009-03-31 2015-09-23 皇家飞利浦有限公司 用于在电子组件中执行密码任务的方法
CN102483790B (zh) * 2009-05-06 2016-01-20 爱迪德技术有限公司 利用白盒密码术的联锁二进制保护
US20100329448A1 (en) * 2009-06-30 2010-12-30 Rane Shantanu D Method for Secure Evaluation of a Function Applied to Encrypted Signals
US8433925B2 (en) * 2009-09-04 2013-04-30 Gradiant Cryptographic system for performing secure computations and signal processing directly on encrypted data in untrusted environments
US8972742B2 (en) 2009-09-04 2015-03-03 Gradiant System for secure image recognition
US8843762B2 (en) * 2009-09-04 2014-09-23 Gradiant, Centro Tecnolóxico de Telecomunicacións de Galicia Cryptographic system for performing secure iterative computations and signal processing directly on encrypted data in untrusted environments
US8752029B2 (en) * 2009-09-29 2014-06-10 Microsoft Corporation Computing a symbolic bound for a procedure
US9134977B2 (en) * 2010-02-26 2015-09-15 Red Hat, Inc. Compiler operation for handling conditional statements
CN102939608A (zh) * 2010-03-25 2013-02-20 埃德图加拿大公司 抗边通道和重复调用攻击的动态、可变定时操作路径的系统和方法
EP2477110A1 (en) * 2011-01-14 2012-07-18 Wibu-Systems AG Method for protecting an application program against reverse engineering and related computer program product
US8707053B2 (en) * 2011-02-09 2014-04-22 Apple Inc. Performing boolean logic operations using arithmetic operations by code obfuscation
WO2012161763A1 (en) * 2011-02-15 2012-11-29 Lewis James M Method and system for identifying counterfeit programmable devices
US8837715B2 (en) 2011-02-17 2014-09-16 Gradiant, Centro Tecnolóxico de Telecomunicacións de Galica Method and apparatus for secure iterative processing and adaptive filtering
JP2012173870A (ja) * 2011-02-18 2012-09-10 Toshiba Corp 半導体装置及びメモリ保護方法
US8752027B2 (en) * 2011-09-14 2014-06-10 Microsoft Corporation Injecting faults into program for testing software
US20130097431A1 (en) * 2011-10-18 2013-04-18 Paul Marion Hriljac Systems and methods of source software code modification
EP2586959B2 (de) * 2011-10-28 2016-09-14 Cedes AG Sicherungsvorrichtung, Schließvorrichtung und Auswerteeinheit
US9698973B2 (en) 2012-03-30 2017-07-04 Irdeto B.V. Securing accessible systems using dynamic data mangling
US8976960B2 (en) 2012-04-02 2015-03-10 Apple Inc. Methods and apparatus for correlation protected processing of cryptographic operations
US9015681B1 (en) 2012-08-10 2015-04-21 The Mathworks, Inc. Creating and using array creation routines or a family of routines separate from algorithmic code
US9146750B2 (en) 2012-08-10 2015-09-29 The Mathworks, Inc. Mechanism for replacing an array creation routine within code
US9244667B2 (en) 2012-08-10 2016-01-26 The Mathworks, Inc. Mechanism for transforming between type-independent and type-specific code
WO2014046974A2 (en) 2012-09-20 2014-03-27 Case Paul Sr Case secure computer architecture
WO2014051459A1 (en) 2012-09-28 2014-04-03 Intel Corporation Loop vectorization methods and apparatus
US9336370B2 (en) 2012-12-06 2016-05-10 Apple Inc. Method and apparatus for dynamic obfuscation of static data
US9262639B2 (en) 2013-01-09 2016-02-16 Cisco Technology Inc. Plaintext injection attack protection
EP2947642B1 (en) * 2013-01-17 2017-09-06 Nippon Telegraph and Telephone Corporation Secret computation system, arithmetic unit, secret computation method and program
CN104919754B (zh) * 2013-01-17 2018-01-16 日本电信电话株式会社 篡改检测装置、篡改检测方法、以及程序
IL224743A0 (en) 2013-02-14 2013-06-27 Harel Cain A system for automatic obfuscation of computer programs
US11044076B2 (en) * 2013-02-25 2021-06-22 Hecusys, LLC Encrypted data processing
US9721120B2 (en) * 2013-05-14 2017-08-01 Apple Inc. Preventing unauthorized calls to a protected function
CN104182661A (zh) * 2013-05-24 2014-12-03 富泰华工业(深圳)有限公司 软件保护系统
US8881293B1 (en) * 2013-07-01 2014-11-04 Sap Se Static application security testing
KR101328012B1 (ko) * 2013-08-12 2013-11-13 숭실대학교산학협력단 애플리케이션 코드 난독화 장치 및 그 방법
US9021606B1 (en) * 2013-09-27 2015-04-28 Amazon Technologies, Inc. Systems and methods providing format data
US9361379B1 (en) 2013-09-27 2016-06-07 Amazon Technologies, Inc. Systems and methods providing recommendation data
US9218437B1 (en) * 2013-09-27 2015-12-22 Amazon Technologies, Inc. Systems and methods providing event data
JP6046870B1 (ja) * 2013-12-05 2016-12-21 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. テーブルネットワークの繰り返し適用のための計算装置
GB201400992D0 (en) * 2014-01-21 2014-03-05 Metaforic Ltd Method of protecting dynamic cryptographic keys
CN103793248B (zh) * 2014-01-23 2017-02-01 北京奇虎科技有限公司 一种应用程序升级的方法及装置
EP2913772A1 (de) * 2014-02-28 2015-09-02 Wibu-Systems AG Verfahren und Computersystem zum Schutz eines Computerprogramms gegen Beeinflussung
US9425952B2 (en) * 2014-03-27 2016-08-23 Samsung Israel Research Corporation Algebraic manipulation detection codes from algebraic curves
EP3127269B1 (en) * 2014-03-31 2018-07-11 Irdeto B.V. Protecting an item of software
GB201405754D0 (en) 2014-03-31 2014-05-14 Irdeto Bv Protecting an item of software comprising conditional code
US9858440B1 (en) * 2014-05-23 2018-01-02 Shape Security, Inc. Encoding of sensitive data
FR3024007B1 (fr) * 2014-07-16 2016-08-26 Viaccess Sa Procede d'acces a un contenu multimedia protege par un terminal
EP2983156B1 (fr) * 2014-08-06 2019-07-24 Secure-IC SAS Système et procédé de protection de circuit
US9824214B2 (en) * 2014-08-15 2017-11-21 Securisea, Inc. High performance software vulnerabilities detection system and methods
US9454659B1 (en) * 2014-08-15 2016-09-27 Securisea, Inc. Software vulnerabilities detection system and methods
US10599852B2 (en) 2014-08-15 2020-03-24 Securisea, Inc. High performance software vulnerabilities detection system and methods
SG10201405852QA (en) 2014-09-18 2016-04-28 Huawei Internat Pte Ltd Encryption function and decryption function generating method, encryption and decryption method and related apparatuses
US10496372B2 (en) 2014-09-30 2019-12-03 Koninklijke Philips N.V. Electronic calculating device for performing obfuscated arithmetic
RU2710310C2 (ru) 2014-12-12 2019-12-25 Конинклейке Филипс Н.В. Электронное устройство формирования
CN107005403A (zh) * 2014-12-22 2017-08-01 皇家飞利浦有限公司 电子计算设备
CN107580765B (zh) * 2015-01-27 2021-10-26 艾锐势有限责任公司 用于保护流媒体和其它数据流的混淆
US20160328539A1 (en) * 2015-05-05 2016-11-10 Nxp B.V. Obscuring Software Code With Split Variables
US10068070B2 (en) * 2015-05-05 2018-09-04 Nxp B.V. White-box elliptic curve point multiplication
US9712472B2 (en) 2015-07-02 2017-07-18 Microsoft Technology Licensing, Llc Application spawning responsive to communication
US9785484B2 (en) 2015-07-02 2017-10-10 Microsoft Technology Licensing, Llc Distributed application interfacing across different hardware
US9733915B2 (en) 2015-07-02 2017-08-15 Microsoft Technology Licensing, Llc Building of compound application chain applications
US9733993B2 (en) 2015-07-02 2017-08-15 Microsoft Technology Licensing, Llc Application sharing using endpoint interface entities
US10198252B2 (en) 2015-07-02 2019-02-05 Microsoft Technology Licensing, Llc Transformation chain application splitting
US9658836B2 (en) * 2015-07-02 2017-05-23 Microsoft Technology Licensing, Llc Automated generation of transformation chain compatible class
US9860145B2 (en) 2015-07-02 2018-01-02 Microsoft Technology Licensing, Llc Recording of inter-application data flow
US10261985B2 (en) 2015-07-02 2019-04-16 Microsoft Technology Licensing, Llc Output rendering in dynamic redefining application
US9626181B2 (en) * 2015-07-06 2017-04-18 Dell Products L.P. Systems and methods to securely inject binary images and code into firmware
US10198405B2 (en) 2015-07-08 2019-02-05 Microsoft Technology Licensing, Llc Rule-based layout of changing information
US10031724B2 (en) 2015-07-08 2018-07-24 Microsoft Technology Licensing, Llc Application operation responsive to object spatial status
US10277582B2 (en) 2015-08-27 2019-04-30 Microsoft Technology Licensing, Llc Application service architecture
US9946853B1 (en) * 2015-09-17 2018-04-17 Symantec Corporation Techniques for application code obfuscation
FR3047373B1 (fr) * 2016-01-28 2018-01-05 Morpho Procede de calcul securise multipartite protege contre une partie malveillante
EP3217307B1 (en) * 2016-02-22 2018-11-07 Eshard Method of testing the resistance of a circuit to a side channel analysis of second order or more
US10235218B2 (en) 2016-05-03 2019-03-19 International Business Machines Corporation Automatic correction of cryptographic application program interfaces
US10243937B2 (en) * 2016-07-08 2019-03-26 Nxp B.V. Equality check implemented with secret sharing
US9760349B1 (en) * 2016-11-09 2017-09-12 Red Hat, Inc. Managing different software dependencies associated with source code
EP3555785A1 (en) 2016-12-15 2019-10-23 Irdeto B.V. Software integrity verification
WO2018120233A1 (zh) * 2016-12-30 2018-07-05 华为技术有限公司 一种事务处理方法及装置
US11934945B2 (en) 2017-02-23 2024-03-19 Cerebras Systems Inc. Accelerated deep learning
CN106934260B (zh) * 2017-03-14 2020-03-17 北京深思数盾科技股份有限公司 代码保护方法、装置、服务器及存储介质
EP3385735B1 (en) 2017-04-04 2019-12-04 Secure-IC SAS Device and method for detecting points of failures
WO2018189728A1 (en) 2017-04-14 2018-10-18 Cerebras Systems Inc. Floating-point unit stochastic rounding for accelerated deep learning
US11488004B2 (en) 2017-04-17 2022-11-01 Cerebras Systems Inc. Neuron smearing for accelerated deep learning
CA3060969C (en) 2017-04-17 2020-12-29 Cerebras Systems Inc. Neuron smearing for accelerated deep learning
WO2018193380A1 (en) 2017-04-17 2018-10-25 Cerebras Systems Inc. Fabric vectors for deep learning acceleration
CN108809619B (zh) * 2017-04-27 2022-11-29 郑珂威 用于完全同态加密的精度控制及累计误差消除方法
CN107194212B (zh) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 一种显示器源代码中协议内容的保护方法
US10097538B1 (en) * 2017-08-12 2018-10-09 Growpath, Inc. User authentication systems and methods
US10489585B2 (en) 2017-08-29 2019-11-26 Red Hat, Inc. Generation of a random value for a child process
CN109697451B (zh) * 2017-10-23 2022-01-07 北京京东尚科信息技术有限公司 相似图像聚类方法及装置、存储介质、电子设备
EP3534253A1 (en) * 2018-02-28 2019-09-04 Koninklijke Philips N.V. Compiling device and method
US10810077B1 (en) * 2018-06-11 2020-10-20 Ambarella International Lp Rapid soft-error detection
EP3591550A1 (en) 2018-07-06 2020-01-08 Koninklijke Philips N.V. A compiler device with masking function
US10521613B1 (en) 2018-08-08 2019-12-31 Carlos Manuel Gonzalez Adaptive standalone secure software
US10762179B2 (en) 2018-08-08 2020-09-01 Irdeto B.V. System and method for watermarking software
WO2020044208A1 (en) * 2018-08-29 2020-03-05 Cerebras Systems Inc. Isa enhancements for accelerated deep learning
US20200104127A1 (en) * 2018-09-28 2020-04-02 Carnegie Mellon University Coded computation strategies for distributed matrix-matrix and matrix-vector products
US11822704B2 (en) * 2018-10-29 2023-11-21 Cryptography Research, Inc. Constant time secure arithmetic-to-Boolean mask conversion
US11764940B2 (en) 2019-01-10 2023-09-19 Duality Technologies, Inc. Secure search of secret data in a semi-trusted environment using homomorphic encryption
US11269762B2 (en) * 2019-03-25 2022-03-08 Aurora Labs Ltd. Using line-of-code behavior and relation models to anticipate impact of hardware changes
US11263316B2 (en) * 2019-08-20 2022-03-01 Irdeto B.V. Securing software routines
US12177133B2 (en) 2019-10-16 2024-12-24 Cerebras Systems Inc. Dynamic routing for accelerated deep learning
US12169771B2 (en) 2019-10-16 2024-12-17 Cerebras Systems Inc. Basic wavelet filtering for accelerated deep learning
US11574045B2 (en) 2019-12-10 2023-02-07 Winkk, Inc. Automated ID proofing using a random multitude of real-time behavioral biometric samplings
US12388799B1 (en) 2019-12-13 2025-08-12 Selfiie Corporation Systems and methods for providing a split inference approach to protect data and model
US11531782B1 (en) * 2022-05-13 2022-12-20 TripleBlind, Inc. Systems and methods for finding a value in a combined list of private values
US12088565B2 (en) 2019-12-13 2024-09-10 Triplelind Holdings, Inc. Systems and methods for privacy preserving training and inference of decentralized recommendation systems from decentralized data
US11599671B1 (en) 2019-12-13 2023-03-07 TripleBlind, Inc. Systems and methods for finding a value in a combined list of private values
US12149510B1 (en) 2019-12-13 2024-11-19 Tripleblind Holdings, Inc. Systems and methods for providing a private multi-modal artificial intelligence platform
CN111176610B (zh) * 2019-12-27 2022-03-25 北京百度网讯科技有限公司 量子随机数生成方法、装置、电子设备及存储介质
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
US11188316B2 (en) * 2020-03-09 2021-11-30 International Business Machines Corporation Performance optimization of class instance comparisons
US11204985B2 (en) * 2020-03-31 2021-12-21 Irdeto Canada Corporation Systems, methods, and storage media for creating secured computer code having entangled transformations
US11669613B2 (en) * 2020-05-29 2023-06-06 EnSoft Corp. Method for analyzing and verifying software for safety and security
KR102803025B1 (ko) * 2020-06-11 2025-05-07 라인플러스 주식회사 클래스 분산 및 순차적 메모리 적재를 이용한 파일 보호 방법 및 시스템
US11347500B2 (en) 2020-06-17 2022-05-31 Bank Of America Corporation Software code converter for resolving conflicts during code development
US11573775B2 (en) 2020-06-17 2023-02-07 Bank Of America Corporation Software code converter for resolving redundancy during code development
US11782685B2 (en) 2020-06-17 2023-10-10 Bank Of America Corporation Software code vectorization converter
CN111881462A (zh) * 2020-07-17 2020-11-03 张睿 一种商用密码应用加密有效性的在线分析技术
US11621837B2 (en) 2020-09-03 2023-04-04 Theon Technology Llc Secure encryption of data using partial-key cryptography
US11310042B2 (en) 2020-09-11 2022-04-19 Crown Sterling Limited, LLC Methods of storing and distributing large keys
US11528136B2 (en) 2020-11-24 2022-12-13 Crown Sterling Limited, LLC Decryption of encrypted data missing a private key
EP4033381A1 (en) * 2021-01-25 2022-07-27 Thales Dis Cpl Usa, Inc. Software obfuscation method using an opaque predicate based on multiplying mixed boolean-arithmetic expressions
US11687440B2 (en) * 2021-02-02 2023-06-27 Thales Dis Cpl Usa, Inc. Method and device of protecting a first software application to generate a protected software application
US11438314B2 (en) * 2021-02-10 2022-09-06 Yahoo Assets Llc Automatic privacy-aware machine learning method and apparatus
CN113158184B (zh) * 2021-03-03 2023-05-19 中国人民解放军战略支援部队信息工程大学 基于有限状态自动机的攻击脚本生成方法及相关装置
US12190131B2 (en) * 2021-03-25 2025-01-07 Tata Consultancy Services Limited Method and system for function call and variable access based relaxed backward slicing
CN113014439B (zh) * 2021-04-19 2021-10-26 广州大一互联网络科技有限公司 一种数据中心带宽的虚拟弹性管理方法
CN113268455B (zh) * 2021-04-26 2022-07-26 卡斯柯信号(成都)有限公司 基于布尔逻辑的联锁数据自动配置方法及系统
WO2023287437A1 (en) * 2021-07-16 2023-01-19 Lattice Semiconductor Corporation Communication systems and methods
CN113626841B (zh) * 2021-08-10 2024-10-29 萨思数字科技(北京)有限公司 基于多方安全计算的选择问题处理方法
US11755772B2 (en) 2021-09-20 2023-09-12 Crown Sterling Limited, LLC Securing data in a blockchain with a one-time pad
WO2023081222A1 (en) * 2021-11-03 2023-05-11 Arris Enterprises Llc White-box processing for encoding with large integer values
US11791988B2 (en) 2021-11-22 2023-10-17 Theon Technology Llc Use of random entropy in cryptography
US11943336B2 (en) 2021-11-22 2024-03-26 Theon Technology Llc Use of gradient decent function in cryptography
US11902420B2 (en) 2021-11-23 2024-02-13 Theon Technology Llc Partial cryptographic key transport using one-time pad encryption
US11762762B1 (en) * 2022-03-24 2023-09-19 Xilinx, Inc. Static and automatic inference of inter-basic block burst transfers for high-level synthesis
US12395353B2 (en) 2022-09-21 2025-08-19 Winkk, Inc. Authentication process with an exposed and unregistered public certificate
US12261952B2 (en) 2022-11-04 2025-03-25 Crown Sterling Limited, LLC Multiple vector one-time key pad
US12488166B2 (en) 2022-11-28 2025-12-02 Xilinx, Inc. Implementing burst transfers for predicated memory accesses in loop bodies for high-level synthesis
US12250310B2 (en) 2023-01-09 2025-03-11 Crown Sterling Limited, LLC Use of irrational numbers in elliptic curve cryptography
US12210644B2 (en) * 2023-06-09 2025-01-28 Content Square SAS Obfuscation
EP4524785A1 (en) * 2023-09-13 2025-03-19 Thales Dis France Sas Method to secure a software code
EP4575846A1 (en) * 2023-12-21 2025-06-25 Nagravision Sàrl Method and device for obfuscating code control flow
CN119011628B (zh) * 2024-09-06 2025-07-04 桂林理工大学 一种物联网中多维数据的聚合方法、系统、设备及介质

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BE1003932A6 (fr) 1989-04-28 1992-07-22 Musyck Emile Systeme cryptographique par bloc de donnees binaires.
US6088452A (en) * 1996-03-07 2000-07-11 Northern Telecom Limited Encoding technique for software and hardware
US5892899A (en) * 1996-06-13 1999-04-06 Intel Corporation Tamper resistant methods and apparatus
CN1155700A (zh) * 1996-09-08 1997-07-30 周跃平 计算机软件保护方法
US6192475B1 (en) * 1997-03-31 2001-02-20 David R. Wallace System and method for cloaking software
EP0988591A1 (en) * 1997-06-09 2000-03-29 Intertrust, Incorporated Obfuscation techniques for enhancing software security
US6594761B1 (en) * 1999-06-09 2003-07-15 Cloakware Corporation Tamper resistant software encoding
US7430670B1 (en) * 1999-07-29 2008-09-30 Intertrust Technologies Corp. Software self-defense systems and methods
US6779114B1 (en) * 1999-08-19 2004-08-17 Cloakware Corporation Tamper resistant software-control flow encoding
US7287166B1 (en) * 1999-09-03 2007-10-23 Purdue Research Foundation Guards for application in software tamperproofing
US7757097B2 (en) * 1999-09-03 2010-07-13 Purdue Research Foundation Method and system for tamperproofing software
CA2298990A1 (en) * 2000-02-18 2001-08-18 Cloakware Corporation Method and system for resistance to power analysis
CA2305078A1 (en) * 2000-04-12 2001-10-12 Cloakware Corporation Tamper resistant software - mass data encoding
CA2327911A1 (en) 2000-12-08 2002-06-08 Cloakware Corporation Obscuring functions in computer software
FR2820914A1 (fr) * 2001-02-15 2002-08-16 Bull Cp8 Procede de securisation d'un ensemble electronique mettant en oeuvre en algorithme cryptographique utilisant des operations booleennes et des operations arithmetiques, et systeme embarque correspondant
CA2348355A1 (en) * 2001-05-24 2002-11-24 Cloakware Corporation General scheme of using encodings in computations
US7243340B2 (en) * 2001-11-15 2007-07-10 Pace Anti-Piracy Method and system for obfuscation of computer program execution flow to increase computer program security
CA2363795A1 (en) 2001-11-26 2003-05-26 Cloakware Corporation Computer system protection by communication diversity
CA2369304A1 (en) * 2002-01-30 2003-07-30 Cloakware Corporation A protocol to hide cryptographic private keys
US20050193198A1 (en) 2004-01-27 2005-09-01 Jean-Michel Livowsky System, method and apparatus for electronic authentication
US7966499B2 (en) * 2004-01-28 2011-06-21 Irdeto Canada Corporation System and method for obscuring bit-wise and two's complement integer computations in software
WO2005101975A2 (en) 2004-04-22 2005-11-03 Fortress Gb Ltd. Accelerated throughput synchronized word stream cipher, message authenticator and zero-knowledge output random number generator
JP4622807B2 (ja) 2005-03-25 2011-02-02 ソニー株式会社 暗号処理装置、および暗号処理方法、並びにコンピュータ・プログラム
US8036274B2 (en) 2005-08-12 2011-10-11 Microsoft Corporation SIMD lapped transform-based digital media encoding/decoding
ATE432507T1 (de) * 2006-12-21 2009-06-15 Ericsson Telefon Ab L M Verschleierung von computerprogrammcodes
US8752032B2 (en) 2007-02-23 2014-06-10 Irdeto Canada Corporation System and method of interlocking to protect software-mediated program and device behaviours
US8185749B2 (en) * 2008-09-02 2012-05-22 Apple Inc. System and method for revising boolean and arithmetic operations
AU2011362967B2 (en) * 2011-03-24 2016-10-06 Irdeto B.V. System and method providing dependency networks throughout applications for attack resistance

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI452533B (zh) * 2010-10-08 2014-09-11 Microsoft Corp 維護隱私的計量
US10599482B2 (en) 2017-08-24 2020-03-24 Google Llc Method for intra-subgraph optimization in tuple graph programs
TWI689946B (zh) * 2017-08-24 2020-04-01 美商谷歌有限責任公司 用於元組圖形程式之類型推論之系統及跨越網路執行元組圖形程式之方法
US10642582B2 (en) 2017-08-24 2020-05-05 Google Llc System of type inference for tuple graph programs method of executing a tuple graph program across a network
US10887235B2 (en) 2017-08-24 2021-01-05 Google Llc Method of executing a tuple graph program across a network
US11429355B2 (en) 2017-08-24 2022-08-30 Google Llc System of type inference for tuple graph programs
TWI725616B (zh) * 2019-02-25 2021-04-21 華邦電子股份有限公司 保護半導體積體電路以防範逆向工程的方法及半導體裝置
TWI786879B (zh) * 2020-10-21 2022-12-11 美商夏瑞特科技實驗室股份有限公司 藉由算數及/或逐位元單元執行條件敘述的方法及系統
TWI812524B (zh) * 2020-10-21 2023-08-11 美商夏瑞特科技實驗室股份有限公司 藉由算數及/或逐位元單元執行條件敘述的方法及系統

Also Published As

Publication number Publication date
CN101622627A (zh) 2010-01-06
CA2678951A1 (en) 2008-08-28
EP2126775A1 (en) 2009-12-02
EP2126776B1 (en) 2017-11-15
EP2126775A4 (en) 2011-02-09
CA2678951C (en) 2020-03-24
CA2678953A1 (en) 2008-08-28
US8161463B2 (en) 2012-04-17
US8752032B2 (en) 2014-06-10
IN2009DN05762A (enExample) 2015-07-24
EP2126776A1 (en) 2009-12-02
CN101622627B (zh) 2012-05-09
EP2126776A4 (en) 2011-02-09
US20080208560A1 (en) 2008-08-28
AR065443A1 (es) 2009-06-10
US10402547B2 (en) 2019-09-03
US20150213239A1 (en) 2015-07-30
EP2126775B1 (en) 2017-11-01
CA2678953C (en) 2017-10-03
CN101627394B (zh) 2013-07-17
US20080216051A1 (en) 2008-09-04
WO2008101341A1 (en) 2008-08-28
US9910971B2 (en) 2018-03-06
CN101627394A (zh) 2010-01-13
US20150074803A1 (en) 2015-03-12
US20160239647A1 (en) 2016-08-18

Similar Documents

Publication Publication Date Title
TW200905559A (en) System and method of interlocking to protect software-mediated program and device behaviours
Lande et al. SoK: unraveling Bitcoin smart contracts
Ishai et al. Private circuits II: Keeping secrets in tamperable circuits
CN105024803B (zh) 白箱实现中的行为指纹
CN105007256B (zh) 用于在非信任平台上执行安全功能的安全模块
CN105184115B (zh) 用于将隐式完整性或可信性检查包括到白箱实现中的方法
CN106888081A (zh) 白盒实施方案内中间值的宽编码
CN105721135A (zh) 在加密实施中的替换盒
Bond Understanding Security APIs
CN105022937B (zh) 用于将白箱实现紧附到周围程序的接口兼容方法
CN109426731A (zh) 保护数据的方法
CN107273724A (zh) 为白盒实施方案的输入和输出加水印
EP1192516A1 (en) Tamper resistant software encoding
Huang et al. Smart contract watermarking based on code obfuscation
Haunts Applied Cryptography in .NET and Azure Key Vault
WO2008101340A1 (en) System and method for interlocking to protect software-mediated program and device behaviours
TW200928851A (en) Method for securing a conditional jump, information carrier, program, secured system and security processor for this method
Shanmugham et al. Power analysis attack resilient block cipher implementation based on 1‐of‐4 data encoding
Gupta et al. An enhanced python based approach of secret sharing scheme with encryption
TWI378389B (enExample)
Banga et al. Where octagonal geometry meets chaos: A new S-Box for advanced cryptographic systems
Lungu et al. Designing software locking mechanisms against reverse engineering, using artificial neural networks
Huang et al. Constructing a Pure-Software-Based Sanctuary for Mobile Agents
Gilmore et al. 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June
Lavallee Using Circuitry and Computer Analysis for Modern Cryptology