WO2008115279A3 - Virtualization for diversified tamper resistance - Google Patents

Virtualization for diversified tamper resistance Download PDF

Info

Publication number
WO2008115279A3
WO2008115279A3 PCT/US2007/081485 US2007081485W WO2008115279A3 WO 2008115279 A3 WO2008115279 A3 WO 2008115279A3 US 2007081485 W US2007081485 W US 2007081485W WO 2008115279 A3 WO2008115279 A3 WO 2008115279A3
Authority
WO
WIPO (PCT)
Prior art keywords
program
virtualization
tamper resistance
instruction set
set architecture
Prior art date
Application number
PCT/US2007/081485
Other languages
French (fr)
Other versions
WO2008115279A2 (en
Inventor
Bertrand Anckaert
Mariusz H Jakubowski
Ramarathnam Venkatesar
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to AU2007349213A priority Critical patent/AU2007349213B2/en
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to JP2009534768A priority patent/JP5302202B2/en
Priority to CN2007800396079A priority patent/CN101529436B/en
Priority to MX2009003342A priority patent/MX2009003342A/en
Priority to EP07874416.6A priority patent/EP2076863B1/en
Priority to BRPI0716471-8A2A priority patent/BRPI0716471A2/en
Priority to ES07874416.6T priority patent/ES2675371T3/en
Priority to KR1020097005677A priority patent/KR101440646B1/en
Priority to CA2662558A priority patent/CA2662558C/en
Publication of WO2008115279A2 publication Critical patent/WO2008115279A2/en
Publication of WO2008115279A3 publication Critical patent/WO2008115279A3/en
Priority to IL197361A priority patent/IL197361A0/en
Priority to NO20091281A priority patent/NO344529B1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45504Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects

Abstract

A computer-implementable method includes providing an instruction set architecture that comprises features to generate diverse copies of a program, using the instruction set architecture to generate diverse copies of a program and providing a virtual machine for execution of one of the diverse copies of the program. Various exemplary methods, devices, systems, etc., use virtualization for diversifying code and/or virtual machines to thereby enhance software security.
PCT/US2007/081485 2006-10-27 2007-10-16 Virtualization for diversified tamper resistance WO2008115279A2 (en)

Priority Applications (11)

Application Number Priority Date Filing Date Title
BRPI0716471-8A2A BRPI0716471A2 (en) 2006-10-27 2007-10-16 VIRTUALIZATION FOR RESISTANCE TO DIVERSIFIED ADULTERATION
JP2009534768A JP5302202B2 (en) 2006-10-27 2007-10-16 Virtualization for diversified manipulation tolerance
CN2007800396079A CN101529436B (en) 2006-10-27 2007-10-16 Virtualization for diversified tamper resistance
MX2009003342A MX2009003342A (en) 2006-10-27 2007-10-16 Virtualization for diversified tamper resistance.
EP07874416.6A EP2076863B1 (en) 2006-10-27 2007-10-16 Virtualization for diversified tamper resistance
AU2007349213A AU2007349213B2 (en) 2006-10-27 2007-10-16 Virtualization for diversified tamper resistance
ES07874416.6T ES2675371T3 (en) 2006-10-27 2007-10-16 Virtualization for a diversified manipulation resistance
KR1020097005677A KR101440646B1 (en) 2006-10-27 2007-10-16 Virtualization for diversified tamper resistance
CA2662558A CA2662558C (en) 2006-10-27 2007-10-16 Virtualization for diversified tamper resistance
IL197361A IL197361A0 (en) 2006-10-27 2009-03-03 Virtualization for diversified tamper resistance
NO20091281A NO344529B1 (en) 2006-10-27 2009-03-30 Virtualization for diversifying resistance to intervention

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/553,841 US8584109B2 (en) 2006-10-27 2006-10-27 Virtualization for diversified tamper resistance
US11/553,841 2006-10-27

Publications (2)

Publication Number Publication Date
WO2008115279A2 WO2008115279A2 (en) 2008-09-25
WO2008115279A3 true WO2008115279A3 (en) 2009-02-19

Family

ID=39495793

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/081485 WO2008115279A2 (en) 2006-10-27 2007-10-16 Virtualization for diversified tamper resistance

Country Status (16)

Country Link
US (2) US8584109B2 (en)
EP (1) EP2076863B1 (en)
JP (1) JP5302202B2 (en)
KR (1) KR101440646B1 (en)
CN (1) CN101529436B (en)
AU (1) AU2007349213B2 (en)
BR (1) BRPI0716471A2 (en)
CA (1) CA2662558C (en)
ES (1) ES2675371T3 (en)
IL (1) IL197361A0 (en)
MX (1) MX2009003342A (en)
MY (1) MY151697A (en)
NO (1) NO344529B1 (en)
RU (1) RU2458394C2 (en)
TW (1) TWI431500B (en)
WO (1) WO2008115279A2 (en)

Families Citing this family (119)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8584109B2 (en) 2006-10-27 2013-11-12 Microsoft Corporation Virtualization for diversified tamper resistance
US20080184019A1 (en) * 2007-01-30 2008-07-31 International Business Machines Corporation Method for embedding short rare code sequences in hot code without branch-arounds
KR100922862B1 (en) * 2007-11-14 2009-10-20 성균관대학교산학협력단 Security method of system by? encoding instructions
US20110035601A1 (en) * 2007-12-21 2011-02-10 University Of Virginia Patent Foundation System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms
US8819647B2 (en) * 2008-01-25 2014-08-26 International Business Machines Corporation Performance improvements for nested virtual machines
US8261254B2 (en) * 2008-03-31 2012-09-04 Symantec Corporation Dynamic insertion and removal of virtual software sub-layers
JP5151722B2 (en) * 2008-06-20 2013-02-27 ソニー株式会社 Data processing apparatus and method, and program
US8434073B1 (en) * 2008-11-03 2013-04-30 Symantec Corporation Systems and methods for preventing exploitation of byte sequences that violate compiler-generated alignment
US8387031B2 (en) * 2009-01-23 2013-02-26 International Business Machines Corporation Providing code improvements for nested virtual machines
KR100985074B1 (en) * 2009-02-05 2010-10-04 주식회사 안철수연구소 Malicious code prevention apparatus and method using selective virtualization, and computer-readable medium storing program for method thereof
US20110099439A1 (en) * 2009-10-23 2011-04-28 Infineon Technologies Ag Automatic diverse software generation for use in high integrity systems
US20110208948A1 (en) * 2010-02-23 2011-08-25 Infineon Technologies Ag Reading to and writing from peripherals with temporally separated redundant processor execution
WO2011116446A1 (en) * 2010-03-24 2011-09-29 Irdeto Canada Corporation System and method for random algorithm selection to dynamically conceal the operation of software
JP5549810B2 (en) * 2010-06-25 2014-07-16 日本電気株式会社 Program obfuscation device, program control device, program obfuscation method, and program
CA2806768C (en) * 2010-07-29 2018-07-03 Irdeto Canada Corporation System and method for efficiently deploying massively diverse program instances to resist differential attacks
CN101944042A (en) * 2010-09-01 2011-01-12 深圳市拜特科技股份有限公司 Operation method of Java program and electronic terminal
EP2649523B1 (en) * 2010-12-06 2020-06-17 Google LLC Method for compiling an intermediate code of an application
EP2482184A1 (en) * 2011-02-01 2012-08-01 Irdeto B.V. Adaptive obfuscated virtual machine
CN102231180B (en) * 2011-07-30 2014-05-28 张鹏 Method capable of redefining command code of processor
CN104025104B (en) * 2012-01-09 2018-05-29 皇家飞利浦有限公司 The virtual machine facility obscured and method with key driving
US8533836B2 (en) * 2012-01-13 2013-09-10 Accessdata Group, Llc Identifying software execution behavior
US8959577B2 (en) 2012-04-13 2015-02-17 Cisco Technology, Inc. Automatic curation and modification of virtualized computer programs
BR112014028947A2 (en) * 2012-05-25 2017-06-27 Koninklijke Philips Nv processor configuration method, processor configuration device, processor, and computer program product
US9436474B2 (en) * 2012-07-27 2016-09-06 Microsoft Technology Licensing, Llc Lock free streaming of executable code data
CN102855139B (en) * 2012-08-10 2015-04-22 浙江省电力公司电力科学研究院 Method and system for clearing register in decompiling data flow analysis
CN103685399B (en) 2012-09-17 2018-03-23 腾讯科技(深圳)有限公司 A kind of methods, devices and systems for logging in class Unix virtual containers
US9336370B2 (en) * 2012-12-06 2016-05-10 Apple Inc. Method and apparatus for dynamic obfuscation of static data
US9560014B2 (en) * 2013-01-23 2017-01-31 Mcafee, Inc. System and method for an endpoint hardware assisted network firewall in a security environment
US9116712B2 (en) * 2013-02-28 2015-08-25 Microsoft Technology Licensing, Llc Compile based obfuscation
KR101500512B1 (en) * 2013-05-15 2015-03-18 소프트캠프(주) Device and method for securing computer
KR101500714B1 (en) * 2013-05-15 2015-03-10 주식회사 코스콤 Method of preventing latency and system thereof
WO2014210277A1 (en) 2013-06-28 2014-12-31 The Trustees Of Columbia University In The City Of New York Diversified instruction set processing to enhance security
US9250937B1 (en) * 2013-11-06 2016-02-02 The Regents Of The University Of California Code randomization for just-in-time compilers
US9223995B1 (en) * 2013-12-10 2015-12-29 Progress Software Corporation Semantic obfuscation of data in real time
US20170024230A1 (en) * 2014-03-31 2017-01-26 Yunpeng Li Method, apparatus, and computer-readable medium for ofuscating execution of an application on a virtual machine
RU2568282C2 (en) * 2014-04-18 2015-11-20 Закрытое акционерное общество "Лаборатория Касперского" System and method for ensuring fault tolerance of antivirus protection realised in virtual environment
US10048974B1 (en) 2014-09-30 2018-08-14 Amazon Technologies, Inc. Message-based computation request scheduling
US9600312B2 (en) 2014-09-30 2017-03-21 Amazon Technologies, Inc. Threading as a service
US9678773B1 (en) 2014-09-30 2017-06-13 Amazon Technologies, Inc. Low latency computational capacity provisioning
US9715402B2 (en) 2014-09-30 2017-07-25 Amazon Technologies, Inc. Dynamic code deployment and versioning
US9323556B2 (en) 2014-09-30 2016-04-26 Amazon Technologies, Inc. Programmatic event detection and message generation for requests to execute program code
US9830193B1 (en) 2014-09-30 2017-11-28 Amazon Technologies, Inc. Automatic management of low latency computational capacity
US9146764B1 (en) 2014-09-30 2015-09-29 Amazon Technologies, Inc. Processing event messages for user requests to execute program code
US9537788B2 (en) 2014-12-05 2017-01-03 Amazon Technologies, Inc. Automatic determination of resource sizing
US9588790B1 (en) 2015-02-04 2017-03-07 Amazon Technologies, Inc. Stateful virtual compute system
US9733967B2 (en) 2015-02-04 2017-08-15 Amazon Technologies, Inc. Security protocols for low latency execution of program code
CN104680042B (en) * 2015-03-10 2017-10-24 北京深思数盾科技股份有限公司 A kind of method and system of virtual machine performance analysis
US9785476B2 (en) 2015-04-08 2017-10-10 Amazon Technologies, Inc. Endpoint management system and virtual compute system
US9930103B2 (en) 2015-04-08 2018-03-27 Amazon Technologies, Inc. Endpoint management system providing an application programming interface proxy service
CN105046117A (en) * 2015-06-30 2015-11-11 西北大学 Code virtualization software protection system realizing instruction set randomization
CN105045605B (en) * 2015-08-28 2019-05-24 成都卫士通信息产业股份有限公司 A kind of method and system by DLL injection target process
US10754701B1 (en) 2015-12-16 2020-08-25 Amazon Technologies, Inc. Executing user-defined code in response to determining that resources expected to be utilized comply with resource restrictions
US9811434B1 (en) 2015-12-16 2017-11-07 Amazon Technologies, Inc. Predictive management of on-demand code execution
US9910713B2 (en) 2015-12-21 2018-03-06 Amazon Technologies, Inc. Code execution request routing
US10067801B1 (en) 2015-12-21 2018-09-04 Amazon Technologies, Inc. Acquisition and maintenance of compute capacity
CN106960141A (en) * 2016-01-08 2017-07-18 阿里巴巴集团控股有限公司 Coding, coding/decoding method and the device of virtual machine instructions, virtual machine protection system
US11132213B1 (en) 2016-03-30 2021-09-28 Amazon Technologies, Inc. Dependency-based process of pre-existing data sets at an on demand code execution environment
US10891145B2 (en) 2016-03-30 2021-01-12 Amazon Technologies, Inc. Processing pre-existing data sets at an on demand code execution environment
EP3246837A1 (en) * 2016-05-19 2017-11-22 SFNT Germany GmbH Method to generate special purpose virtual machines
US10102040B2 (en) 2016-06-29 2018-10-16 Amazon Technologies, Inc Adjusting variable limit on concurrent code executions
US10296331B2 (en) * 2016-07-12 2019-05-21 International Business Machines Corporation Log-based software porting
US10162605B2 (en) * 2016-07-20 2018-12-25 Microsoft Technology Licensing, Llc Code snippet content recommendation to define an object literal
US11023581B2 (en) 2016-07-28 2021-06-01 Hewlett-Packard Development Company, L.P. Code package variants
US10884787B1 (en) 2016-09-23 2021-01-05 Amazon Technologies, Inc. Execution guarantees in an on-demand network code execution system
US11119813B1 (en) 2016-09-30 2021-09-14 Amazon Technologies, Inc. Mapreduce implementation using an on-demand network code execution system
US10325148B2 (en) * 2016-09-30 2019-06-18 Wipro Limited Method and a system for optical character recognition
US11017125B2 (en) * 2016-12-13 2021-05-25 University Of Florida Research Foundation, Incorporated Uniquified FPGA virtualization approach to hardware security
US10303861B2 (en) * 2017-01-26 2019-05-28 Immunant, Inc. Software diversification in external contexts
RU2638000C1 (en) * 2017-02-08 2017-12-08 Акционерное общество "Лаборатория Касперского" Method of monitoring execution system of programmable logic controller
EP3586229A4 (en) * 2017-02-21 2020-12-23 Privacy Software Solutions Ltd. A method and system for creating multi mobilephone environments and numbers on a single handset with a single sim-card
US10564946B1 (en) 2017-12-13 2020-02-18 Amazon Technologies, Inc. Dependency handling in an on-demand network code execution system
US10831898B1 (en) 2018-02-05 2020-11-10 Amazon Technologies, Inc. Detecting privilege escalations in code including cross-service calls
US10733085B1 (en) 2018-02-05 2020-08-04 Amazon Technologies, Inc. Detecting impedance mismatches due to cross-service calls
US10725752B1 (en) 2018-02-13 2020-07-28 Amazon Technologies, Inc. Dependency handling in an on-demand network code execution system
US10776091B1 (en) 2018-02-26 2020-09-15 Amazon Technologies, Inc. Logging endpoint in an on-demand code execution system
US10853115B2 (en) 2018-06-25 2020-12-01 Amazon Technologies, Inc. Execution of auxiliary functions in an on-demand network code execution system
US10649749B1 (en) 2018-06-26 2020-05-12 Amazon Technologies, Inc. Cross-environment application of tracing information for improved code execution
US11146569B1 (en) 2018-06-28 2021-10-12 Amazon Technologies, Inc. Escalation-resistant secure network services using request-scoped authentication information
US10949237B2 (en) 2018-06-29 2021-03-16 Amazon Technologies, Inc. Operating system customization in an on-demand network code execution system
US11099870B1 (en) 2018-07-25 2021-08-24 Amazon Technologies, Inc. Reducing execution times in an on-demand network code execution system using saved machine states
EP3844652A4 (en) * 2018-08-28 2022-06-01 Digital Immunity, Inc. Non-disruptive mitigation of malware attacks
US11243953B2 (en) 2018-09-27 2022-02-08 Amazon Technologies, Inc. Mapreduce implementation in an on-demand network code execution system and stream data processing system
US11099917B2 (en) 2018-09-27 2021-08-24 Amazon Technologies, Inc. Efficient state maintenance for execution environments in an on-demand code execution system
EP3884412A1 (en) * 2018-11-19 2021-09-29 Secure Micro Ltd Computer implemented method
US11943093B1 (en) 2018-11-20 2024-03-26 Amazon Technologies, Inc. Network connection recovery after virtual machine transition in an on-demand network code execution system
US10884812B2 (en) 2018-12-13 2021-01-05 Amazon Technologies, Inc. Performance-based hardware emulation in an on-demand network code execution system
US11010188B1 (en) 2019-02-05 2021-05-18 Amazon Technologies, Inc. Simulated data object storage using on-demand computation of data objects
US11861386B1 (en) 2019-03-22 2024-01-02 Amazon Technologies, Inc. Application gateways in an on-demand network code execution system
US11119809B1 (en) 2019-06-20 2021-09-14 Amazon Technologies, Inc. Virtualization-based transaction handling in an on-demand network code execution system
US11190609B2 (en) 2019-06-28 2021-11-30 Amazon Technologies, Inc. Connection pooling for scalable network services
US11115404B2 (en) 2019-06-28 2021-09-07 Amazon Technologies, Inc. Facilitating service connections in serverless code executions
US11159528B2 (en) 2019-06-28 2021-10-26 Amazon Technologies, Inc. Authentication to network-services using hosted authentication information
CN110430209B (en) * 2019-08-13 2021-12-14 中科天御(苏州)科技有限公司 Industrial control system security defense method and device based on dynamic diversification
US11550944B2 (en) 2019-09-27 2023-01-10 Amazon Technologies, Inc. Code execution environment customization system for object storage service
US11394761B1 (en) 2019-09-27 2022-07-19 Amazon Technologies, Inc. Execution of user-submitted code on a stream of data
US10996961B2 (en) 2019-09-27 2021-05-04 Amazon Technologies, Inc. On-demand indexing of data in input path of object storage service
US11656892B1 (en) 2019-09-27 2023-05-23 Amazon Technologies, Inc. Sequential execution of user-submitted code and native functions
US11250007B1 (en) 2019-09-27 2022-02-15 Amazon Technologies, Inc. On-demand execution of object combination code in output path of object storage service
US11023416B2 (en) 2019-09-27 2021-06-01 Amazon Technologies, Inc. Data access control system for object storage service based on owner-defined code
US11055112B2 (en) 2019-09-27 2021-07-06 Amazon Technologies, Inc. Inserting executions of owner-specified code into input/output path of object storage service
US11106477B2 (en) 2019-09-27 2021-08-31 Amazon Technologies, Inc. Execution of owner-specified code during input/output path to object storage service
US11386230B2 (en) 2019-09-27 2022-07-12 Amazon Technologies, Inc. On-demand code obfuscation of data in input path of object storage service
US11416628B2 (en) 2019-09-27 2022-08-16 Amazon Technologies, Inc. User-specific data manipulation system for object storage service based on user-submitted code
US11360948B2 (en) 2019-09-27 2022-06-14 Amazon Technologies, Inc. Inserting owner-specified data processing pipelines into input/output path of object storage service
US10908927B1 (en) 2019-09-27 2021-02-02 Amazon Technologies, Inc. On-demand execution of object filter code in output path of object storage service
US11263220B2 (en) 2019-09-27 2022-03-01 Amazon Technologies, Inc. On-demand execution of object transformation code in output path of object storage service
US11023311B2 (en) 2019-09-27 2021-06-01 Amazon Technologies, Inc. On-demand code execution in input path of data uploaded to storage service in multiple data portions
US10942795B1 (en) 2019-11-27 2021-03-09 Amazon Technologies, Inc. Serverless call distribution to utilize reserved capacity without inhibiting scaling
US11119826B2 (en) 2019-11-27 2021-09-14 Amazon Technologies, Inc. Serverless call distribution to implement spillover while avoiding cold starts
CN113031930B (en) * 2019-12-24 2022-07-05 武汉斗鱼鱼乐网络科技有限公司 Source code confusion generation method and device for control flow flattening
US11714682B1 (en) 2020-03-03 2023-08-01 Amazon Technologies, Inc. Reclaiming computing resources in an on-demand code execution system
US11188391B1 (en) 2020-03-11 2021-11-30 Amazon Technologies, Inc. Allocating resources to on-demand code executions under scarcity conditions
CN111314377B (en) * 2020-03-17 2023-04-07 中科天御(苏州)科技有限公司 Dynamic diversified cloud security method and system for industrial control terminal
US11775640B1 (en) 2020-03-30 2023-10-03 Amazon Technologies, Inc. Resource utilization-based malicious task detection in an on-demand code execution system
US11593270B1 (en) 2020-11-25 2023-02-28 Amazon Technologies, Inc. Fast distributed caching using erasure coded object parts
US11550713B1 (en) 2020-11-25 2023-01-10 Amazon Technologies, Inc. Garbage collection in distributed systems using life cycled storage roots
KR102305845B1 (en) 2020-12-21 2021-09-29 쿠팡 주식회사 Electronic apparatus for verifying code and method thereof
US11388210B1 (en) 2021-06-30 2022-07-12 Amazon Technologies, Inc. Streaming analytics using a serverless compute system
CN114707124B (en) * 2022-03-22 2022-11-29 广东技术师范大学 NET platform code protection method and system based on code virtualization

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7051200B1 (en) * 2000-06-27 2006-05-23 Microsoft Corporation System and method for interfacing a software process to secure repositories
US20060136867A1 (en) * 2004-12-17 2006-06-22 Manfred Schneider Code diversification

Family Cites Families (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6006328A (en) * 1995-07-14 1999-12-21 Christopher N. Drake Computer software authentication, protection, and security system
US6151618A (en) * 1995-12-04 2000-11-21 Microsoft Corporation Safe general purpose virtual machine computing system
US6049863A (en) * 1996-07-24 2000-04-11 Advanced Micro Devices, Inc. Predecoding technique for indicating locations of opcode bytes in variable byte-length instructions within a superscalar microprocessor
DE69839913D1 (en) * 1997-10-02 2008-10-02 Koninkl Philips Electronics Nv DATA PROCESSING DEVICE FOR PROCESSING COMMAND
DE69836902T2 (en) * 1997-10-02 2007-10-18 Koninklijke Philips Electronics N.V. COMPUTER SETTING ON VARIABLE INSTRUCTIONS
US6643775B1 (en) * 1997-12-05 2003-11-04 Jamama, Llc Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications
US6092202A (en) * 1998-05-22 2000-07-18 N*Able Technologies, Inc. Method and system for secure transactions in a computer system
US6594761B1 (en) * 1999-06-09 2003-07-15 Cloakware Corporation Tamper resistant software encoding
US6832367B1 (en) * 2000-03-06 2004-12-14 International Business Machines Corporation Method and system for recording and replaying the execution of distributed java programs
US7093239B1 (en) * 2000-07-14 2006-08-15 Internet Security Systems, Inc. Computer immune system and method for detecting unwanted code in a computer system
US20030023960A1 (en) * 2001-07-25 2003-01-30 Shoab Khan Microprocessor instruction format using combination opcodes and destination prefixes
US7613930B2 (en) * 2001-01-19 2009-11-03 Trustware International Limited Method for protecting computer programs and data from hostile code
US7065755B2 (en) * 2001-03-15 2006-06-20 Sun Microsystems, Inc. Method and apparatus for removing class initialization barriers from shared compiled methods
US7543288B2 (en) * 2001-03-27 2009-06-02 Sun Microsystems, Inc. Reduced instruction set for Java virtual machines
US7320075B2 (en) * 2001-11-20 2008-01-15 Safenet, Inc. Software protection method utilizing hidden application code in a protection dynamic link library object
US20030135719A1 (en) * 2002-01-14 2003-07-17 International Business Machines Corporation Method and system using hardware assistance for tracing instruction disposition information
US8843903B1 (en) * 2003-06-11 2014-09-23 Symantec Corporation Process tracking application layered system
AU2003272035A1 (en) * 2002-11-20 2004-06-15 Koninklijke Philips Electronics N.V. Vliw processor with copy register file
US7150003B2 (en) * 2002-11-25 2006-12-12 Matsushita Electric Industrial Co., Ltd. Class coalescence for obfuscation of object-oriented software
US20040117532A1 (en) * 2002-12-11 2004-06-17 Bennett Steven M. Mechanism for controlling external interrupts in a virtual machine system
US7162711B2 (en) * 2002-12-12 2007-01-09 Sun Microsystems, Inc. Method of automatically virtualizing core native libraries of a virtual machine
KR100568228B1 (en) 2003-05-20 2006-04-07 삼성전자주식회사 Method for resisting program tampering using serial number and for upgrading obfuscated program, and apparatus for the same
US7707566B2 (en) * 2003-06-26 2010-04-27 Microsoft Corporation Software development infrastructure
US7260815B1 (en) * 2003-06-30 2007-08-21 Vmware, Inc. Method and apparatus for managing registers in a binary translator
US9020801B2 (en) * 2003-08-11 2015-04-28 Scalemp Inc. Cluster-based operating system-agnostic virtual computing system
GB2405958A (en) * 2003-08-20 2005-03-16 Macrovision Europ Ltd Code obfuscation and controlling a processor by emulation
US20050066324A1 (en) 2003-09-22 2005-03-24 Microsoft Corporation Method and system for distributing and installing software
US8220058B2 (en) * 2003-09-25 2012-07-10 Oracle America, Inc. Rendering and encryption engine for application program obfuscation
US7114055B1 (en) * 2003-09-29 2006-09-26 Xilinx, Inc. Reduced instruction set computer architecture with duplication of bit values from an immediate field of an instruction multiple times in a data word
US7376949B2 (en) * 2003-10-01 2008-05-20 Hewlett-Packard Development Company, L.P. Resource allocation and protection in a multi-virtual environment
US20050091658A1 (en) 2003-10-24 2005-04-28 Microsoft Corporation Operating system resource protection
US7421689B2 (en) * 2003-10-28 2008-09-02 Hewlett-Packard Development Company, L.P. Processor-architecture for facilitating a virtual machine monitor
US20050108440A1 (en) * 2003-11-19 2005-05-19 Intel Corporation Method and system for coalescing input output accesses to a virtual device
US7516331B2 (en) 2003-11-26 2009-04-07 International Business Machines Corporation Tamper-resistant trusted java virtual machine and method of using the same
US20050177826A1 (en) * 2004-02-05 2005-08-11 Miller James S. Versioning support in object-oriented programming languages and tools
JP3970856B2 (en) 2004-03-16 2007-09-05 Kddi株式会社 Program obfuscation device, program distribution system, computer program
US20050216920A1 (en) * 2004-03-24 2005-09-29 Vijay Tewari Use of a virtual machine to emulate a hardware device
US7631360B2 (en) 2004-06-12 2009-12-08 Microsoft Corporation Hardware protection
US7590867B2 (en) * 2004-06-24 2009-09-15 Intel Corporation Method and apparatus for providing secure virtualization of a trusted platform module
US8271976B2 (en) * 2004-06-30 2012-09-18 Microsoft Corporation Systems and methods for initializing multiple virtual processors within a single virtual machine
EP1669864B1 (en) * 2004-12-03 2010-06-02 STMicroelectronics Srl A process for managing virtual machines in a physical processing machine, corresponding processor system and computer program product therefor
US7472381B2 (en) * 2004-12-07 2008-12-30 Roaming Messenger, Inc. Method of and instruction set for executing operations on a device
US7409719B2 (en) * 2004-12-21 2008-08-05 Microsoft Corporation Computer security management, such as in a virtual machine or hardened operating system
US8370819B2 (en) * 2005-03-25 2013-02-05 Microsoft Corporation Mechanism to store information describing a virtual machine in a virtual disk image
US8312297B2 (en) * 2005-04-21 2012-11-13 Panasonic Corporation Program illegiblizing device and method
US20070022275A1 (en) * 2005-07-25 2007-01-25 Mistletoe Technologies, Inc. Processor cluster implementing conditional instruction skip
US7581085B1 (en) * 2005-09-08 2009-08-25 Parallels Software International, Inc. Fast stub and frame technology for virtual machine optimization
US8429630B2 (en) * 2005-09-15 2013-04-23 Ca, Inc. Globally distributed utility computing cloud
US8104033B2 (en) * 2005-09-30 2012-01-24 Computer Associates Think, Inc. Managing virtual machines based on business priorty
US7882499B2 (en) * 2005-10-24 2011-02-01 Microsoft Corporation Caching dynamically compiled code to storage
US8417796B2 (en) * 2006-01-17 2013-04-09 Leostream Corporation System and method for transferring a computing environment between computers of dissimilar configurations
US8296742B2 (en) * 2006-10-10 2012-10-23 Microsoft Corporation Automatic native generation
US8584109B2 (en) 2006-10-27 2013-11-12 Microsoft Corporation Virtualization for diversified tamper resistance
US8078577B2 (en) * 2008-04-07 2011-12-13 Installfree, Inc. Method of bi-directional synchronization of user data

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7051200B1 (en) * 2000-06-27 2006-05-23 Microsoft Corporation System and method for interfacing a software process to secure repositories
US20060136867A1 (en) * 2004-12-17 2006-06-22 Manfred Schneider Code diversification

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LINGER R.C.: "Systematic generation of stochastic diversity as an intrusion barrier in survivable system software", PROCEEDINGS OF THE 32ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, January 1999 (1999-01-01), XP010338827 *
MICHAEL C.C. ET AL.: "Two Systems for Automatic Software Diversification", PROCEEDINGS OF 2000 DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, vol. 2, January 2000 (2000-01-01), pages 220 - 230, XP010371139 *

Also Published As

Publication number Publication date
IL197361A0 (en) 2009-12-24
AU2007349213B2 (en) 2011-10-06
US8584109B2 (en) 2013-11-12
ES2675371T3 (en) 2018-07-10
NO20091281L (en) 2009-05-22
EP2076863A4 (en) 2013-09-04
MX2009003342A (en) 2009-05-12
CA2662558A1 (en) 2008-09-25
CN101529436B (en) 2012-12-12
JP2010508583A (en) 2010-03-18
RU2458394C2 (en) 2012-08-10
NO344529B1 (en) 2020-01-27
KR20090082176A (en) 2009-07-29
WO2008115279A2 (en) 2008-09-25
TW200832179A (en) 2008-08-01
JP5302202B2 (en) 2013-10-02
CA2662558C (en) 2015-12-01
AU2007349213A1 (en) 2008-09-25
TWI431500B (en) 2014-03-21
US20140068580A1 (en) 2014-03-06
BRPI0716471A2 (en) 2014-03-18
US9459893B2 (en) 2016-10-04
RU2009115656A (en) 2010-10-27
EP2076863B1 (en) 2018-05-02
KR101440646B1 (en) 2014-09-22
MY151697A (en) 2014-06-30
CN101529436A (en) 2009-09-09
EP2076863A2 (en) 2009-07-08
US20080127125A1 (en) 2008-05-29

Similar Documents

Publication Publication Date Title
WO2008115279A3 (en) Virtualization for diversified tamper resistance
EP1732004A4 (en) Computer system, server constituting the same, job execution control method thereof, and program
TW200627275A (en) Computer security management, such as in a virtual machine or hardened operating system
WO2016094840A3 (en) System, method & computer readable medium for software protection via composable process-level virtual machines
TWI370368B (en) Method and system for a runtime user account creation operation within a single-sign-on process in a federated computing environment
WO2008032200A8 (en) Method, apparatus and computer program product for providing standard real world to virtual world links
WO2008002730A3 (en) Method and system for rapidly developing and deploying sens0r-enabled software applications
WO2008000502A3 (en) Using status models having status derivations in a computer system
WO2007095552A3 (en) System and method for generating and executing a platform emulation based on a selected application
IN2014KN02671A (en)
WO2009073156A3 (en) Enhanced data exchange and functionality control system and method
WO2007021704A3 (en) Application acceleration using heterogeneous processors
NL1032187A1 (en) Method for generating a mask pattern, system for generating a mask pattern and computer program product.
WO2009094582A3 (en) Methods and systems for provisioning a virtual disk to diskless virtual and physical machines
WO2009006026A3 (en) Progressively implementing declarative models in distributed systems
WO2011020954A3 (en) Automated processing of multi-usage data, implementing functions requiring various levels of security or limits of responsibility
WO2006113291A3 (en) Registration of applications and complimentary features for interactive user interfaces
WO2008024743A3 (en) Secure web application development and execution environment
WO2012088171A3 (en) Method for checkpointing and restoring program state
WO2007112406A3 (en) Programming a multi-processor system
EP2645236A3 (en) Semiconductor device
WO2008157128A3 (en) Methods, systems, and computer program products for tokenized domain name resolution
DE502006000163D1 (en) DEVICE AND METHOD FOR CONTROLLING A WAVE FIELD SYNTHESIS RENDERING DEVICE
WO2006031821A3 (en) System, method, and computer program product for machine tool programming
TW200731133A (en) Firmware filters and patches

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200780039607.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07874416

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 2007874416

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2007349213

Country of ref document: AU

ENP Entry into the national phase

Ref document number: 2662558

Country of ref document: CA

ENP Entry into the national phase

Ref document number: 2007349213

Country of ref document: AU

Date of ref document: 20071016

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 1020097005677

Country of ref document: KR

ENP Entry into the national phase

Ref document number: 2009534768

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: MX/A/2009/003342

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 1929/CHENP/2009

Country of ref document: IN

ENP Entry into the national phase

Ref document number: 2009115656

Country of ref document: RU

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: PI0716471

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20090304