WO2016064044A1 - 모바일 기기 및 상기 모바일 기기의 동작 방법 - Google Patents
모바일 기기 및 상기 모바일 기기의 동작 방법 Download PDFInfo
- Publication number
- WO2016064044A1 WO2016064044A1 PCT/KR2015/002207 KR2015002207W WO2016064044A1 WO 2016064044 A1 WO2016064044 A1 WO 2016064044A1 KR 2015002207 W KR2015002207 W KR 2015002207W WO 2016064044 A1 WO2016064044 A1 WO 2016064044A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- coprocessor
- core code
- code
- main processor
- core
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000004891 communication Methods 0.000 claims abstract description 6
- 238000012545 processing Methods 0.000 claims description 10
- 230000006870 function Effects 0.000 claims description 4
- 238000009434 installation Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 238000001514 detection method Methods 0.000 description 4
- 241000700605 Viruses Species 0.000 description 1
- 230000004907 flux Effects 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
Definitions
- the present invention relates to a mobile device and a method of operating the mobile device. More specifically, the present invention relates to a mobile device and a method of operating the mobile device for protecting a core code of a mobile application.
- smartphone banking Many users use smartphone banking, but the security of smartphone banking is still weak. Since smartphones connect to the Internet, which is a public network, there is a high security risk. Hackers who intrude through the Internet can leak information from smartphones and are not free from malware or phishing attacks. In addition, the forgery banking application can steal the user's financial information.
- the existing forgery detection technology that executes the forgery detection code at the application level and analyzes the structure of the application is not safe from forgery attack.
- extracting the Dalvik byte code executed in the Dalvik virtual machine of the Android mobile system can analyze the structure of the application. That is, application level forgery detection technology can be bypassed and avoided. Therefore, forgery detection technology at the platform level, not at the application level, is required.
- the technical problem of the present invention is a technique for protecting core code in a mobile application that is vulnerable to forgery and attack, and the core code of the mobile application is separated by separating the core code into an executable form in a main processor and another coprocessor.
- the present invention provides a protecting mobile device and a method of operating the mobile device.
- the mobile device is connected to the main processor for executing the general code of the mobile application, the coprocessor for executing the core code of the mobile application, and between the main processor and the coprocessor A coprocessor driver for enabling communication between a main processor and the coprocessor, wherein the generic code consists of instructions executable on the main processor, and the core code consists of instructions executable on the coprocessor.
- a method for operating a mobile device includes a main processor, a coprocessor, and a coprocessor driver for enabling communication between the main processor and the coprocessor, wherein the main processor includes: Invoking a core code of a mobile application consisting of instructions executable in the coprocessor; the coprocessor driver receiving a core code call from the main processor and passing the core code call to the coprocessor; After execution, delivering execution results to the coprocessor driver, and the coprocessor driver delivering the execution results to the main processor.
- the core code is installed at the level below the operating system when installing a mobile application, and the main processor and the general code are installed in a separate core code repository that cannot be directly accessed, thereby preventing the core code from being exposed to reverse engineering. Increase resistance.
- the core code is not exposed to the mobile device's main processor, increasing dynamic engineering resistance by preventing dynamic analysis using the mobile device's central processing unit.
- the use of a coprocessor eliminates the need for a network, further optimizing for mobile environments.
- the instruction set or structure of the isolated core code is changed to enhance reverse engineering analysis resistance.
- FIG. 1 is an exemplary diagram of code division of a mobile application according to an embodiment of the present invention.
- FIG. 2 is a block diagram showing the configuration of a mobile device according to an embodiment of the present invention.
- FIG. 3 is a block diagram illustrating a detailed configuration of the main processor of FIG. 2.
- FIG. 4 is a block diagram illustrating a detailed configuration of the coprocessor of FIG. 2.
- FIG. 5 is a flowchart illustrating the operation of a mobile device according to an embodiment of the present invention.
- ... unit means a unit for processing at least one function or operation, which may be implemented in hardware or software or a combination of hardware and software.
- FIG. 1 is an exemplary diagram of code division of a mobile application according to an embodiment of the present invention.
- a mobile application means an application installed and executable on a mobile device.
- it includes an app running on a smartphone.
- the user can download the app from the mobile application market, a virtual marketplace for freely buying and selling mobile content, and install the app on a mobile device such as a smartphone.
- the mobile device is a terminal that can be installed and run a mobile application, such as smart phones, smart pads, mobile phones, notebook computers, tablet PCs, PDA (Personal Digital Assistant).
- a mobile application such as smart phones, smart pads, mobile phones, notebook computers, tablet PCs, PDA (Personal Digital Assistant).
- the application can be provided as an application on the device.
- the mobile application is composed of a core code file composed of core codes that need to be protected from forgery and a general code file composed of general codes except core codes.
- the core code can be set using a function predefined in the mobile platform. In addition, it can be directly set by the user or the developer of the application or a person concerned with authentication.
- the core code cannot be omitted when running the application and can be selected as a part that must be executed more than once. That is, parts whose execution order is not changed by various conditions such as branch statements or condition statements can be selected as core codes.
- Mobile devices protect these core codes in mobile applications that are relatively exposed due to the packaging of mobile applications.
- obfuscation techniques to the main and coprocessors of mobile devices, it is possible to increase reverse engineering difficulty. have. This configuration will be described in detail with reference to FIGS. 2 to 5.
- FIG. 2 is a block diagram showing a configuration of a mobile device according to an embodiment of the present invention
- Figure 3 is a block diagram showing a detailed configuration of the main processor of Figure 2
- Figure 4 is a detailed configuration of the coprocessor of FIG. The block diagram shown.
- a mobile device includes a system-on-chip (200), a main processor (300), a coprocessor (400), a coprocessor driver (500), and a core code store (600). , A general code storage unit 700, a dynamic random access memory (DRAM) 800, and an encrypted shared memory 900.
- DRAM dynamic random access memory
- the system on chip 200 includes a main processor 300 and a coprocessor 400.
- the main processor 300 performs data processing operations in response to the mobile application command.
- the main processor 300 executes general code of a mobile application.
- the general code is composed of instructions executable on the main processor 300.
- the main processor 300 includes a general code execution unit 301, a core code call unit (Stub) 303, and a shared memory encryption / decryption unit 305.
- the general code execution unit 301 executes the general code of the mobile application.
- the core code caller 303 calls the core code while executing the general code, and transfers the call information to the coprocessor driver 500. And the core code processing result of the coprocessor 400 is received from the coprocessor driver 500.
- the shared memory encryption / decryption unit 305 writes the execution code executed by the general code execution unit 301 in the encrypted shared memory 900 in an encrypted form.
- the encrypted executable code of the coprocessor 400 written in the encrypted shared memory is decoded and referred to.
- the coprocessor 400 communicates with the main processor 300 through the coprocessor driver 500.
- the coprocessor 400 executes a predetermined operation in response to a call of the main processor 300.
- Coprocessor 400 executes the core code of the mobile application.
- the core code consists of instructions executable on the coprocessor 400.
- the coprocessor 400 includes a core code execution unit 401, a core code response unit 403, and a shared memory encryption / decryption unit 405.
- the core code execution unit 401 loads and executes core code from the core code repository 600.
- the core code response unit (Skeleton) 403 receives a core code call from the main processor 300 through the coprocessor driver 500. Then, the core code processing result of the core code execution unit 401 is transmitted to the coprocessor driver 500.
- the shared memory encryption / decryption unit 405 decrypts and references the encrypted executable code of the main processor 300 created in the encrypted shared memory 900.
- the execution code of the core code is written in the encrypted shared memory 900 in encrypted form while executing the core code.
- the coprocessor driver 500 is coupled between the main processor 300 and the coprocessor 400 to enable communication between the main processor 300 and the coprocessor 400.
- the coprocessor driver 500 When the coprocessor driver 500 receives the core code call from the main processor 300, the coprocessor driver 500 transmits the core code call to the coprocessor 400.
- the core code processing result is received from the coprocessor 400 and then transmitted to the main processor 300.
- the core code store 600 is allowed access only to the coprocessor 400, and stores the core code.
- the coprocessor 400 stores the core code separated from the mobile application in the core code repository 600 when the mobile application is installed.
- the general code storage unit 700 stores the general code of the mobile application.
- Dynamic random access memory (DRAM) 800 includes cryptographic shared memory 900.
- the encryption shared memory 900 encrypts the execution code of the main processor 300 or the data of the coprocessor 400.
- the encrypted data is shared between the main processor 300 and the coprocessor 400.
- FIG. 5 is a flowchart illustrating the operation of a mobile device according to an embodiment of the present invention.
- the main processor 300 installs a general code of a mobile application program (S101).
- the coprocessor 400 installs the core code of the mobile application in the core code repository 600 (S103).
- a mobile device is divided into a general code installation and a core code installation when installing a mobile application using a coprocessor, and the core code is installed in a separate core code repository that is inaccessible to the general code and the main processor. Is performed by.
- the main processor 300 initializes the encrypted shared memory 900 when the core code is called while executing the general code (S105) (S107). If necessary, data is written to the encrypted shared memory 900 (S109). In other words, when the mobile application is executed, it initializes the encrypted shared memory and encrypts the data as necessary when calling core code (Stub) during normal code execution.
- the main processor 300 transmits a core code call to the coprocessor driver 500 (S111). Then, the coprocessor driver 500 transmits the core code call information to the coprocessor 400 (S113). That is, the main processor 300 communicates with the coprocessor 400 by transferring the core code call information to the coprocessor driver 500.
- the coprocessor 400 loads the core code from the core code repository 600 (S115) and executes it (S117).
- the coprocessor 400 writes data to the encrypted shared memory 900 (S119).
- the coprocessor 400 transmits the core code processing result to the coprocess driver 500 after the core code is executed (S121).
- the coprocessor driver 500 transmits the processing result to the main processor 300 (S123). Therefore, the coprocessor 400 communicates the core code processing result to the coprocessor driver 500 and communicates with the main processor 300.
- the general code is executed only in the main processor 300 and the separated core code is executed in the coprocessor 400 so that the main code 300 is not exposed to the main processor 300 at the time of execution. Since the shared memory 900 between the coprocessor 400 and the encryption is relatively difficult reverse engineering.
- the embodiments of the present invention described above are not only implemented through the apparatus and the method, but may be implemented through a program for realizing a function corresponding to the configuration of the embodiments of the present invention or a recording medium on which the program is recorded.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Mathematical Physics (AREA)
- Advance Control (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (11)
- 모바일 응용 프로그램의 일반 코드를 실행하는 메인 프로세서,상기 모바일 응용 프로그램의 핵심 코드를 실행하는 코프로세서, 그리고상기 메인 프로세서 및 상기 코프로세서 사이에 연결되어 상기 메인 프로세서 및 상기 코프로세서 간의 통신을 가능하게 하는 코프로세서 드라이버를 포함하고,상기 일반 코드는 상기 메인 프로세서에서 실행 가능한 명령어로 구성되고, 상기 핵심 코드는 상기 코프로세서에서 실행 가능한 명령어로 구성된 모바일 기기.
- 제1항에 있어서,상기 코프로세서에게만 접근이 허용되고, 상기 핵심 코드를 저장하는 핵심코드 저장소를 더 포함하고,상기 코프로세서는,상기 모바일 응용 프로그램의 설치시 상기 모바일 응용 프로그램으로부터 분리된 상기 핵심 코드를 상기 핵심코드 저장소에 저장하는 모바일 기기.
- 제2항에 있어서,상기 코프로세서 드라이버는,상기 메인 프로세서로부터 핵심코드 호출을 요청받으면, 상기 코프로세서에게 상기 핵심코드 호출을 전달하고, 상기 코프로세서로부터 핵심코드 처리 결과를 수신하여 상기 메인 프로세서에게 전달하는 모바일 기기.
- 제3항에 있어서,상기 코프로세서는,상기 코프로세서 드라이버로부터 상기 핵심코드 호출이 전달되면, 상기 핵심코드 저장소로부터 상기 핵심코드를 로드하여 실행하는 모바일 기기.
- 제4항에 있어서,데이터를 암호화하여 공유하기 위한 암호화 공유 메모리를 더 포함하고,상기 메인 프로세서는,상기 일반 코드를 실행하는 중에 상기 핵심코드 호출시 상기 일반 코드의 데이터를 암호화된 형태로 상기 암호화 공유 메모리에 작성하고,상기 코프로세서는,상기 암호화 공유 메모리에 작성된 암호화된 데이터를 복호하여 참조하는 모바일 기기.
- 제5항에 있어서,상기 코프로세서는,상기 핵심 코드를 실행하는 중에 핵심 코드의 데이터를 암호화된 형태로 상기 암호화 공유 메모리에 작성하고,상기 메인 프로세서는,상기 암호화 공유 메모리에 작성된 암호화된 데이터를 복호하여 참조하는 모바일 기기.
- 제1항에 있어서,상기 핵심 코드는,사용자에 의해 선택되거나, 모바일 플랫폼에서 미리 정의한 함수를 이용하여 선택되는 모바일 기기.
- 메인 프로세서, 코프로세서 및 상기 메인 프로세서와 상기 코프로세서 간의 통신을 가능하게 하는 코프로세서 드라이버를 포함하는 모바일 기기의 동작 방법으로서,상기 메인 프로세서가 상기 코프로세서에서 실행 가능한 명령어로 구성된 모바일 응용 프로그램의 핵심 코드를 호출하는 단계,상기 코프로세서 드라이버가 상기 메인 프로세서로부터 핵심 코드 호출을 수신하여 상기 코프로세서로 전달하는 단계,상기 코프로세서가 핵심 코드를 실행한 후, 실행 결과를 상기 코프로세서 드라이버에게 전달하는 단계, 그리고상기 코프로세서 드라이버가 상기 실행 결과를 상기 메인 프로세서에게 전달하는 단계를 포함하는 모바일 기기의 동작 방법.
- 제8항에 있어서,상기 호출하는 단계 이전에,상기 코프로세서가 상기 모바일 응용 프로그램의 설치시 상기 모바일 응용 프로그램으로부터 분리된 상기 핵심 코드를 핵심코드 저장소에 저장하는 단계를 더 포함하고,상기 전달하는 단계는,상기 핵심코드 저장소로부터 상기 핵심 코드를 로드하여 실행하는 단계, 그리고상기 핵심 코드의 실행 결과를 상기 코프로세서 드라이버에게 전달하는 단계를 포함하는 모바일 기기의 동작 방법.
- 제9항에 있어서,상기 호출하는 단계는,상기 메인 프로세서가 상기 메인 프로세서에서 실행 가능한 명령어로 구성된 상기 모바일 응용 프로그램의 일반 코드를 실행하는 단계,상기 핵심 코드 호출이 필요하다고 판단되면, 상기 코프로세서 드라이버에게 상기 핵심 코드를 호출하는 단계를 포함하는 모바일 기기의 동작 방법.
- 제10항에 있어서,상기 메인 프로세서가 상기 일반 코드를 실행하는 중에 상기 핵심코드 호출시 상기 일반 코드의 데이터를 암호화된 형태로 상기 암호화 공유 메모리에 작성하는 단계,상기 코프로세서가 상기 핵심 코드를 실행하는 중에 상기 핵심 코드의 데이터를 암호화된 형태로 상기 암호화 공유 메모리에 작성하는 단계, 그리고상기 메인 프로세서 및 상기 코프로세서가 상기 암호화 공유 메모리를 통해 암호화된 데이터를 공유하는 단계를 더 포함하는 모바일 기기의 동작 방법.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/105,302 US20170147798A1 (en) | 2014-10-23 | 2015-03-06 | Mobile Device And Method Of Operating Mobile Device |
EP15852009.8A EP3057022B1 (en) | 2014-10-23 | 2015-03-06 | Mobile device and method for operating same |
JP2016527337A JP6297149B2 (ja) | 2014-10-23 | 2015-03-06 | モバイル機器及び該モバイル機器の動作方法 |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20140144320 | 2014-10-23 | ||
KR10-2014-0144320 | 2014-10-23 | ||
KR1020150002944A KR101566145B1 (ko) | 2014-10-23 | 2015-01-08 | 모바일 기기 및 상기 모바일 기기의 동작 방법 |
KR10-2015-0002944 | 2015-01-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016064044A1 true WO2016064044A1 (ko) | 2016-04-28 |
Family
ID=54601240
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2015/002207 WO2016064044A1 (ko) | 2014-10-23 | 2015-03-06 | 모바일 기기 및 상기 모바일 기기의 동작 방법 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20170147798A1 (ko) |
EP (1) | EP3057022B1 (ko) |
JP (1) | JP6297149B2 (ko) |
KR (1) | KR101566145B1 (ko) |
WO (1) | WO2016064044A1 (ko) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11520913B2 (en) * | 2018-05-11 | 2022-12-06 | International Business Machines Corporation | Secure execution support for A.I. systems (and other heterogeneous systems) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008527905A (ja) * | 2005-01-11 | 2008-07-24 | エンキャップ エーエス | セキュリティコード生成方法、セキュリティコード生成方法を用いた方法、及びセキュリティコード生成方法のためのプログラム可能な装置 |
KR20120002079A (ko) * | 2010-06-30 | 2012-01-05 | 에스케이플래닛 주식회사 | 어플리케이션 저작권 보호 시스템, 어플리케이션 저작권 보호 장치 및 방법, 그리고 단말 장치 및 상기 단말 장치의 어플리케이션 저작권 보호 방법 |
KR101223981B1 (ko) * | 2012-07-11 | 2013-01-21 | 주식회사 안랩 | 안전한 애플리케이션 실행을 위한 가상화 장치, 서버 및 방법 |
KR20140089321A (ko) * | 2012-07-09 | 2014-07-14 | 주식회사 씽크풀 | 페어링 수행 디지털 시스템 및 그 제공방법 |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5146575A (en) * | 1986-11-05 | 1992-09-08 | International Business Machines Corp. | Implementing privilege on microprocessor systems for use in software asset protection |
US5977997A (en) * | 1997-03-06 | 1999-11-02 | Lsi Logic Corporation | Single chip computer having integrated MPEG and graphical processors |
WO2001076129A2 (en) * | 2000-03-31 | 2001-10-11 | General Dynamics Decision Systems, Inc. | Scalable cryptographic engine |
WO2001086432A2 (en) * | 2000-05-11 | 2001-11-15 | Netoctave, Inc. | Cryptographic data processing systems, computer program products, and methods of operating same, using parallel execution units |
DE10061998A1 (de) | 2000-12-13 | 2002-07-18 | Infineon Technologies Ag | Kryptographieprozessor |
JP4475894B2 (ja) * | 2002-08-01 | 2010-06-09 | パナソニック株式会社 | 暗号化データを復号して実行用メモリ空間に配置する装置、およびその方法 |
DE102005022019A1 (de) * | 2005-05-12 | 2007-02-01 | Giesecke & Devrient Gmbh | Sichere Verarbeitung von Daten |
WO2007063433A2 (en) * | 2005-10-17 | 2007-06-07 | Nxp B.V. | Program executable image encryption |
US7916864B2 (en) * | 2006-02-08 | 2011-03-29 | Nvidia Corporation | Graphics processing unit used for cryptographic processing |
US7890750B2 (en) * | 2006-07-06 | 2011-02-15 | Accenture Global Services Limited | Encryption and decryption on a graphics processing unit |
US8181038B2 (en) * | 2007-04-11 | 2012-05-15 | Cyberlink Corp. | Systems and methods for executing encrypted programs |
US8458802B2 (en) * | 2011-04-02 | 2013-06-04 | Intel Corporation | Method and device for managing digital usage rights of documents |
KR101328012B1 (ko) * | 2013-08-12 | 2013-11-13 | 숭실대학교산학협력단 | 애플리케이션 코드 난독화 장치 및 그 방법 |
KR101350390B1 (ko) | 2013-08-14 | 2014-01-16 | 숭실대학교산학협력단 | 코드 난독화 장치 및 그 방법 |
-
2015
- 2015-01-08 KR KR1020150002944A patent/KR101566145B1/ko active IP Right Grant
- 2015-03-06 US US15/105,302 patent/US20170147798A1/en not_active Abandoned
- 2015-03-06 JP JP2016527337A patent/JP6297149B2/ja active Active
- 2015-03-06 EP EP15852009.8A patent/EP3057022B1/en active Active
- 2015-03-06 WO PCT/KR2015/002207 patent/WO2016064044A1/ko active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008527905A (ja) * | 2005-01-11 | 2008-07-24 | エンキャップ エーエス | セキュリティコード生成方法、セキュリティコード生成方法を用いた方法、及びセキュリティコード生成方法のためのプログラム可能な装置 |
KR20120002079A (ko) * | 2010-06-30 | 2012-01-05 | 에스케이플래닛 주식회사 | 어플리케이션 저작권 보호 시스템, 어플리케이션 저작권 보호 장치 및 방법, 그리고 단말 장치 및 상기 단말 장치의 어플리케이션 저작권 보호 방법 |
KR20140089321A (ko) * | 2012-07-09 | 2014-07-14 | 주식회사 씽크풀 | 페어링 수행 디지털 시스템 및 그 제공방법 |
KR101223981B1 (ko) * | 2012-07-11 | 2013-01-21 | 주식회사 안랩 | 안전한 애플리케이션 실행을 위한 가상화 장치, 서버 및 방법 |
Also Published As
Publication number | Publication date |
---|---|
EP3057022A4 (en) | 2017-05-31 |
EP3057022A1 (en) | 2016-08-17 |
KR101566145B1 (ko) | 2015-11-06 |
US20170147798A1 (en) | 2017-05-25 |
EP3057022B1 (en) | 2019-08-28 |
JP2017501478A (ja) | 2017-01-12 |
JP6297149B2 (ja) | 2018-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10949247B2 (en) | Systems and methods for auditing a virtual machine | |
WO2015053509A1 (ko) | 동적 라이브러리를 보호하는 방법 및 장치 | |
JP6918212B2 (ja) | 悪意のあるアプリケーションがアプリケーションサービスを活用することを防止するためのシステム及び方法 | |
CN108140094B (zh) | 用于安全可信i/o访问控制的技术 | |
WO2015026091A1 (ko) | 공통 중간 언어 기반 프로그램을 위한 보안 제공 방법 | |
Li et al. | TEEv: Virtualizing trusted execution environments on mobile platforms | |
CN107851160A (zh) | 用于在isa控制下进行多个共存可信执行环境的可信i/o的技术 | |
JP2016515748A (ja) | 実行時のアプリケーションメソッドを置き換えるためのシステム及び方法 | |
WO2015023093A1 (ko) | 해시를 이용한 동적코드의 무결성 검증 방법 | |
WO2018090201A1 (zh) | 一种安全的处理器芯片及终端设备 | |
CN102737188A (zh) | 检测恶意网页的方法及装置 | |
JP2013534001A (ja) | 仮想化を用いた動画コンテンツの保護 | |
WO2016024838A1 (ko) | 클라우드 기반의 애플리케이션 보안 서비스 제공 방법 및 시스템 | |
WO2018164503A1 (ko) | 상황 인식 기반의 랜섬웨어 탐지 | |
CN110874468A (zh) | 应用程序安全保护方法以及相关设备 | |
WO2016064040A1 (ko) | 서명정보를 이용하여 응용 프로그램의 위변조 여부를 탐지하는 사용자 단말기 및 그것을 이용한 위변조 탐지 방법 | |
WO2016064044A1 (ko) | 모바일 기기 및 상기 모바일 기기의 동작 방법 | |
Flynn et al. | Smartphone security | |
WO2021172765A1 (ko) | 전자 장치 및 그 제어 방법 | |
WO2016064043A1 (ko) | 사용자 단말기 및 상기 사용자 단말기의 주변기기를 이용한 핵심코드 보호 방법 | |
Khalid et al. | Hardware-Assisted Isolation Technologies: Security Architecture and Vulnerability Analysis | |
WO2016064042A1 (ko) | 사용자 단말기 및 그것을 이용한 응용 프로그램의 핵심코드 보호 방법 | |
WO2015156627A1 (ko) | 스마트 폰의 듀얼 운영체제를 실행하는 방법 | |
WO2024143952A1 (ko) | 모바일 기기의 동적커널모듈 보호 방법 및 이를 이용한 시스템 | |
WO2013042808A1 (ko) | 동적분석 및 정적분석 방지를 통한 소프트웨어 실행파일 보호 방법, 그리고 그에 따른 소프트웨어 실행파일 보호 프로그램을 기록한 컴퓨터로 판독가능한 기록매체 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2016527337 Country of ref document: JP Kind code of ref document: A |
|
REEP | Request for entry into the european phase |
Ref document number: 2015852009 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2015852009 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15852009 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15105302 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |