ATE456837T1 - Verschleierung von ausführungsspuren eines computerprogrammcodes - Google Patents
Verschleierung von ausführungsspuren eines computerprogrammcodesInfo
- Publication number
- ATE456837T1 ATE456837T1 AT07388048T AT07388048T ATE456837T1 AT E456837 T1 ATE456837 T1 AT E456837T1 AT 07388048 T AT07388048 T AT 07388048T AT 07388048 T AT07388048 T AT 07388048T AT E456837 T1 ATE456837 T1 AT E456837T1
- Authority
- AT
- Austria
- Prior art keywords
- execution
- program code
- computer program
- occasioning
- traces
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Mathematical Physics (AREA)
- Stored Programmes (AREA)
- Devices For Executing Special Programs (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP07388048A EP2009572B1 (de) | 2007-06-29 | 2007-06-29 | Verschleierung von Ausführungsspuren eines Computerprogrammcodes |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE456837T1 true ATE456837T1 (de) | 2010-02-15 |
Family
ID=38683575
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT07388048T ATE456837T1 (de) | 2007-06-29 | 2007-06-29 | Verschleierung von ausführungsspuren eines computerprogrammcodes |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US8522047B2 (de) |
| EP (1) | EP2009572B1 (de) |
| CN (1) | CN101689232B (de) |
| AT (1) | ATE456837T1 (de) |
| DE (1) | DE602007004587D1 (de) |
| ES (1) | ES2340086T3 (de) |
| WO (1) | WO2009003894A1 (de) |
Families Citing this family (45)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8434059B2 (en) | 2009-05-01 | 2013-04-30 | Apple Inc. | Systems, methods, and computer-readable media for fertilizing machine-executable code |
| JP5185242B2 (ja) * | 2009-12-04 | 2013-04-17 | 株式会社東芝 | コンパイル装置 |
| US9134977B2 (en) * | 2010-02-26 | 2015-09-15 | Red Hat, Inc. | Compiler operation for handling conditional statements |
| EP2402880A1 (de) * | 2010-07-01 | 2012-01-04 | Aladdin Europe GmbH | Verfahren und Vorrichtung zum selektiven Schutz von einem von mehreren Verfahren einer in objektorientierter Sprache geschriebenen Anwendungsklasse |
| CA2806768C (en) * | 2010-07-29 | 2018-07-03 | Irdeto Canada Corporation | System and method for efficiently deploying massively diverse program instances to resist differential attacks |
| US20130014267A1 (en) * | 2011-07-07 | 2013-01-10 | Farrugia Augustin J | Computer protocol generation and obfuscation |
| US9111072B1 (en) * | 2011-08-23 | 2015-08-18 | Tectonic Labs, LLC | Anti-reverse engineering unified process |
| WO2013054248A1 (en) * | 2011-10-12 | 2013-04-18 | International Business Machines Corporation | Generating a predictive data structure |
| EP2648125B1 (de) * | 2012-03-05 | 2014-11-19 | Steinberg Media Technologies GmbH | Verfahren zur Autorisierung eines Programmablaufs |
| CN104662549B (zh) * | 2012-03-30 | 2019-02-19 | 爱迪德技术有限公司 | 使用交叉链接来保护可访问的系统 |
| US9400639B2 (en) * | 2012-06-22 | 2016-07-26 | Microsoft Technology Licensing, Llc | Generating programs using context-free compositions and probability of determined transformation rules |
| DE102012015897A1 (de) * | 2012-08-10 | 2014-02-13 | Giesecke & Devrient Gmbh | Verfahren zum Ausführen vom Programmcode |
| DE102012015899A1 (de) * | 2012-08-10 | 2014-02-13 | Giesecke & Devrient Gmbh | Verfahren zum Erzeugen von ausführbarem Programmcode |
| US9207923B2 (en) | 2013-06-18 | 2015-12-08 | International Business Machines Corporation | Compiler optimization for memoization of pure function arguments |
| US9547758B2 (en) * | 2014-05-19 | 2017-01-17 | Nxp B.V. | Program cable obfuscation based upon recently executed program code |
| US9454470B2 (en) | 2015-02-10 | 2016-09-27 | International Business Machines Corporation | Sharing and executing sensitive logic semantics |
| CN106407754B (zh) * | 2015-07-30 | 2021-06-18 | 中兴通讯股份有限公司 | 一种生成随机布局程序的方法及装置 |
| CN106919833A (zh) * | 2015-12-28 | 2017-07-04 | 上海华虹集成电路有限责任公司 | 安全芯片中防止功耗泄露的方法 |
| US11002829B2 (en) * | 2016-04-15 | 2021-05-11 | Mediatek Inc. | Radar interference mitigation method and apparatus |
| US10394554B1 (en) * | 2016-09-09 | 2019-08-27 | Stripe, Inc. | Source code extraction via monitoring processing of obfuscated byte code |
| CN106548046B (zh) * | 2016-10-25 | 2020-11-20 | 北京纬百科技有限公司 | 一种保护代码的装置和方法 |
| US10261763B2 (en) | 2016-12-13 | 2019-04-16 | Palantir Technologies Inc. | Extensible data transformation authoring and validation system |
| EP3355219A1 (de) * | 2017-01-26 | 2018-08-01 | Gemalto Sa | Verfahren zur sicherung eines softwarecodes |
| US9934127B1 (en) | 2017-03-08 | 2018-04-03 | Microsoft Technology Licensing, Llc | Indexing a trace by insertion of key frames for replay responsiveness |
| US10185645B2 (en) | 2017-03-08 | 2019-01-22 | Microsoft Technology Licensing, Llc | Resource lifetime analysis using a time-travel trace |
| US9959194B1 (en) | 2017-03-08 | 2018-05-01 | Microsoft Technology Licensing, Llc | Indexing a trace by insertion of memory snapshots for replay responsiveness |
| US9983978B1 (en) | 2017-03-08 | 2018-05-29 | Microsoft Technology Licensing, Llc | Querying an indexed time-travel trace |
| US9934126B1 (en) | 2017-03-08 | 2018-04-03 | Microsoft Technology Licensing, Llc | Indexing a trace by insertion of reverse lookup data structures |
| US10282274B2 (en) | 2017-06-14 | 2019-05-07 | Microsoft Technology Licensing, Llc | Presenting differences between code entity invocations |
| CN107506651B (zh) * | 2017-07-04 | 2021-10-22 | 环玺信息科技(上海)有限公司 | 一种代码加密方法及系统 |
| CN107357706B (zh) * | 2017-07-17 | 2021-01-08 | 深圳天珑无线科技有限公司 | 数据处理方法、装置及非临时性计算机可读介质 |
| US12007908B2 (en) * | 2017-12-14 | 2024-06-11 | Arris Enterprises Llc | Method and apparatus to dynamically encode data at runtime |
| US10481998B2 (en) * | 2018-03-15 | 2019-11-19 | Microsoft Technology Licensing, Llc | Protecting sensitive information in time travel trace debugging |
| CN111310172B (zh) * | 2018-12-12 | 2022-03-11 | 北京忆芯科技有限公司 | 通过反汇编验证处理器执行轨迹的方法及控制部件 |
| EP3671497A1 (de) * | 2018-12-18 | 2020-06-24 | Koninklijke Philips N.V. | Geschützte verarbeitung von operationen |
| GB201821248D0 (en) | 2018-12-27 | 2019-02-13 | Palantir Technologies Inc | Data pipeline management system and method |
| CN112711427B (zh) * | 2019-10-24 | 2025-03-25 | 华为技术有限公司 | 一种镜像文件的获取方法以及装置 |
| CN112860262B (zh) * | 2021-02-09 | 2024-06-07 | 上海商汤智能科技有限公司 | 一种代码解析的方法、装置、电子设备及存储介质 |
| EP4315140B1 (de) * | 2021-03-26 | 2025-09-24 | Verimatrix UK Ltd | Eingabegesteuerte ausführungsrandomisierung |
| LU500189B1 (en) | 2021-05-21 | 2022-11-21 | Microsoft Technology Licensing Llc | Using entropy to prevent inclusion of payload data in code execution log data |
| CN113987983B (zh) * | 2021-11-17 | 2024-11-08 | 首都师范大学 | 一种Ptolemy同步响应模型翻译的验证方法及插件 |
| EP4195579A1 (de) * | 2021-12-07 | 2023-06-14 | Thales Dis France SAS | Asynchrone codeausführung für verbesserte leistung und sicherheitsmassnahmen für digitale sicherheitsvorrichtungen |
| CN114021200B (zh) * | 2022-01-07 | 2022-04-15 | 每日互动股份有限公司 | 一种用于pkg模糊化的数据处理系统 |
| CN115795418B (zh) * | 2023-01-17 | 2023-04-14 | 泉州艾奇科技有限公司 | 水印嵌入方法、装置、计算机、存储介质 |
| CN120850259A (zh) * | 2025-07-21 | 2025-10-28 | 烟台海颐软件股份有限公司 | 基于指令驱动的Java运行时业务逻辑保护方法及系统 |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6668325B1 (en) * | 1997-06-09 | 2003-12-23 | Intertrust Technologies | Obfuscation techniques for enhancing software security |
| US7430670B1 (en) * | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
| AU6750700A (en) * | 1999-07-30 | 2001-02-19 | Intertrust Technologies Corp. | Methods and systems for transaction record delivery using thresholds and multi-stage protocol |
| US6829710B1 (en) * | 2000-03-14 | 2004-12-07 | Microsoft Corporation | Technique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed |
| US7343494B2 (en) * | 2001-08-01 | 2008-03-11 | Sas Validy | Method to protect software against unwanted use with a “renaming” principle |
| US7228426B2 (en) * | 2002-04-03 | 2007-06-05 | Microsoft Corporation | Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context |
| US8332652B2 (en) * | 2003-10-01 | 2012-12-11 | International Business Machines Corporation | Computing device that securely runs authorized software |
-
2007
- 2007-06-29 AT AT07388048T patent/ATE456837T1/de not_active IP Right Cessation
- 2007-06-29 DE DE602007004587T patent/DE602007004587D1/de active Active
- 2007-06-29 EP EP07388048A patent/EP2009572B1/de active Active
- 2007-06-29 ES ES07388048T patent/ES2340086T3/es active Active
-
2008
- 2008-06-25 US US12/664,893 patent/US8522047B2/en active Active
- 2008-06-25 WO PCT/EP2008/058091 patent/WO2009003894A1/en not_active Ceased
- 2008-06-25 CN CN2008800227732A patent/CN101689232B/zh active Active
Also Published As
| Publication number | Publication date |
|---|---|
| WO2009003894A1 (en) | 2009-01-08 |
| CN101689232A (zh) | 2010-03-31 |
| EP2009572A1 (de) | 2008-12-31 |
| ES2340086T3 (es) | 2010-05-28 |
| US8522047B2 (en) | 2013-08-27 |
| US20100262839A1 (en) | 2010-10-14 |
| EP2009572B1 (de) | 2010-01-27 |
| CN101689232B (zh) | 2013-05-22 |
| DE602007004587D1 (de) | 2010-03-18 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE456837T1 (de) | Verschleierung von ausführungsspuren eines computerprogrammcodes | |
| Katsifodimos et al. | Apache flink: Stream analytics at scale | |
| ATE432507T1 (de) | Verschleierung von computerprogrammcodes | |
| ATE438151T1 (de) | Verschleierung von computerprogrammcodes | |
| RU2015142982A (ru) | Компиляция преобразований в пользовательском интерфейсе повторных вычислений | |
| WO2009102903A3 (en) | Systems and methods for information flow analysis | |
| GB2429554A (en) | Method and apparatus to vectorize multiple input instructions | |
| WO2011116987A8 (en) | A method for automatically generating a trace data set for a software system, a computer system, and a computer program product | |
| ATE477539T1 (de) | Verfahren, system und computerprogramm zum prüfen von softwareanwendungen auf der basis mehrerer datenquellen | |
| JP2013539888A5 (de) | ||
| ATE519154T1 (de) | Vorrichtung und verfahren zur durchführung von permutationsoperationen auf daten | |
| DE602006003705D1 (de) | Transformation von Prozessmodellen für ereignis-basierte Koordination von zusammengesetzten Anwendungen | |
| JP2016509714A5 (de) | ||
| Alizadehsani et al. | Modern integrated development environment (ides) | |
| ATE454673T1 (de) | Wasserzeichenmarkierung eines computerprogrammcodes mittels äquivalenter mathematischer ausdrücke | |
| WO2006083046A3 (en) | Methods and apparatus for providing a task change application programming interface | |
| DE602006014415D1 (de) | Synchronisierung und paralleles Ausführen von Kontrollfluss und Datenfluss auf Task-Ebene | |
| DE602006002874D1 (de) | Verfahren zur optimierung des protokollierens und wiederabspielens von multitask-anwendungen in einem einzelprozessor- oder mehrprozessor-computersystem | |
| WO2008078322A3 (en) | Method for ensuring unique identification of program elements across multiple executions | |
| ATE399340T1 (de) | Rechnersystem und verfahren zum bewirken von veränderungen in einer softwaresystemlandschaft | |
| DE502005000908D1 (de) | Mechanismus zum dynamischen Registrieren von Dateien in einer stapelverarbeitungsorientierten Umgebung | |
| FI20135946A7 (fi) | Rinnakkainen ratkaisun muodostaminen | |
| IN2014CH02634A (de) | ||
| UA119058U (uk) | Процес обробляння даних з використанням універсального обчислювального елемента (уое) | |
| ATE541763T1 (de) | Verfahren zur erhöhung der genauigkeit einer positionsverfolgung von fahrzeugen in softwarebasierten steuerungssystemen |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |