WO2007055729A3 - Protecting applications software against unauthorized access, reverse engineering or tampering - Google Patents
Protecting applications software against unauthorized access, reverse engineering or tampering Download PDFInfo
- Publication number
- WO2007055729A3 WO2007055729A3 PCT/US2006/018353 US2006018353W WO2007055729A3 WO 2007055729 A3 WO2007055729 A3 WO 2007055729A3 US 2006018353 W US2006018353 W US 2006018353W WO 2007055729 A3 WO2007055729 A3 WO 2007055729A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application software
- protection
- tampering
- unauthorized access
- reverse engineering
- Prior art date
Links
- 238000010899 nucleation Methods 0.000 abstract 2
- 238000000034 method Methods 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
Abstract
A system, method and program for protecting applications software from unauthorized access, reverse engineering or tampering, is disclosed. Protection of the application software may be accomplished by seeding the application software with sneak circuits based on performance indicators; running the application software in test mode to analyze performance indicators versus protection indicators of the application software; modifying seeding if the performance indicators and the protection indicators reach a predetermined tradeoff value; and inserting active protection code in the application software. Additional protection can be accomplished by executing a protected version of the application software in normal mode and collecting forensics data while executing the protected version.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US68267605P | 2005-05-19 | 2005-05-19 | |
US60/682,676 | 2005-05-19 | ||
US11/382,768 | 2006-05-11 | ||
US11/382,768 US20070266434A1 (en) | 2006-05-11 | 2006-05-11 | Protecting Applications Software Against Unauthorized Access, Reverse Engineering or Tampering |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007055729A2 WO2007055729A2 (en) | 2007-05-18 |
WO2007055729A3 true WO2007055729A3 (en) | 2009-04-30 |
Family
ID=38023719
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/018353 WO2007055729A2 (en) | 2005-05-19 | 2006-05-12 | Protecting applications software against unauthorized access, reverse engineering or tampering |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2007055729A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111104768A (en) * | 2019-12-23 | 2020-05-05 | 中国人民解放军火箭军工程大学 | Time sequence potential problem identification method and system based on digital twin model |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009010338A1 (en) * | 2007-07-13 | 2009-01-22 | Siemens Aktiengesellschaft | Method for the computer-assisted obfuscation of a software program and computer program product |
EP3438865A1 (en) | 2017-08-02 | 2019-02-06 | Texplained | Attack detection by counting branching instruction |
EP4298541A4 (en) * | 2021-02-24 | 2024-01-24 | Visa Int Service Ass | Modular security evaluation of software on devices |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030233245A1 (en) * | 2002-06-17 | 2003-12-18 | Zemore Michael G. | System safety analysis process and instruction |
US6668325B1 (en) * | 1997-06-09 | 2003-12-23 | Intertrust Technologies | Obfuscation techniques for enhancing software security |
-
2006
- 2006-05-12 WO PCT/US2006/018353 patent/WO2007055729A2/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6668325B1 (en) * | 1997-06-09 | 2003-12-23 | Intertrust Technologies | Obfuscation techniques for enhancing software security |
US20030233245A1 (en) * | 2002-06-17 | 2003-12-18 | Zemore Michael G. | System safety analysis process and instruction |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111104768A (en) * | 2019-12-23 | 2020-05-05 | 中国人民解放军火箭军工程大学 | Time sequence potential problem identification method and system based on digital twin model |
CN111104768B (en) * | 2019-12-23 | 2020-08-21 | 中国人民解放军火箭军工程大学 | Time sequence potential problem identification method and system based on digital twin model |
Also Published As
Publication number | Publication date |
---|---|
WO2007055729A2 (en) | 2007-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007041501A3 (en) | Secure execution environment by preventing execution of unauthorized boot loaders | |
WO2006077443A3 (en) | Computer protection against malware affection | |
WO2004084470A3 (en) | Dead on demand disk technology | |
TW200708952A (en) | Providing extended memory protection | |
MXPA05007150A (en) | Policy engine and methods and systems for protecting data. | |
WO2007015204A3 (en) | A secure terminal, a routine and a method of protecting a secret key | |
WO2007000702A3 (en) | Arrangement for and method of protecting a data processing device against a cryptographic attack or analysis | |
WO2004059543A3 (en) | Method and system for protecting against unauthorized modification of products | |
WO2006065956A3 (en) | Protecting computing systems from unauthorized programs | |
DE602006014801D1 (en) | Checking the authorization to install a software version | |
WO2007001376A3 (en) | System and method of using a protected non-volatile memory | |
WO2007004219A3 (en) | System, device and method of verifying that a code is executed by a processor | |
WO2011018414A3 (en) | Physically unclonable function with tamper prevention and anti-aging system | |
WO2008044113A3 (en) | Protection against side channel attack with an integrity check | |
WO2009122291A3 (en) | Method for mitigating the unauthorized use of a device | |
WO2004081707A3 (en) | Data processing system with peripheral access protection and method therefor | |
WO2007022392A3 (en) | Information protection method and system | |
WO2004010295A3 (en) | Method and apparatus for instrumentation on/off | |
WO2008140219A3 (en) | System and method for security using one-time execution code | |
WO2007002940A3 (en) | Debugging using virtual watchpoints | |
WO2007055729A3 (en) | Protecting applications software against unauthorized access, reverse engineering or tampering | |
WO2008082780A3 (en) | Performance assessment of policies in policy based networks | |
DK2060117T3 (en) | Security processor and method of recording and medium for configuring the behavior of this processor | |
WO2007000701A3 (en) | Arrangement for and method of protecting a data processing device against an attack or analysis | |
WO2009032732A3 (en) | Secure computer working environment utilizing a read-only bootable media |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
NENP | Non-entry into the national phase |
Ref country code: RU |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06844096 Country of ref document: EP Kind code of ref document: A2 |