WO2008115279A3 - Virtualization for diversified tamper resistance - Google Patents
Virtualization for diversified tamper resistance Download PDFInfo
- Publication number
- WO2008115279A3 WO2008115279A3 PCT/US2007/081485 US2007081485W WO2008115279A3 WO 2008115279 A3 WO2008115279 A3 WO 2008115279A3 US 2007081485 W US2007081485 W US 2007081485W WO 2008115279 A3 WO2008115279 A3 WO 2008115279A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- program
- virtualization
- tamper resistance
- instruction set
- set architecture
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
Abstract
Priority Applications (11)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BRPI0716471-8A2A BRPI0716471A2 (en) | 2006-10-27 | 2007-10-16 | VIRTUALIZATION FOR RESISTANCE TO DIVERSIFIED ADULTERATION |
JP2009534768A JP5302202B2 (en) | 2006-10-27 | 2007-10-16 | Virtualization for diversified manipulation tolerance |
CN2007800396079A CN101529436B (en) | 2006-10-27 | 2007-10-16 | Virtualization for diversified tamper resistance |
MX2009003342A MX2009003342A (en) | 2006-10-27 | 2007-10-16 | Virtualization for diversified tamper resistance. |
EP07874416.6A EP2076863B1 (en) | 2006-10-27 | 2007-10-16 | Virtualization for diversified tamper resistance |
AU2007349213A AU2007349213B2 (en) | 2006-10-27 | 2007-10-16 | Virtualization for diversified tamper resistance |
ES07874416.6T ES2675371T3 (en) | 2006-10-27 | 2007-10-16 | Virtualization for a diversified manipulation resistance |
KR1020097005677A KR101440646B1 (en) | 2006-10-27 | 2007-10-16 | Virtualization for diversified tamper resistance |
CA2662558A CA2662558C (en) | 2006-10-27 | 2007-10-16 | Virtualization for diversified tamper resistance |
IL197361A IL197361A0 (en) | 2006-10-27 | 2009-03-03 | Virtualization for diversified tamper resistance |
NO20091281A NO344529B1 (en) | 2006-10-27 | 2009-03-30 | Virtualization for diversifying resistance to intervention |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/553,841 US8584109B2 (en) | 2006-10-27 | 2006-10-27 | Virtualization for diversified tamper resistance |
US11/553,841 | 2006-10-27 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2008115279A2 WO2008115279A2 (en) | 2008-09-25 |
WO2008115279A3 true WO2008115279A3 (en) | 2009-02-19 |
Family
ID=39495793
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/081485 WO2008115279A2 (en) | 2006-10-27 | 2007-10-16 | Virtualization for diversified tamper resistance |
Country Status (16)
Country | Link |
---|---|
US (2) | US8584109B2 (en) |
EP (1) | EP2076863B1 (en) |
JP (1) | JP5302202B2 (en) |
KR (1) | KR101440646B1 (en) |
CN (1) | CN101529436B (en) |
AU (1) | AU2007349213B2 (en) |
BR (1) | BRPI0716471A2 (en) |
CA (1) | CA2662558C (en) |
ES (1) | ES2675371T3 (en) |
IL (1) | IL197361A0 (en) |
MX (1) | MX2009003342A (en) |
MY (1) | MY151697A (en) |
NO (1) | NO344529B1 (en) |
RU (1) | RU2458394C2 (en) |
TW (1) | TWI431500B (en) |
WO (1) | WO2008115279A2 (en) |
Families Citing this family (119)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8584109B2 (en) | 2006-10-27 | 2013-11-12 | Microsoft Corporation | Virtualization for diversified tamper resistance |
US20080184019A1 (en) * | 2007-01-30 | 2008-07-31 | International Business Machines Corporation | Method for embedding short rare code sequences in hot code without branch-arounds |
KR100922862B1 (en) * | 2007-11-14 | 2009-10-20 | 성균관대학교산학협력단 | Security method of system by? encoding instructions |
US20110035601A1 (en) * | 2007-12-21 | 2011-02-10 | University Of Virginia Patent Foundation | System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms |
US8819647B2 (en) * | 2008-01-25 | 2014-08-26 | International Business Machines Corporation | Performance improvements for nested virtual machines |
US8261254B2 (en) * | 2008-03-31 | 2012-09-04 | Symantec Corporation | Dynamic insertion and removal of virtual software sub-layers |
JP5151722B2 (en) * | 2008-06-20 | 2013-02-27 | ソニー株式会社 | Data processing apparatus and method, and program |
US8434073B1 (en) * | 2008-11-03 | 2013-04-30 | Symantec Corporation | Systems and methods for preventing exploitation of byte sequences that violate compiler-generated alignment |
US8387031B2 (en) * | 2009-01-23 | 2013-02-26 | International Business Machines Corporation | Providing code improvements for nested virtual machines |
KR100985074B1 (en) * | 2009-02-05 | 2010-10-04 | 주식회사 안철수연구소 | Malicious code prevention apparatus and method using selective virtualization, and computer-readable medium storing program for method thereof |
US20110099439A1 (en) * | 2009-10-23 | 2011-04-28 | Infineon Technologies Ag | Automatic diverse software generation for use in high integrity systems |
US20110208948A1 (en) * | 2010-02-23 | 2011-08-25 | Infineon Technologies Ag | Reading to and writing from peripherals with temporally separated redundant processor execution |
WO2011116446A1 (en) * | 2010-03-24 | 2011-09-29 | Irdeto Canada Corporation | System and method for random algorithm selection to dynamically conceal the operation of software |
JP5549810B2 (en) * | 2010-06-25 | 2014-07-16 | 日本電気株式会社 | Program obfuscation device, program control device, program obfuscation method, and program |
CA2806768C (en) * | 2010-07-29 | 2018-07-03 | Irdeto Canada Corporation | System and method for efficiently deploying massively diverse program instances to resist differential attacks |
CN101944042A (en) * | 2010-09-01 | 2011-01-12 | 深圳市拜特科技股份有限公司 | Operation method of Java program and electronic terminal |
EP2649523B1 (en) * | 2010-12-06 | 2020-06-17 | Google LLC | Method for compiling an intermediate code of an application |
EP2482184A1 (en) * | 2011-02-01 | 2012-08-01 | Irdeto B.V. | Adaptive obfuscated virtual machine |
CN102231180B (en) * | 2011-07-30 | 2014-05-28 | 张鹏 | Method capable of redefining command code of processor |
CN104025104B (en) * | 2012-01-09 | 2018-05-29 | 皇家飞利浦有限公司 | The virtual machine facility obscured and method with key driving |
US8533836B2 (en) * | 2012-01-13 | 2013-09-10 | Accessdata Group, Llc | Identifying software execution behavior |
US8959577B2 (en) | 2012-04-13 | 2015-02-17 | Cisco Technology, Inc. | Automatic curation and modification of virtualized computer programs |
BR112014028947A2 (en) * | 2012-05-25 | 2017-06-27 | Koninklijke Philips Nv | processor configuration method, processor configuration device, processor, and computer program product |
US9436474B2 (en) * | 2012-07-27 | 2016-09-06 | Microsoft Technology Licensing, Llc | Lock free streaming of executable code data |
CN102855139B (en) * | 2012-08-10 | 2015-04-22 | 浙江省电力公司电力科学研究院 | Method and system for clearing register in decompiling data flow analysis |
CN103685399B (en) | 2012-09-17 | 2018-03-23 | 腾讯科技(深圳)有限公司 | A kind of methods, devices and systems for logging in class Unix virtual containers |
US9336370B2 (en) * | 2012-12-06 | 2016-05-10 | Apple Inc. | Method and apparatus for dynamic obfuscation of static data |
US9560014B2 (en) * | 2013-01-23 | 2017-01-31 | Mcafee, Inc. | System and method for an endpoint hardware assisted network firewall in a security environment |
US9116712B2 (en) * | 2013-02-28 | 2015-08-25 | Microsoft Technology Licensing, Llc | Compile based obfuscation |
KR101500512B1 (en) * | 2013-05-15 | 2015-03-18 | 소프트캠프(주) | Device and method for securing computer |
KR101500714B1 (en) * | 2013-05-15 | 2015-03-10 | 주식회사 코스콤 | Method of preventing latency and system thereof |
WO2014210277A1 (en) | 2013-06-28 | 2014-12-31 | The Trustees Of Columbia University In The City Of New York | Diversified instruction set processing to enhance security |
US9250937B1 (en) * | 2013-11-06 | 2016-02-02 | The Regents Of The University Of California | Code randomization for just-in-time compilers |
US9223995B1 (en) * | 2013-12-10 | 2015-12-29 | Progress Software Corporation | Semantic obfuscation of data in real time |
US20170024230A1 (en) * | 2014-03-31 | 2017-01-26 | Yunpeng Li | Method, apparatus, and computer-readable medium for ofuscating execution of an application on a virtual machine |
RU2568282C2 (en) * | 2014-04-18 | 2015-11-20 | Закрытое акционерное общество "Лаборатория Касперского" | System and method for ensuring fault tolerance of antivirus protection realised in virtual environment |
US10048974B1 (en) | 2014-09-30 | 2018-08-14 | Amazon Technologies, Inc. | Message-based computation request scheduling |
US9600312B2 (en) | 2014-09-30 | 2017-03-21 | Amazon Technologies, Inc. | Threading as a service |
US9678773B1 (en) | 2014-09-30 | 2017-06-13 | Amazon Technologies, Inc. | Low latency computational capacity provisioning |
US9715402B2 (en) | 2014-09-30 | 2017-07-25 | Amazon Technologies, Inc. | Dynamic code deployment and versioning |
US9323556B2 (en) | 2014-09-30 | 2016-04-26 | Amazon Technologies, Inc. | Programmatic event detection and message generation for requests to execute program code |
US9830193B1 (en) | 2014-09-30 | 2017-11-28 | Amazon Technologies, Inc. | Automatic management of low latency computational capacity |
US9146764B1 (en) | 2014-09-30 | 2015-09-29 | Amazon Technologies, Inc. | Processing event messages for user requests to execute program code |
US9537788B2 (en) | 2014-12-05 | 2017-01-03 | Amazon Technologies, Inc. | Automatic determination of resource sizing |
US9588790B1 (en) | 2015-02-04 | 2017-03-07 | Amazon Technologies, Inc. | Stateful virtual compute system |
US9733967B2 (en) | 2015-02-04 | 2017-08-15 | Amazon Technologies, Inc. | Security protocols for low latency execution of program code |
CN104680042B (en) * | 2015-03-10 | 2017-10-24 | 北京深思数盾科技股份有限公司 | A kind of method and system of virtual machine performance analysis |
US9785476B2 (en) | 2015-04-08 | 2017-10-10 | Amazon Technologies, Inc. | Endpoint management system and virtual compute system |
US9930103B2 (en) | 2015-04-08 | 2018-03-27 | Amazon Technologies, Inc. | Endpoint management system providing an application programming interface proxy service |
CN105046117A (en) * | 2015-06-30 | 2015-11-11 | 西北大学 | Code virtualization software protection system realizing instruction set randomization |
CN105045605B (en) * | 2015-08-28 | 2019-05-24 | 成都卫士通信息产业股份有限公司 | A kind of method and system by DLL injection target process |
US10754701B1 (en) | 2015-12-16 | 2020-08-25 | Amazon Technologies, Inc. | Executing user-defined code in response to determining that resources expected to be utilized comply with resource restrictions |
US9811434B1 (en) | 2015-12-16 | 2017-11-07 | Amazon Technologies, Inc. | Predictive management of on-demand code execution |
US9910713B2 (en) | 2015-12-21 | 2018-03-06 | Amazon Technologies, Inc. | Code execution request routing |
US10067801B1 (en) | 2015-12-21 | 2018-09-04 | Amazon Technologies, Inc. | Acquisition and maintenance of compute capacity |
CN106960141A (en) * | 2016-01-08 | 2017-07-18 | 阿里巴巴集团控股有限公司 | Coding, coding/decoding method and the device of virtual machine instructions, virtual machine protection system |
US11132213B1 (en) | 2016-03-30 | 2021-09-28 | Amazon Technologies, Inc. | Dependency-based process of pre-existing data sets at an on demand code execution environment |
US10891145B2 (en) | 2016-03-30 | 2021-01-12 | Amazon Technologies, Inc. | Processing pre-existing data sets at an on demand code execution environment |
EP3246837A1 (en) * | 2016-05-19 | 2017-11-22 | SFNT Germany GmbH | Method to generate special purpose virtual machines |
US10102040B2 (en) | 2016-06-29 | 2018-10-16 | Amazon Technologies, Inc | Adjusting variable limit on concurrent code executions |
US10296331B2 (en) * | 2016-07-12 | 2019-05-21 | International Business Machines Corporation | Log-based software porting |
US10162605B2 (en) * | 2016-07-20 | 2018-12-25 | Microsoft Technology Licensing, Llc | Code snippet content recommendation to define an object literal |
US11023581B2 (en) | 2016-07-28 | 2021-06-01 | Hewlett-Packard Development Company, L.P. | Code package variants |
US10884787B1 (en) | 2016-09-23 | 2021-01-05 | Amazon Technologies, Inc. | Execution guarantees in an on-demand network code execution system |
US11119813B1 (en) | 2016-09-30 | 2021-09-14 | Amazon Technologies, Inc. | Mapreduce implementation using an on-demand network code execution system |
US10325148B2 (en) * | 2016-09-30 | 2019-06-18 | Wipro Limited | Method and a system for optical character recognition |
US11017125B2 (en) * | 2016-12-13 | 2021-05-25 | University Of Florida Research Foundation, Incorporated | Uniquified FPGA virtualization approach to hardware security |
US10303861B2 (en) * | 2017-01-26 | 2019-05-28 | Immunant, Inc. | Software diversification in external contexts |
RU2638000C1 (en) * | 2017-02-08 | 2017-12-08 | Акционерное общество "Лаборатория Касперского" | Method of monitoring execution system of programmable logic controller |
EP3586229A4 (en) * | 2017-02-21 | 2020-12-23 | Privacy Software Solutions Ltd. | A method and system for creating multi mobilephone environments and numbers on a single handset with a single sim-card |
US10564946B1 (en) | 2017-12-13 | 2020-02-18 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
US10831898B1 (en) | 2018-02-05 | 2020-11-10 | Amazon Technologies, Inc. | Detecting privilege escalations in code including cross-service calls |
US10733085B1 (en) | 2018-02-05 | 2020-08-04 | Amazon Technologies, Inc. | Detecting impedance mismatches due to cross-service calls |
US10725752B1 (en) | 2018-02-13 | 2020-07-28 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
US10776091B1 (en) | 2018-02-26 | 2020-09-15 | Amazon Technologies, Inc. | Logging endpoint in an on-demand code execution system |
US10853115B2 (en) | 2018-06-25 | 2020-12-01 | Amazon Technologies, Inc. | Execution of auxiliary functions in an on-demand network code execution system |
US10649749B1 (en) | 2018-06-26 | 2020-05-12 | Amazon Technologies, Inc. | Cross-environment application of tracing information for improved code execution |
US11146569B1 (en) | 2018-06-28 | 2021-10-12 | Amazon Technologies, Inc. | Escalation-resistant secure network services using request-scoped authentication information |
US10949237B2 (en) | 2018-06-29 | 2021-03-16 | Amazon Technologies, Inc. | Operating system customization in an on-demand network code execution system |
US11099870B1 (en) | 2018-07-25 | 2021-08-24 | Amazon Technologies, Inc. | Reducing execution times in an on-demand network code execution system using saved machine states |
EP3844652A4 (en) * | 2018-08-28 | 2022-06-01 | Digital Immunity, Inc. | Non-disruptive mitigation of malware attacks |
US11243953B2 (en) | 2018-09-27 | 2022-02-08 | Amazon Technologies, Inc. | Mapreduce implementation in an on-demand network code execution system and stream data processing system |
US11099917B2 (en) | 2018-09-27 | 2021-08-24 | Amazon Technologies, Inc. | Efficient state maintenance for execution environments in an on-demand code execution system |
EP3884412A1 (en) * | 2018-11-19 | 2021-09-29 | Secure Micro Ltd | Computer implemented method |
US11943093B1 (en) | 2018-11-20 | 2024-03-26 | Amazon Technologies, Inc. | Network connection recovery after virtual machine transition in an on-demand network code execution system |
US10884812B2 (en) | 2018-12-13 | 2021-01-05 | Amazon Technologies, Inc. | Performance-based hardware emulation in an on-demand network code execution system |
US11010188B1 (en) | 2019-02-05 | 2021-05-18 | Amazon Technologies, Inc. | Simulated data object storage using on-demand computation of data objects |
US11861386B1 (en) | 2019-03-22 | 2024-01-02 | Amazon Technologies, Inc. | Application gateways in an on-demand network code execution system |
US11119809B1 (en) | 2019-06-20 | 2021-09-14 | Amazon Technologies, Inc. | Virtualization-based transaction handling in an on-demand network code execution system |
US11190609B2 (en) | 2019-06-28 | 2021-11-30 | Amazon Technologies, Inc. | Connection pooling for scalable network services |
US11115404B2 (en) | 2019-06-28 | 2021-09-07 | Amazon Technologies, Inc. | Facilitating service connections in serverless code executions |
US11159528B2 (en) | 2019-06-28 | 2021-10-26 | Amazon Technologies, Inc. | Authentication to network-services using hosted authentication information |
CN110430209B (en) * | 2019-08-13 | 2021-12-14 | 中科天御(苏州)科技有限公司 | Industrial control system security defense method and device based on dynamic diversification |
US11550944B2 (en) | 2019-09-27 | 2023-01-10 | Amazon Technologies, Inc. | Code execution environment customization system for object storage service |
US11394761B1 (en) | 2019-09-27 | 2022-07-19 | Amazon Technologies, Inc. | Execution of user-submitted code on a stream of data |
US10996961B2 (en) | 2019-09-27 | 2021-05-04 | Amazon Technologies, Inc. | On-demand indexing of data in input path of object storage service |
US11656892B1 (en) | 2019-09-27 | 2023-05-23 | Amazon Technologies, Inc. | Sequential execution of user-submitted code and native functions |
US11250007B1 (en) | 2019-09-27 | 2022-02-15 | Amazon Technologies, Inc. | On-demand execution of object combination code in output path of object storage service |
US11023416B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | Data access control system for object storage service based on owner-defined code |
US11055112B2 (en) | 2019-09-27 | 2021-07-06 | Amazon Technologies, Inc. | Inserting executions of owner-specified code into input/output path of object storage service |
US11106477B2 (en) | 2019-09-27 | 2021-08-31 | Amazon Technologies, Inc. | Execution of owner-specified code during input/output path to object storage service |
US11386230B2 (en) | 2019-09-27 | 2022-07-12 | Amazon Technologies, Inc. | On-demand code obfuscation of data in input path of object storage service |
US11416628B2 (en) | 2019-09-27 | 2022-08-16 | Amazon Technologies, Inc. | User-specific data manipulation system for object storage service based on user-submitted code |
US11360948B2 (en) | 2019-09-27 | 2022-06-14 | Amazon Technologies, Inc. | Inserting owner-specified data processing pipelines into input/output path of object storage service |
US10908927B1 (en) | 2019-09-27 | 2021-02-02 | Amazon Technologies, Inc. | On-demand execution of object filter code in output path of object storage service |
US11263220B2 (en) | 2019-09-27 | 2022-03-01 | Amazon Technologies, Inc. | On-demand execution of object transformation code in output path of object storage service |
US11023311B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | On-demand code execution in input path of data uploaded to storage service in multiple data portions |
US10942795B1 (en) | 2019-11-27 | 2021-03-09 | Amazon Technologies, Inc. | Serverless call distribution to utilize reserved capacity without inhibiting scaling |
US11119826B2 (en) | 2019-11-27 | 2021-09-14 | Amazon Technologies, Inc. | Serverless call distribution to implement spillover while avoiding cold starts |
CN113031930B (en) * | 2019-12-24 | 2022-07-05 | 武汉斗鱼鱼乐网络科技有限公司 | Source code confusion generation method and device for control flow flattening |
US11714682B1 (en) | 2020-03-03 | 2023-08-01 | Amazon Technologies, Inc. | Reclaiming computing resources in an on-demand code execution system |
US11188391B1 (en) | 2020-03-11 | 2021-11-30 | Amazon Technologies, Inc. | Allocating resources to on-demand code executions under scarcity conditions |
CN111314377B (en) * | 2020-03-17 | 2023-04-07 | 中科天御(苏州)科技有限公司 | Dynamic diversified cloud security method and system for industrial control terminal |
US11775640B1 (en) | 2020-03-30 | 2023-10-03 | Amazon Technologies, Inc. | Resource utilization-based malicious task detection in an on-demand code execution system |
US11593270B1 (en) | 2020-11-25 | 2023-02-28 | Amazon Technologies, Inc. | Fast distributed caching using erasure coded object parts |
US11550713B1 (en) | 2020-11-25 | 2023-01-10 | Amazon Technologies, Inc. | Garbage collection in distributed systems using life cycled storage roots |
KR102305845B1 (en) | 2020-12-21 | 2021-09-29 | 쿠팡 주식회사 | Electronic apparatus for verifying code and method thereof |
US11388210B1 (en) | 2021-06-30 | 2022-07-12 | Amazon Technologies, Inc. | Streaming analytics using a serverless compute system |
CN114707124B (en) * | 2022-03-22 | 2022-11-29 | 广东技术师范大学 | NET platform code protection method and system based on code virtualization |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7051200B1 (en) * | 2000-06-27 | 2006-05-23 | Microsoft Corporation | System and method for interfacing a software process to secure repositories |
US20060136867A1 (en) * | 2004-12-17 | 2006-06-22 | Manfred Schneider | Code diversification |
Family Cites Families (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6006328A (en) * | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
US6151618A (en) * | 1995-12-04 | 2000-11-21 | Microsoft Corporation | Safe general purpose virtual machine computing system |
US6049863A (en) * | 1996-07-24 | 2000-04-11 | Advanced Micro Devices, Inc. | Predecoding technique for indicating locations of opcode bytes in variable byte-length instructions within a superscalar microprocessor |
DE69839913D1 (en) * | 1997-10-02 | 2008-10-02 | Koninkl Philips Electronics Nv | DATA PROCESSING DEVICE FOR PROCESSING COMMAND |
DE69836902T2 (en) * | 1997-10-02 | 2007-10-18 | Koninklijke Philips Electronics N.V. | COMPUTER SETTING ON VARIABLE INSTRUCTIONS |
US6643775B1 (en) * | 1997-12-05 | 2003-11-04 | Jamama, Llc | Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications |
US6092202A (en) * | 1998-05-22 | 2000-07-18 | N*Able Technologies, Inc. | Method and system for secure transactions in a computer system |
US6594761B1 (en) * | 1999-06-09 | 2003-07-15 | Cloakware Corporation | Tamper resistant software encoding |
US6832367B1 (en) * | 2000-03-06 | 2004-12-14 | International Business Machines Corporation | Method and system for recording and replaying the execution of distributed java programs |
US7093239B1 (en) * | 2000-07-14 | 2006-08-15 | Internet Security Systems, Inc. | Computer immune system and method for detecting unwanted code in a computer system |
US20030023960A1 (en) * | 2001-07-25 | 2003-01-30 | Shoab Khan | Microprocessor instruction format using combination opcodes and destination prefixes |
US7613930B2 (en) * | 2001-01-19 | 2009-11-03 | Trustware International Limited | Method for protecting computer programs and data from hostile code |
US7065755B2 (en) * | 2001-03-15 | 2006-06-20 | Sun Microsystems, Inc. | Method and apparatus for removing class initialization barriers from shared compiled methods |
US7543288B2 (en) * | 2001-03-27 | 2009-06-02 | Sun Microsystems, Inc. | Reduced instruction set for Java virtual machines |
US7320075B2 (en) * | 2001-11-20 | 2008-01-15 | Safenet, Inc. | Software protection method utilizing hidden application code in a protection dynamic link library object |
US20030135719A1 (en) * | 2002-01-14 | 2003-07-17 | International Business Machines Corporation | Method and system using hardware assistance for tracing instruction disposition information |
US8843903B1 (en) * | 2003-06-11 | 2014-09-23 | Symantec Corporation | Process tracking application layered system |
AU2003272035A1 (en) * | 2002-11-20 | 2004-06-15 | Koninklijke Philips Electronics N.V. | Vliw processor with copy register file |
US7150003B2 (en) * | 2002-11-25 | 2006-12-12 | Matsushita Electric Industrial Co., Ltd. | Class coalescence for obfuscation of object-oriented software |
US20040117532A1 (en) * | 2002-12-11 | 2004-06-17 | Bennett Steven M. | Mechanism for controlling external interrupts in a virtual machine system |
US7162711B2 (en) * | 2002-12-12 | 2007-01-09 | Sun Microsystems, Inc. | Method of automatically virtualizing core native libraries of a virtual machine |
KR100568228B1 (en) | 2003-05-20 | 2006-04-07 | 삼성전자주식회사 | Method for resisting program tampering using serial number and for upgrading obfuscated program, and apparatus for the same |
US7707566B2 (en) * | 2003-06-26 | 2010-04-27 | Microsoft Corporation | Software development infrastructure |
US7260815B1 (en) * | 2003-06-30 | 2007-08-21 | Vmware, Inc. | Method and apparatus for managing registers in a binary translator |
US9020801B2 (en) * | 2003-08-11 | 2015-04-28 | Scalemp Inc. | Cluster-based operating system-agnostic virtual computing system |
GB2405958A (en) * | 2003-08-20 | 2005-03-16 | Macrovision Europ Ltd | Code obfuscation and controlling a processor by emulation |
US20050066324A1 (en) | 2003-09-22 | 2005-03-24 | Microsoft Corporation | Method and system for distributing and installing software |
US8220058B2 (en) * | 2003-09-25 | 2012-07-10 | Oracle America, Inc. | Rendering and encryption engine for application program obfuscation |
US7114055B1 (en) * | 2003-09-29 | 2006-09-26 | Xilinx, Inc. | Reduced instruction set computer architecture with duplication of bit values from an immediate field of an instruction multiple times in a data word |
US7376949B2 (en) * | 2003-10-01 | 2008-05-20 | Hewlett-Packard Development Company, L.P. | Resource allocation and protection in a multi-virtual environment |
US20050091658A1 (en) | 2003-10-24 | 2005-04-28 | Microsoft Corporation | Operating system resource protection |
US7421689B2 (en) * | 2003-10-28 | 2008-09-02 | Hewlett-Packard Development Company, L.P. | Processor-architecture for facilitating a virtual machine monitor |
US20050108440A1 (en) * | 2003-11-19 | 2005-05-19 | Intel Corporation | Method and system for coalescing input output accesses to a virtual device |
US7516331B2 (en) | 2003-11-26 | 2009-04-07 | International Business Machines Corporation | Tamper-resistant trusted java virtual machine and method of using the same |
US20050177826A1 (en) * | 2004-02-05 | 2005-08-11 | Miller James S. | Versioning support in object-oriented programming languages and tools |
JP3970856B2 (en) | 2004-03-16 | 2007-09-05 | Kddi株式会社 | Program obfuscation device, program distribution system, computer program |
US20050216920A1 (en) * | 2004-03-24 | 2005-09-29 | Vijay Tewari | Use of a virtual machine to emulate a hardware device |
US7631360B2 (en) | 2004-06-12 | 2009-12-08 | Microsoft Corporation | Hardware protection |
US7590867B2 (en) * | 2004-06-24 | 2009-09-15 | Intel Corporation | Method and apparatus for providing secure virtualization of a trusted platform module |
US8271976B2 (en) * | 2004-06-30 | 2012-09-18 | Microsoft Corporation | Systems and methods for initializing multiple virtual processors within a single virtual machine |
EP1669864B1 (en) * | 2004-12-03 | 2010-06-02 | STMicroelectronics Srl | A process for managing virtual machines in a physical processing machine, corresponding processor system and computer program product therefor |
US7472381B2 (en) * | 2004-12-07 | 2008-12-30 | Roaming Messenger, Inc. | Method of and instruction set for executing operations on a device |
US7409719B2 (en) * | 2004-12-21 | 2008-08-05 | Microsoft Corporation | Computer security management, such as in a virtual machine or hardened operating system |
US8370819B2 (en) * | 2005-03-25 | 2013-02-05 | Microsoft Corporation | Mechanism to store information describing a virtual machine in a virtual disk image |
US8312297B2 (en) * | 2005-04-21 | 2012-11-13 | Panasonic Corporation | Program illegiblizing device and method |
US20070022275A1 (en) * | 2005-07-25 | 2007-01-25 | Mistletoe Technologies, Inc. | Processor cluster implementing conditional instruction skip |
US7581085B1 (en) * | 2005-09-08 | 2009-08-25 | Parallels Software International, Inc. | Fast stub and frame technology for virtual machine optimization |
US8429630B2 (en) * | 2005-09-15 | 2013-04-23 | Ca, Inc. | Globally distributed utility computing cloud |
US8104033B2 (en) * | 2005-09-30 | 2012-01-24 | Computer Associates Think, Inc. | Managing virtual machines based on business priorty |
US7882499B2 (en) * | 2005-10-24 | 2011-02-01 | Microsoft Corporation | Caching dynamically compiled code to storage |
US8417796B2 (en) * | 2006-01-17 | 2013-04-09 | Leostream Corporation | System and method for transferring a computing environment between computers of dissimilar configurations |
US8296742B2 (en) * | 2006-10-10 | 2012-10-23 | Microsoft Corporation | Automatic native generation |
US8584109B2 (en) | 2006-10-27 | 2013-11-12 | Microsoft Corporation | Virtualization for diversified tamper resistance |
US8078577B2 (en) * | 2008-04-07 | 2011-12-13 | Installfree, Inc. | Method of bi-directional synchronization of user data |
-
2006
- 2006-10-27 US US11/553,841 patent/US8584109B2/en active Active
-
2007
- 2007-10-12 TW TW096138284A patent/TWI431500B/en not_active IP Right Cessation
- 2007-10-16 MY MYPI20091258 patent/MY151697A/en unknown
- 2007-10-16 BR BRPI0716471-8A2A patent/BRPI0716471A2/en not_active IP Right Cessation
- 2007-10-16 EP EP07874416.6A patent/EP2076863B1/en active Active
- 2007-10-16 RU RU2009115656/08A patent/RU2458394C2/en not_active IP Right Cessation
- 2007-10-16 AU AU2007349213A patent/AU2007349213B2/en active Active
- 2007-10-16 MX MX2009003342A patent/MX2009003342A/en not_active Application Discontinuation
- 2007-10-16 WO PCT/US2007/081485 patent/WO2008115279A2/en active Application Filing
- 2007-10-16 CA CA2662558A patent/CA2662558C/en active Active
- 2007-10-16 ES ES07874416.6T patent/ES2675371T3/en active Active
- 2007-10-16 CN CN2007800396079A patent/CN101529436B/en active Active
- 2007-10-16 KR KR1020097005677A patent/KR101440646B1/en active IP Right Grant
- 2007-10-16 JP JP2009534768A patent/JP5302202B2/en active Active
-
2009
- 2009-03-03 IL IL197361A patent/IL197361A0/en unknown
- 2009-03-30 NO NO20091281A patent/NO344529B1/en unknown
-
2013
- 2013-11-11 US US14/076,685 patent/US9459893B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7051200B1 (en) * | 2000-06-27 | 2006-05-23 | Microsoft Corporation | System and method for interfacing a software process to secure repositories |
US20060136867A1 (en) * | 2004-12-17 | 2006-06-22 | Manfred Schneider | Code diversification |
Non-Patent Citations (2)
Title |
---|
LINGER R.C.: "Systematic generation of stochastic diversity as an intrusion barrier in survivable system software", PROCEEDINGS OF THE 32ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, January 1999 (1999-01-01), XP010338827 * |
MICHAEL C.C. ET AL.: "Two Systems for Automatic Software Diversification", PROCEEDINGS OF 2000 DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, vol. 2, January 2000 (2000-01-01), pages 220 - 230, XP010371139 * |
Also Published As
Publication number | Publication date |
---|---|
IL197361A0 (en) | 2009-12-24 |
AU2007349213B2 (en) | 2011-10-06 |
US8584109B2 (en) | 2013-11-12 |
ES2675371T3 (en) | 2018-07-10 |
NO20091281L (en) | 2009-05-22 |
EP2076863A4 (en) | 2013-09-04 |
MX2009003342A (en) | 2009-05-12 |
CA2662558A1 (en) | 2008-09-25 |
CN101529436B (en) | 2012-12-12 |
JP2010508583A (en) | 2010-03-18 |
RU2458394C2 (en) | 2012-08-10 |
NO344529B1 (en) | 2020-01-27 |
KR20090082176A (en) | 2009-07-29 |
WO2008115279A2 (en) | 2008-09-25 |
TW200832179A (en) | 2008-08-01 |
JP5302202B2 (en) | 2013-10-02 |
CA2662558C (en) | 2015-12-01 |
AU2007349213A1 (en) | 2008-09-25 |
TWI431500B (en) | 2014-03-21 |
US20140068580A1 (en) | 2014-03-06 |
BRPI0716471A2 (en) | 2014-03-18 |
US9459893B2 (en) | 2016-10-04 |
RU2009115656A (en) | 2010-10-27 |
EP2076863B1 (en) | 2018-05-02 |
KR101440646B1 (en) | 2014-09-22 |
MY151697A (en) | 2014-06-30 |
CN101529436A (en) | 2009-09-09 |
EP2076863A2 (en) | 2009-07-08 |
US20080127125A1 (en) | 2008-05-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008115279A3 (en) | Virtualization for diversified tamper resistance | |
EP1732004A4 (en) | Computer system, server constituting the same, job execution control method thereof, and program | |
TW200627275A (en) | Computer security management, such as in a virtual machine or hardened operating system | |
WO2016094840A3 (en) | System, method & computer readable medium for software protection via composable process-level virtual machines | |
TWI370368B (en) | Method and system for a runtime user account creation operation within a single-sign-on process in a federated computing environment | |
WO2008032200A8 (en) | Method, apparatus and computer program product for providing standard real world to virtual world links | |
WO2008002730A3 (en) | Method and system for rapidly developing and deploying sens0r-enabled software applications | |
WO2008000502A3 (en) | Using status models having status derivations in a computer system | |
WO2007095552A3 (en) | System and method for generating and executing a platform emulation based on a selected application | |
IN2014KN02671A (en) | ||
WO2009073156A3 (en) | Enhanced data exchange and functionality control system and method | |
WO2007021704A3 (en) | Application acceleration using heterogeneous processors | |
NL1032187A1 (en) | Method for generating a mask pattern, system for generating a mask pattern and computer program product. | |
WO2009094582A3 (en) | Methods and systems for provisioning a virtual disk to diskless virtual and physical machines | |
WO2009006026A3 (en) | Progressively implementing declarative models in distributed systems | |
WO2011020954A3 (en) | Automated processing of multi-usage data, implementing functions requiring various levels of security or limits of responsibility | |
WO2006113291A3 (en) | Registration of applications and complimentary features for interactive user interfaces | |
WO2008024743A3 (en) | Secure web application development and execution environment | |
WO2012088171A3 (en) | Method for checkpointing and restoring program state | |
WO2007112406A3 (en) | Programming a multi-processor system | |
EP2645236A3 (en) | Semiconductor device | |
WO2008157128A3 (en) | Methods, systems, and computer program products for tokenized domain name resolution | |
DE502006000163D1 (en) | DEVICE AND METHOD FOR CONTROLLING A WAVE FIELD SYNTHESIS RENDERING DEVICE | |
WO2006031821A3 (en) | System, method, and computer program product for machine tool programming | |
TW200731133A (en) | Firmware filters and patches |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780039607.9 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07874416 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007874416 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007349213 Country of ref document: AU |
|
ENP | Entry into the national phase |
Ref document number: 2662558 Country of ref document: CA |
|
ENP | Entry into the national phase |
Ref document number: 2007349213 Country of ref document: AU Date of ref document: 20071016 Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020097005677 Country of ref document: KR |
|
ENP | Entry into the national phase |
Ref document number: 2009534768 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2009/003342 Country of ref document: MX |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1929/CHENP/2009 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2009115656 Country of ref document: RU Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: PI0716471 Country of ref document: BR Kind code of ref document: A2 Effective date: 20090304 |