WO2012010205A1 - A processor-implemented method for ensuring software integrity - Google Patents
A processor-implemented method for ensuring software integrity Download PDFInfo
- Publication number
- WO2012010205A1 WO2012010205A1 PCT/EP2010/060603 EP2010060603W WO2012010205A1 WO 2012010205 A1 WO2012010205 A1 WO 2012010205A1 EP 2010060603 W EP2010060603 W EP 2010060603W WO 2012010205 A1 WO2012010205 A1 WO 2012010205A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- instruction
- key
- encrypted
- value
- current
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/3017—Runtime instruction translation, e.g. macros
- G06F9/30178—Runtime instruction translation, e.g. macros of compressed or encrypted instructions
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2013519968A JP5616528B2 (en) | 2010-07-22 | 2010-07-22 | A method implemented by a processor for ensuring the integrity of software |
PCT/EP2010/060603 WO2012010205A1 (en) | 2010-07-22 | 2010-07-22 | A processor-implemented method for ensuring software integrity |
CN201080067681.3A CN102959556B (en) | 2010-07-22 | 2010-07-22 | For guaranteeing the method that the processor of software integrity realizes |
KR1020127031855A KR101687439B1 (en) | 2010-07-22 | 2010-07-22 | A processor-implemented method for ensuring software integrity |
RU2013104050/08A RU2541196C2 (en) | 2010-07-22 | 2010-07-22 | Method of providing software integrity |
BR112012031052-6A BR112012031052B1 (en) | 2010-07-22 | 2010-07-22 | method implemented by a processor aimed at ensuring the integrity of the software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2010/060603 WO2012010205A1 (en) | 2010-07-22 | 2010-07-22 | A processor-implemented method for ensuring software integrity |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012010205A1 true WO2012010205A1 (en) | 2012-01-26 |
Family
ID=43297003
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2010/060603 WO2012010205A1 (en) | 2010-07-22 | 2010-07-22 | A processor-implemented method for ensuring software integrity |
Country Status (6)
Country | Link |
---|---|
JP (1) | JP5616528B2 (en) |
KR (1) | KR101687439B1 (en) |
CN (1) | CN102959556B (en) |
BR (1) | BR112012031052B1 (en) |
RU (1) | RU2541196C2 (en) |
WO (1) | WO2012010205A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017014890A1 (en) * | 2015-07-20 | 2017-01-26 | Intel Corporation | Technologies for integrity, anti-replay, and authenticity assurance for i/o data |
US20170024569A1 (en) * | 2015-07-20 | 2017-01-26 | Intel Corporation | Technologies for secure trusted i/o access control |
FR3071121A1 (en) * | 2017-09-14 | 2019-03-15 | Commissariat A L'energie Atomique Et Aux Energies Alternatives | METHOD FOR EXECUTING A BINARY CODE OF A FUNCTION SECURE BY A MICROPROCESSOR |
EP3712794A1 (en) | 2019-03-21 | 2020-09-23 | Commissariat à l'énergie atomique et aux énergies alternatives | Method for executing a binary code of a function secured by a microprocessor |
US10942868B2 (en) | 2017-09-14 | 2021-03-09 | Commissariat A L'energie Atomique Et Aux Energies Alternatives | Execution process of binary code of function secured by microprocessor |
EP4002165A1 (en) * | 2020-11-18 | 2022-05-25 | Thales DIS France SA | Code flow protection with error propagation |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103902858A (en) * | 2013-12-25 | 2014-07-02 | 武汉安天信息技术有限责任公司 | APK application reinforcing method and system |
JP6478724B2 (en) * | 2015-03-09 | 2019-03-06 | Kddi株式会社 | Information processing apparatus, information processing method, and computer program |
CN106789006A (en) * | 2016-11-28 | 2017-05-31 | 范睿心 | A kind of decryption method and system |
KR101953444B1 (en) * | 2016-12-26 | 2019-05-17 | 포항공과대학교 산학협력단 | Software security method based on virtualization technologies to ensure the security level equivalent to hardware and system using the same |
RU179302U1 (en) * | 2017-11-21 | 2018-05-07 | Александра Владимировна Харжевская | DEVICE OF DYNAMIC CONTROL OF PERFORMANCE OF SPECIAL COMPUTATIONS |
CN110515652B (en) * | 2019-08-30 | 2021-10-15 | 腾讯科技(深圳)有限公司 | Code abstract generation method and device and storage medium |
CN111565002A (en) * | 2020-05-22 | 2020-08-21 | 北京合康新能变频技术有限公司 | Control system of frequency converter |
CN111881467B (en) * | 2020-06-12 | 2022-10-28 | 海光信息技术股份有限公司 | Method and device for protecting file by using security processor, CPU and computer equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5675645A (en) * | 1995-04-18 | 1997-10-07 | Ricoh Company, Ltd. | Method and apparatus for securing executable programs against copying |
EP0908810A2 (en) * | 1997-10-10 | 1999-04-14 | General Instrument Corporation | Secure processor with external memory using block chaining and block re-ordering |
WO2004072891A2 (en) * | 2003-02-11 | 2004-08-26 | Vi Laboratories, Llc | System and method for regulating execution of computer software |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002353960A (en) * | 2001-05-30 | 2002-12-06 | Fujitsu Ltd | Code performing device and code distributing method |
US6715085B2 (en) * | 2002-04-18 | 2004-03-30 | International Business Machines Corporation | Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function |
US6948067B2 (en) * | 2002-07-24 | 2005-09-20 | Qualcomm, Inc. | Efficient encryption and authentication for data processing systems |
US7103779B2 (en) * | 2003-09-18 | 2006-09-05 | Apple Computer, Inc. | Method and apparatus for incremental code signing |
EP1855476A3 (en) * | 2006-05-11 | 2010-10-27 | Broadcom Corporation | System and method for trusted data processing |
KR100922862B1 (en) * | 2007-11-14 | 2009-10-20 | 성균관대학교산학협력단 | Security method of system by? encoding instructions |
CN101452514B (en) * | 2007-12-06 | 2011-06-29 | 中国长城计算机深圳股份有限公司 | User data protection method for safety computer |
JP2009211292A (en) * | 2008-03-03 | 2009-09-17 | Oki Electric Ind Co Ltd | Encryption method, decryption method, encryption device, and decryption device |
EP2196937A1 (en) * | 2008-12-15 | 2010-06-16 | Thomson Licensing | Methods and devices for instruction level software encryption |
-
2010
- 2010-07-22 KR KR1020127031855A patent/KR101687439B1/en active IP Right Grant
- 2010-07-22 CN CN201080067681.3A patent/CN102959556B/en active Active
- 2010-07-22 WO PCT/EP2010/060603 patent/WO2012010205A1/en active Application Filing
- 2010-07-22 RU RU2013104050/08A patent/RU2541196C2/en not_active IP Right Cessation
- 2010-07-22 BR BR112012031052-6A patent/BR112012031052B1/en active IP Right Grant
- 2010-07-22 JP JP2013519968A patent/JP5616528B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5675645A (en) * | 1995-04-18 | 1997-10-07 | Ricoh Company, Ltd. | Method and apparatus for securing executable programs against copying |
EP0908810A2 (en) * | 1997-10-10 | 1999-04-14 | General Instrument Corporation | Secure processor with external memory using block chaining and block re-ordering |
WO2004072891A2 (en) * | 2003-02-11 | 2004-08-26 | Vi Laboratories, Llc | System and method for regulating execution of computer software |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10552619B2 (en) * | 2015-07-20 | 2020-02-04 | Intel Corporation | Technologies for secure trusted I/O access control |
US20170024569A1 (en) * | 2015-07-20 | 2017-01-26 | Intel Corporation | Technologies for secure trusted i/o access control |
US10073977B2 (en) | 2015-07-20 | 2018-09-11 | Intel Corporation | Technologies for integrity, anti-replay, and authenticity assurance for I/O data |
WO2017014890A1 (en) * | 2015-07-20 | 2017-01-26 | Intel Corporation | Technologies for integrity, anti-replay, and authenticity assurance for i/o data |
US10650151B2 (en) | 2017-09-14 | 2020-05-12 | Commissariat A L'energie Atomique Et Aux Energies Alternatives | Method of execution of a binary code of a secure function by a microprocessor |
EP3457620A1 (en) * | 2017-09-14 | 2019-03-20 | Commissariat à l'Énergie Atomique et aux Énergies Alternatives | Method for executing a binary code of a secure function by a microprocessor |
FR3071121A1 (en) * | 2017-09-14 | 2019-03-15 | Commissariat A L'energie Atomique Et Aux Energies Alternatives | METHOD FOR EXECUTING A BINARY CODE OF A FUNCTION SECURE BY A MICROPROCESSOR |
US10942868B2 (en) | 2017-09-14 | 2021-03-09 | Commissariat A L'energie Atomique Et Aux Energies Alternatives | Execution process of binary code of function secured by microprocessor |
EP3712794A1 (en) | 2019-03-21 | 2020-09-23 | Commissariat à l'énergie atomique et aux énergies alternatives | Method for executing a binary code of a function secured by a microprocessor |
FR3094107A1 (en) | 2019-03-21 | 2020-09-25 | Commissariat à l'Energie Atomique et aux Energies Alternatives | PROCESS FOR EXECUTING A BINARY CODE OF A SECURE FUNCTION BY A MICROPROCESSOR |
US11461476B2 (en) | 2019-03-21 | 2022-10-04 | Commissariat A L'energie Atomique Et Aux Energies Alternatives | Method for executing a binary code of a function secured by a microprocessor |
EP4002165A1 (en) * | 2020-11-18 | 2022-05-25 | Thales DIS France SA | Code flow protection with error propagation |
WO2022106229A1 (en) * | 2020-11-18 | 2022-05-27 | Thales Dis France Sas | Code flow protection with error propagation |
Also Published As
Publication number | Publication date |
---|---|
KR20130120985A (en) | 2013-11-05 |
RU2541196C2 (en) | 2015-02-10 |
CN102959556B (en) | 2015-12-16 |
BR112012031052A2 (en) | 2016-10-25 |
JP2013535725A (en) | 2013-09-12 |
KR101687439B1 (en) | 2016-12-16 |
BR112012031052B1 (en) | 2020-12-01 |
CN102959556A (en) | 2013-03-06 |
JP5616528B2 (en) | 2014-10-29 |
RU2013104050A (en) | 2014-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8683224B2 (en) | Processor-implemented method for ensuring software integrity | |
WO2012010205A1 (en) | A processor-implemented method for ensuring software integrity | |
CN111052115B (en) | Data processing apparatus and method of authentication depending on call path | |
Lee et al. | Architecture for protecting critical secrets in microprocessors | |
US8949586B2 (en) | System and method for authenticating computer system boot instructions during booting by using a public key associated with a processor and a monitoring device | |
US10223117B2 (en) | Execution flow protection in microcontrollers | |
CN109409086B (en) | Device for detecting falsified return address in stack based on newly added instruction | |
US20170046280A1 (en) | Data processing device and method for protecting a data processing device against attacks | |
KR100922862B1 (en) | Security method of system by? encoding instructions | |
EP0962850A2 (en) | A method for protecting embedded system software and embedded system | |
US20230017231A1 (en) | Securely executing software based on cryptographically verified instructions | |
CN109409083B (en) | Device for detecting return address tampering in stack | |
CA2958986C (en) | System and method for protecting a device against attacks on processing flow using a code pointer complement | |
KR100978605B1 (en) | Attack detecting method and attack detect0r for system security | |
CN114816549B (en) | Method and system for protecting bootloader and environment variable thereof | |
US8555387B2 (en) | Apparatus and method for protecting asset in computer system | |
CN117786699A (en) | Chip initialization method, device, module, electronic equipment and storage medium | |
CN117378170A (en) | Enhanced cryptography system and method | |
EP2975549A1 (en) | Method and device to protect software code against fault attack | |
JP2004280678A (en) | Data processor and data processing method | |
Patel et al. | CUFFS: An instruction count based architectural framework for security of MPSoCs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080067681.3 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10737543 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20127031855 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2013519968 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2013104050 Country of ref document: RU Kind code of ref document: A |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10737543 Country of ref document: EP Kind code of ref document: A1 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112012031052 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112012031052 Country of ref document: BR Kind code of ref document: A2 Effective date: 20121205 |