IN2012DN02458A - - Google Patents
Download PDFInfo
- Publication number
- IN2012DN02458A IN2012DN02458A IN2458DEN2012A IN2012DN02458A IN 2012DN02458 A IN2012DN02458 A IN 2012DN02458A IN 2458DEN2012 A IN2458DEN2012 A IN 2458DEN2012A IN 2012DN02458 A IN2012DN02458 A IN 2012DN02458A
- Authority
- IN
- India
- Prior art keywords
- modules
- security
- weaknesses
- secures
- implementation
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Devices For Executing Special Programs (AREA)
- Storage Device Security (AREA)
Abstract
A method and system that provides secure modules that can address Java platform weaknesses and protect Java bytecode during execution time. The secure modules are implemented in C/C++ as an example. Because implementation of the security modules is made in C/C++, this enables use of security technology that secures C/C++ software code.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US26088709P | 2009-11-13 | 2009-11-13 | |
| PCT/CA2010/001761 WO2011057393A1 (en) | 2009-11-13 | 2010-11-12 | System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IN2012DN02458A true IN2012DN02458A (en) | 2015-08-21 |
Family
ID=43991129
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN2458DEN2012 IN2012DN02458A (en) | 2009-11-13 | 2010-11-12 |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US9213826B2 (en) |
| EP (2) | EP3923165A1 (en) |
| JP (1) | JP5689472B2 (en) |
| KR (1) | KR20130018642A (en) |
| CN (1) | CN102598017B (en) |
| CA (1) | CA2774728C (en) |
| IN (1) | IN2012DN02458A (en) |
| WO (1) | WO2011057393A1 (en) |
Families Citing this family (63)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8424082B2 (en) * | 2008-05-08 | 2013-04-16 | Google Inc. | Safely executing an untrusted native code module on a computing device |
| EP2402880A1 (en) * | 2010-07-01 | 2012-01-04 | Aladdin Europe GmbH | Method and device for selectively protecting one of a plurality of methods of a class of an application written in an object-orientated language |
| FR2967275B1 (en) * | 2010-11-10 | 2012-12-28 | Oberthur Technologies | METHOD, COMPUTER PROGRAM AND DEVICE FOR SECURING INTERMEDIATE PROGRAMMING CODE FOR ITS EXECUTION BY A VIRTUAL MACHINE |
| US9473485B2 (en) | 2011-03-21 | 2016-10-18 | Blue Cedar Networks, Inc. | Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing |
| US9396325B2 (en) | 2011-03-21 | 2016-07-19 | Mocana Corporation | Provisioning an app on a device and implementing a keystore |
| US8812868B2 (en) | 2011-03-21 | 2014-08-19 | Mocana Corporation | Secure execution of unsecured apps on a device |
| US8955142B2 (en) * | 2011-03-21 | 2015-02-10 | Mocana Corporation | Secure execution of unsecured apps on a device |
| AU2011363943A1 (en) * | 2011-03-31 | 2013-10-24 | Irdeto B.V. | Method of securing non-native code |
| CN104137079A (en) * | 2011-09-30 | 2014-11-05 | 纽曼无限公司 | Apparatus, method and computer-readable storage medium for securing javascript |
| US9021271B1 (en) * | 2011-12-27 | 2015-04-28 | Emc Corporation | Injecting code decrypted by a hardware decryption module into Java applications |
| KR101944010B1 (en) * | 2012-02-24 | 2019-01-30 | 삼성전자 주식회사 | Method and apparatus for detecting tampered application |
| CN104321782B (en) * | 2012-03-30 | 2018-01-12 | 爱迪德技术有限公司 | The safety execution of web applications |
| US10699017B2 (en) | 2013-02-28 | 2020-06-30 | Micro Focus Llc | Determining coverage of dynamic security scans using runtime and static code analyses |
| US9141823B2 (en) * | 2013-03-15 | 2015-09-22 | Veridicom, Sa De Cv | Abstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation |
| KR101500512B1 (en) * | 2013-05-15 | 2015-03-18 | 소프트캠프(주) | Device and method for securing computer |
| US9378034B2 (en) | 2013-05-16 | 2016-06-28 | Sap Se | Dynamic bytecode modification of classes and class hierarchies |
| US8943592B1 (en) | 2013-07-15 | 2015-01-27 | Eset, Spol. S.R.O. | Methods of detection of software exploitation |
| KR101350390B1 (en) * | 2013-08-14 | 2014-01-16 | 숭실대학교산학협력단 | A apparatus for code obfuscation and method thereof |
| KR101471589B1 (en) * | 2013-08-22 | 2014-12-10 | (주)잉카엔트웍스 | Method for Providing Security for Common Intermediate Language Program |
| KR101490047B1 (en) * | 2013-09-27 | 2015-02-04 | 숭실대학교산학협력단 | Apparatus for tamper protection of application code based on self modification and method thereof |
| US9805114B2 (en) | 2013-09-30 | 2017-10-31 | Microsoft Technology Licensing, Llc | Composable selection model through reusable component |
| US9740854B2 (en) * | 2013-10-25 | 2017-08-22 | Red Hat, Inc. | System and method for code protection |
| KR101556908B1 (en) * | 2013-11-14 | 2015-10-02 | (주)잉카엔트웍스 | Apparatus For Protecting Binary Code |
| GB201405754D0 (en) * | 2014-03-31 | 2014-05-14 | Irdeto Bv | Protecting an item of software comprising conditional code |
| KR101566142B1 (en) * | 2014-10-21 | 2015-11-06 | 숭실대학교산학협력단 | User Terminal and Method for Protecting Core Codes of Applications Using the same |
| CN104375938B (en) * | 2014-11-20 | 2017-09-05 | 工业和信息化部电信研究院 | Android application dynamic behavior monitoring method and system |
| EP3026559A1 (en) * | 2014-11-28 | 2016-06-01 | Thomson Licensing | Method and device for providing verifying application integrity |
| US10205710B2 (en) * | 2015-01-08 | 2019-02-12 | Intertrust Technologies Corporation | Cryptographic systems and methods |
| WO2016139078A1 (en) * | 2015-03-02 | 2016-09-09 | Inventio Ag | Protecting a computer program against reverse engineering |
| US9460284B1 (en) * | 2015-06-12 | 2016-10-04 | Bitdefender IPR Management Ltd. | Behavioral malware detection using an interpreter virtual machine |
| KR101740134B1 (en) * | 2015-08-10 | 2017-05-26 | 라인 가부시키가이샤 | System and method for application code obfuscation |
| KR101740133B1 (en) * | 2015-08-10 | 2017-05-26 | 라인 가부시키가이샤 | System and method for protecting code of application |
| WO2017056194A1 (en) * | 2015-09-29 | 2017-04-06 | 株式会社 東芝 | Information device, information communication terminal, and information processing method |
| WO2017102879A1 (en) * | 2015-12-15 | 2017-06-22 | Koninklijke Philips N.V. | A computation device and method |
| EP3188063A1 (en) * | 2015-12-29 | 2017-07-05 | GuardSquare NV | A build system |
| NL2016556B1 (en) * | 2016-04-05 | 2018-02-09 | Mi Group B V | Aircraft information system and method. |
| US10073975B2 (en) | 2016-08-11 | 2018-09-11 | International Business Machines Corporation | Application integrity verification in multi-tier architectures |
| US10394554B1 (en) * | 2016-09-09 | 2019-08-27 | Stripe, Inc. | Source code extraction via monitoring processing of obfuscated byte code |
| US11423140B1 (en) * | 2017-03-27 | 2022-08-23 | Melih Abdulhayoglu | Auto-containment of guest user applications |
| US10951644B1 (en) | 2017-04-07 | 2021-03-16 | Comodo Security Solutions, Inc. | Auto-containment of potentially vulnerable applications |
| CN107294702B (en) * | 2017-07-17 | 2020-04-28 | 四川长虹电器股份有限公司 | Front-end code encryption method based on Hybrid APP self characteristics |
| EP3665566A4 (en) | 2017-08-08 | 2021-04-21 | Crypto4A Technologies Inc. | SECURE MACHINE-EXECUTED CODE DEPLOYMENT AND EXECUTION PROCESS AND SYSTEM |
| CN107480478B (en) * | 2017-08-14 | 2019-08-13 | 钟尚亮 | A kind of encryption method and operation method of JAVA application program |
| WO2020082230A1 (en) * | 2018-10-23 | 2020-04-30 | Huawei Technologies Co., Ltd. | Device and method for validation of virtual function pointers |
| EP3709560A1 (en) * | 2019-03-14 | 2020-09-16 | Thales Dis France SA | Method for provisioning white-box assets and corresponding device, server and system |
| US11468881B2 (en) * | 2019-03-29 | 2022-10-11 | Samsung Electronics Co., Ltd. | Method and system for semantic intelligent task learning and adaptive execution |
| KR102243378B1 (en) * | 2019-04-02 | 2021-04-22 | (주)드림시큐리티 | Method and apparatus for ensuring integrity of java library |
| US11150915B2 (en) | 2019-09-13 | 2021-10-19 | International Business Machines Corporation | Deferred bytecode class verification in managed runtime environments |
| CN110826031B (en) * | 2019-10-31 | 2022-08-02 | 望海康信(北京)科技股份公司 | Encryption method, device, computer equipment and storage medium |
| US10963275B1 (en) | 2019-10-31 | 2021-03-30 | Red Hat, Inc. | Implementing dependency injection via direct bytecode generation |
| JP7079502B2 (en) * | 2019-11-14 | 2022-06-02 | 株式会社アクセル | Inference system |
| US11403075B2 (en) | 2019-11-25 | 2022-08-02 | International Business Machines Corporation | Bytecode verification using class relationship caching |
| CN111143029B (en) * | 2019-12-19 | 2024-03-22 | 浪潮软件股份有限公司 | Method for realizing consistent and automatic telescopic continuous construction environment of virtual machine based on Gitleab-CI callback integration |
| KR102338885B1 (en) * | 2020-01-21 | 2021-12-14 | 주식회사 행복소프트 | A Method and an Apparatus for Detecting Dynamic Defacement in Application |
| KR102937948B1 (en) | 2020-03-06 | 2026-03-10 | 삼성전자주식회사 | A system-on chip and operation method thereof |
| US11550883B2 (en) * | 2020-09-08 | 2023-01-10 | Assured Information Security, Inc. | Code protection |
| CN113239330A (en) * | 2021-06-10 | 2021-08-10 | 杭州安恒信息技术股份有限公司 | Anti-debugging method based on hash algorithm and related device |
| CN114036524B (en) * | 2021-10-29 | 2025-11-21 | 中国银联股份有限公司 | Electronic equipment |
| CN114928550B (en) * | 2022-04-29 | 2024-05-03 | 杭州默安科技有限公司 | A database interactive account security detection method and system |
| EP4383100A1 (en) * | 2022-12-07 | 2024-06-12 | Thales Dis France Sas | Method to secure a java software code |
| CN116020127A (en) * | 2022-12-23 | 2023-04-28 | 安天科技集团股份有限公司 | A method and device for running a game, and a method and device for sending a game |
| CN117932648B (en) * | 2024-03-20 | 2024-06-04 | 厦门星纵数字科技有限公司 | Byte code protection method, terminal equipment and storage medium |
| CN118260750B (en) * | 2024-05-27 | 2024-09-17 | 北京升鑫网络科技有限公司 | Attack behavior detection method and device, and attack behavior blocking method and device |
Family Cites Families (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5692047A (en) * | 1995-12-08 | 1997-11-25 | Sun Microsystems, Inc. | System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources |
| WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
| US6594761B1 (en) | 1999-06-09 | 2003-07-15 | Cloakware Corporation | Tamper resistant software encoding |
| US6779114B1 (en) | 1999-08-19 | 2004-08-17 | Cloakware Corporation | Tamper resistant software-control flow encoding |
| CA2304433A1 (en) | 2000-04-05 | 2001-10-05 | Cloakware Corporation | General purpose access recovery scheme |
| CA2305078A1 (en) | 2000-04-12 | 2001-10-12 | Cloakware Corporation | Tamper resistant software - mass data encoding |
| US7020882B1 (en) * | 2000-09-14 | 2006-03-28 | International Business Machines Corporation | Method, system, and program for remotely manipulating a user interface over a network |
| GB0024918D0 (en) * | 2000-10-11 | 2000-11-22 | Sealedmedia Ltd | Method of providing java tamperproofing |
| CA2327911A1 (en) | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
| US7039814B2 (en) * | 2001-03-07 | 2006-05-02 | Sony Corporation | Method for securing software via late stage processor instruction decryption |
| CA2348355A1 (en) | 2001-05-24 | 2002-11-24 | Cloakware Corporation | General scheme of using encodings in computations |
| CA2350029A1 (en) | 2001-06-08 | 2002-12-08 | Cloakware Corporation | Sustainable digital watermarking via tamper-resistant software |
| CA2354470A1 (en) | 2001-07-30 | 2003-01-30 | Cloakware Corporation | Active content for secure digital media |
| US7516331B2 (en) * | 2003-11-26 | 2009-04-07 | International Business Machines Corporation | Tamper-resistant trusted java virtual machine and method of using the same |
| JP2005293109A (en) | 2004-03-31 | 2005-10-20 | Canon Inc | Software execution management device, software execution management method, and control program |
| WO2007011001A1 (en) * | 2005-07-22 | 2007-01-25 | Matsushita Electric Industrial Co., Ltd. | Execution device |
| US7788730B2 (en) * | 2006-01-17 | 2010-08-31 | International Business Machines Corporation | Secure bytecode instrumentation facility |
| WO2007147495A2 (en) | 2006-06-21 | 2007-12-27 | Wibu-Systems Ag | Method and system for intrusion detection |
| JP2009258772A (en) | 2006-08-09 | 2009-11-05 | Panasonic Corp | Application execution device |
| DE102007045743A1 (en) * | 2007-09-25 | 2009-04-02 | Siemens Ag | Method and system for protection against access to a machine code of a device |
| US20110035601A1 (en) * | 2007-12-21 | 2011-02-10 | University Of Virginia Patent Foundation | System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms |
| US20110083020A1 (en) | 2008-01-31 | 2011-04-07 | Irdeto Access B.V. | Securing a smart card |
| EP2196934A1 (en) * | 2008-12-09 | 2010-06-16 | Gemalto SA | Method for securing java bytecode |
-
2010
- 2010-11-12 EP EP21175342.1A patent/EP3923165A1/en not_active Withdrawn
- 2010-11-12 KR KR1020127015162A patent/KR20130018642A/en not_active Abandoned
- 2010-11-12 JP JP2012538154A patent/JP5689472B2/en not_active Expired - Fee Related
- 2010-11-12 IN IN2458DEN2012 patent/IN2012DN02458A/en unknown
- 2010-11-12 EP EP10829403.4A patent/EP2467800B1/en active Active
- 2010-11-12 US US13/499,495 patent/US9213826B2/en active Active
- 2010-11-12 CN CN201080048082.7A patent/CN102598017B/en active Active
- 2010-11-12 WO PCT/CA2010/001761 patent/WO2011057393A1/en not_active Ceased
- 2010-11-12 CA CA2774728A patent/CA2774728C/en not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| EP2467800A1 (en) | 2012-06-27 |
| WO2011057393A1 (en) | 2011-05-19 |
| CN102598017B (en) | 2016-03-09 |
| CA2774728C (en) | 2019-02-12 |
| EP2467800A4 (en) | 2016-03-16 |
| JP2013511077A (en) | 2013-03-28 |
| US20120246487A1 (en) | 2012-09-27 |
| EP2467800B1 (en) | 2021-06-30 |
| CA2774728A1 (en) | 2011-05-19 |
| CN102598017A (en) | 2012-07-18 |
| KR20130018642A (en) | 2013-02-25 |
| JP5689472B2 (en) | 2015-03-25 |
| US9213826B2 (en) | 2015-12-15 |
| EP3923165A1 (en) | 2021-12-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IN2012DN02458A (en) | ||
| GB2481563A (en) | Method and apparatus to provide secure application execution | |
| MX336862B (en) | Pre-heated software installation. | |
| GB2558826A (en) | Mitigation of anti-sandbox malware techniques | |
| EP2657871A3 (en) | Secure configuration of mobile application | |
| MX341086B (en) | Passcode operating system, passcode apparatus, and super-passcode generating method. | |
| GB2459036B (en) | Method and system for implementing a secure chain of trust | |
| BR112013016628A2 (en) | mobile payment system and method | |
| EP2579817A4 (en) | IMPLANT COMPONENTS AND METHODS | |
| EP2352087A4 (en) | Source code processing method, system, and program | |
| SG161193A1 (en) | System and method of utilizing resources within an information handling system | |
| MX2008012891A (en) | Malware detection system and method for limited access mobile platforms. | |
| MXPA06003297A (en) | The method of safe certification service. | |
| SG165286A1 (en) | Source-to-processing file conversion in an electronic discovery enterprise system | |
| MY178309A (en) | Method and system for running encrypted files | |
| IN2014KN02283A (en) | ||
| MX2015012889A (en) | System and method for generating a single-use time-limited purchase code. | |
| WO2010138449A3 (en) | Java store | |
| RU2013126539A (en) | PROTECTION AGAINST PASSIVE SNIFFING | |
| WO2016069080A3 (en) | Key derivation in smart card operating system | |
| DK2377264T3 (en) | METHOD AND MODULE FOR RENEWING THE CODE OF A CRYPTOGRAPHIC ALGORITM, METHOD AND MODULE FOR GENERATING A SEED, SECURITY PROCESSOR AND RECORDING MEDIA FOR THESE PROCEDURE | |
| MY161105A (en) | Solid base catalyst and method for making and using the same | |
| WO2008092167A3 (en) | Protecting secrets in an untrusted recipient | |
| TW201144798A (en) | Run-time correction of defect locations during defect review | |
| GB201212837D0 (en) | Software refactoring |