WO2007042940A3 - Method for protecting computer programs and data from hostile code - Google Patents

Method for protecting computer programs and data from hostile code Download PDF

Info

Publication number
WO2007042940A3
WO2007042940A3 PCT/IB2006/003831 IB2006003831W WO2007042940A3 WO 2007042940 A3 WO2007042940 A3 WO 2007042940A3 IB 2006003831 W IB2006003831 W IB 2006003831W WO 2007042940 A3 WO2007042940 A3 WO 2007042940A3
Authority
WO
WIPO (PCT)
Prior art keywords
untrusted
data
computer programs
computer
protecting computer
Prior art date
Application number
PCT/IB2006/003831
Other languages
French (fr)
Other versions
WO2007042940A2 (en
Inventor
Eyal Dotan
Original Assignee
Antimalware Ltd
Eyal Dotan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Antimalware Ltd, Eyal Dotan filed Critical Antimalware Ltd
Publication of WO2007042940A2 publication Critical patent/WO2007042940A2/en
Publication of WO2007042940A3 publication Critical patent/WO2007042940A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Abstract

A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can interact with other objects within the system. When an object is classified as untrusted, it can interact with other object within the system on a limited basis. A virtualized system is provided on the computer so that when the untrusted object attempts to perform an operation that is outside its scope of authorization, the virtualized system intercepts the operation but present the untrusted program with an indication that the requested operation has been performed. The method further includes processes to securely move a program from an untrusted group to a trusted group.
PCT/IB2006/003831 2005-05-23 2006-05-23 Method for protecting computer programs and data from hostile code WO2007042940A2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US68321105P 2005-05-23 2005-05-23
US60/683,211 2005-05-23
US11/141,909 US7613930B2 (en) 2001-01-19 2005-06-02 Method for protecting computer programs and data from hostile code
US11/141,909 2005-06-02

Publications (2)

Publication Number Publication Date
WO2007042940A2 WO2007042940A2 (en) 2007-04-19
WO2007042940A3 true WO2007042940A3 (en) 2007-10-04

Family

ID=37943183

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2006/003831 WO2007042940A2 (en) 2005-05-23 2006-05-23 Method for protecting computer programs and data from hostile code

Country Status (2)

Country Link
US (5) US7613930B2 (en)
WO (1) WO2007042940A2 (en)

Families Citing this family (103)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7613930B2 (en) * 2001-01-19 2009-11-03 Trustware International Limited Method for protecting computer programs and data from hostile code
US7603614B2 (en) * 2003-05-13 2009-10-13 Aladdin Knowledge Systems Ltd. Method and system for indicating an executable as trojan horse
WO2005065023A2 (en) * 2004-01-05 2005-07-21 Checkpoint Software Technologies Ltd. Internal network security
WO2005099340A2 (en) 2004-04-19 2005-10-27 Securewave S.A. On-line centralized and local authorization of executable files
WO2006017388A1 (en) * 2004-08-03 2006-02-16 Softricity, Inc. System and method for controlling inter-application association through contextual policy control
US7882317B2 (en) * 2004-12-06 2011-02-01 Microsoft Corporation Process isolation using protection domains
US8020141B2 (en) * 2004-12-06 2011-09-13 Microsoft Corporation Operating-system process construction
US8849968B2 (en) 2005-06-20 2014-09-30 Microsoft Corporation Secure and stable hosting of third-party extensions to web services
WO2007011816A2 (en) * 2005-07-15 2007-01-25 Atka Software, Llc An improved means for protecting computers from malicious software
US20070094495A1 (en) * 2005-10-26 2007-04-26 Microsoft Corporation Statically Verifiable Inter-Process-Communicative Isolated Processes
US8074231B2 (en) * 2005-10-26 2011-12-06 Microsoft Corporation Configuration of isolated extensions and device drivers
WO2007057812A1 (en) * 2005-11-17 2007-05-24 Koninklijke Philips Electronics N.V. System for managing access control
KR100825726B1 (en) * 2005-12-08 2008-04-29 한국전자통신연구원 Apparatus and method for user's privacy ? intellectual property protection of enterprise against denial of information
US20070162510A1 (en) * 2005-12-30 2007-07-12 Microsoft Corporation Delayed file virtualization
JP4769608B2 (en) * 2006-03-22 2011-09-07 富士通株式会社 Information processing apparatus having start verification function
US20070289019A1 (en) * 2006-04-21 2007-12-13 David Lowrey Methodology, system and computer readable medium for detecting and managing malware threats
US8117441B2 (en) * 2006-06-20 2012-02-14 Microsoft Corporation Integrating security protection tools with computer device integrity and privacy policy
US8032898B2 (en) * 2006-06-30 2011-10-04 Microsoft Corporation Kernel interface with categorized kernel objects
US9860274B2 (en) 2006-09-13 2018-01-02 Sophos Limited Policy management
ATE491999T1 (en) * 2006-10-06 2011-01-15 Agere Systems Inc PROTECTION OF SECRET INFORMATION IN A PROGRAMMED ELECTRONIC DEVICE
US8584109B2 (en) * 2006-10-27 2013-11-12 Microsoft Corporation Virtualization for diversified tamper resistance
US8413135B2 (en) 2006-10-30 2013-04-02 At&T Intellectual Property I, L.P. Methods, systems, and computer program products for controlling software application installations
US20080115215A1 (en) * 2006-10-31 2008-05-15 Jeffrey Scott Bardsley Methods, systems, and computer program products for automatically identifying and validating the source of a malware infection of a computer system
US8875271B2 (en) * 2006-12-08 2014-10-28 Microsoft Corporation Executing unsigned content and securing access in a closed system
JP2008177683A (en) * 2007-01-16 2008-07-31 Kyocera Mita Corp Data providing system, data receiving system, data providing method, data providing program and data receiving program
US8789063B2 (en) 2007-03-30 2014-07-22 Microsoft Corporation Master and subordinate operating system kernels for heterogeneous multiprocessor systems
KR100914771B1 (en) * 2007-05-09 2009-09-01 주식회사 웰비아닷컴 System and method for security using one-time execution code
US8127358B1 (en) * 2007-05-30 2012-02-28 Trend Micro Incorporated Thin client for computer security applications
CN101335746A (en) * 2007-06-29 2008-12-31 国际商业机器公司 Security apparatus, method and system protecting integrity of software system
US9049123B2 (en) * 2008-01-08 2015-06-02 International Business Machines Corporation Determining policy follow-up action based on user-specified codes
US8607324B2 (en) * 2008-01-15 2013-12-10 Microsoft Corporation Untrusted gaming system access to online gaming service
US20130276119A1 (en) * 2008-03-11 2013-10-17 Jonathan L. Edwards System, method, and computer program product for reacting to a detection of an attempt by a process that is unknown to control a process that is known
US8782615B2 (en) * 2008-04-14 2014-07-15 Mcafee, Inc. System, method, and computer program product for simulating at least one of a virtual environment and a debugging environment to prevent unwanted code from executing
US8255993B2 (en) * 2008-06-23 2012-08-28 Symantec Corporation Methods and systems for determining file classifications
US7530106B1 (en) * 2008-07-02 2009-05-05 Kaspersky Lab, Zao System and method for security rating of computer processes
US8079085B1 (en) * 2008-10-20 2011-12-13 Trend Micro Incorporated Reducing false positives during behavior monitoring
US9166797B2 (en) * 2008-10-24 2015-10-20 Microsoft Technology Licensing, Llc Secured compartment for transactions
KR100985074B1 (en) * 2009-02-05 2010-10-04 주식회사 안철수연구소 Malicious code prevention apparatus and method using selective virtualization, and computer-readable medium storing program for method thereof
US8745743B2 (en) * 2009-06-09 2014-06-03 F-Secure Oyj Anti-virus trusted files database
US8205257B1 (en) * 2009-07-28 2012-06-19 Symantec Corporation Systems and methods for preventing threats originating from a non-process based component hosted by a trusted process
US8850428B2 (en) 2009-11-12 2014-09-30 Trustware International Limited User transparent virtualization method for protecting computer programs and data from hostile code
US8280844B2 (en) 2010-02-15 2012-10-02 Bank Of America Corporation Anomalous activity detection
US8938808B1 (en) * 2010-03-01 2015-01-20 Symantec Corporation Systems and methods for using virtualization to implement information rights management
US9147085B2 (en) * 2010-09-24 2015-09-29 Blackberry Limited Method for establishing a plurality of modes of operation on a mobile device
US8935792B1 (en) * 2010-10-05 2015-01-13 Mcafee, Inc. System, method, and computer program product for conditionally performing an action based on an attribute
US9225727B2 (en) 2010-11-15 2015-12-29 Blackberry Limited Data source based application sandboxing
KR20120072120A (en) * 2010-12-23 2012-07-03 한국전자통신연구원 Method and apparatus for diagnosis of malicious file, method and apparatus for monitoring malicious file
US8726387B2 (en) * 2011-02-11 2014-05-13 F-Secure Corporation Detecting a trojan horse
US9436826B2 (en) * 2011-05-16 2016-09-06 Microsoft Technology Licensing, Llc Discovering malicious input files and performing automatic and distributed remediation
US20130039266A1 (en) 2011-08-08 2013-02-14 Research In Motion Limited System and method to increase link adaptation performance with multi-level feedback
US9026801B2 (en) 2012-04-26 2015-05-05 Hewlett-Packard Development Company, L.P. System call interception
US9047463B2 (en) * 2012-06-29 2015-06-02 Sri International Method and system for protecting data flow at a mobile device
US20150161385A1 (en) * 2012-08-10 2015-06-11 Concurix Corporation Memory Management Parameters Derived from System Modeling
US9294440B1 (en) * 2012-09-07 2016-03-22 Amazon Technologies, Inc. Secure inter-zone data communication
US9680864B2 (en) * 2013-06-18 2017-06-13 Empire Technology Development Llc Remediating rogue applications
US20150113644A1 (en) * 2013-10-21 2015-04-23 Trusteer, Ltd. Exploit Detection/Prevention
RU2571723C2 (en) 2013-12-05 2015-12-20 Закрытое акционерное общество "Лаборатория Касперского" System and method of reducing load on operating system when executing antivirus application
TWI507912B (en) * 2014-04-03 2015-11-11 Wistron Corp I/o redirection method, i/o nstruction virtualization system and method,and computer programmed product thereof
US20170286684A1 (en) * 2014-05-30 2017-10-05 Beestripe Llc Method for Identifying and Removing Malicious Software
US9866582B2 (en) * 2014-06-30 2018-01-09 Paypal, Inc. Detection of scripted activity
US11507663B2 (en) 2014-08-11 2022-11-22 Sentinel Labs Israel Ltd. Method of remediating operations performed by a program and system thereof
US9710648B2 (en) 2014-08-11 2017-07-18 Sentinel Labs Israel Ltd. Method of malware detection and system thereof
US10019602B2 (en) * 2014-08-28 2018-07-10 Qualcomm Incorporated System and method for improved security for a processor in a portable computing device (PCD)
RU2595511C2 (en) * 2014-12-05 2016-08-27 Закрытое акционерное общество "Лаборатория Касперского" System and method of trusted applications operation in the presence of suspicious applications
CN104735091B (en) * 2015-04-17 2018-03-30 三星电子(中国)研发中心 A kind of user access control method and apparatus based on linux system
US10586076B2 (en) * 2015-08-24 2020-03-10 Acronis International Gmbh System and method for controlling access to OS resources
KR102431266B1 (en) * 2015-09-24 2022-08-11 삼성전자주식회사 Apparatus and method for protecting information in communication system
US10264008B2 (en) * 2015-10-08 2019-04-16 Bank Of America Corporation Vulnerability exposing application characteristic variation identification engine
US11616812B2 (en) * 2016-12-19 2023-03-28 Attivo Networks Inc. Deceiving attackers accessing active directory data
US11695800B2 (en) 2016-12-19 2023-07-04 SentinelOne, Inc. Deceiving attackers accessing network data
US10599842B2 (en) * 2016-12-19 2020-03-24 Attivo Networks Inc. Deceiving attackers in endpoint systems
US10419377B2 (en) * 2017-05-31 2019-09-17 Apple Inc. Method and system for categorizing instant messages
JP2020530922A (en) 2017-08-08 2020-10-29 センチネル ラボ, インコーポレイテッドSentinel Labs, Inc. How to dynamically model and group edge networking endpoints, systems, and devices
US10885212B2 (en) 2017-09-12 2021-01-05 Sophos Limited Secure management of process properties
US10664351B2 (en) * 2017-12-12 2020-05-26 Google Llc Automated recovery of unstable mobile devices
US11010233B1 (en) 2018-01-18 2021-05-18 Pure Storage, Inc Hardware-based system monitoring
US11470115B2 (en) 2018-02-09 2022-10-11 Attivo Networks, Inc. Implementing decoys in a network environment
US11537477B2 (en) 2018-03-15 2022-12-27 Huawei Technologies Co., Ltd. Method for protecting application data and terminal
US11126721B2 (en) * 2018-06-28 2021-09-21 Intel Corporation Methods, systems and apparatus to detect polymorphic malware
EP3973427A4 (en) 2019-05-20 2023-06-21 Sentinel Labs Israel Ltd. Systems and methods for executable code detection, automatic feature extraction and position independent code detection
US11227052B2 (en) * 2019-05-21 2022-01-18 The Boeing Company Malware detection with dynamic operating-system-level containerization
RU2750628C2 (en) * 2019-06-28 2021-06-30 Акционерное общество "Лаборатория Касперского" System and method for determining the file trust level
EP4049159A4 (en) * 2019-10-21 2023-11-01 Field Effect Software Inc. Ransomware prevention
US11520907B1 (en) 2019-11-22 2022-12-06 Pure Storage, Inc. Storage system snapshot retention based on encrypted data
US11625481B2 (en) 2019-11-22 2023-04-11 Pure Storage, Inc. Selective throttling of operations potentially related to a security threat to a storage system
US20210383010A1 (en) * 2019-11-22 2021-12-09 Pure Storage, Inc. Measurement Interval Anomaly Detection-based Generation of Snapshots
US11341236B2 (en) * 2019-11-22 2022-05-24 Pure Storage, Inc. Traffic-based detection of a security threat to a storage system
US11941116B2 (en) 2019-11-22 2024-03-26 Pure Storage, Inc. Ransomware-based data protection parameter modification
US11720714B2 (en) 2019-11-22 2023-08-08 Pure Storage, Inc. Inter-I/O relationship based detection of a security threat to a storage system
US11657155B2 (en) * 2019-11-22 2023-05-23 Pure Storage, Inc Snapshot delta metric based determination of a possible ransomware attack against data maintained by a storage system
US11645162B2 (en) * 2019-11-22 2023-05-09 Pure Storage, Inc. Recovery point determination for data restoration in a storage system
US11675898B2 (en) 2019-11-22 2023-06-13 Pure Storage, Inc. Recovery dataset management for security threat monitoring
US11687418B2 (en) 2019-11-22 2023-06-27 Pure Storage, Inc. Automatic generation of recovery plans specific to individual storage elements
US11615185B2 (en) 2019-11-22 2023-03-28 Pure Storage, Inc. Multi-layer security threat detection for a storage system
US11755751B2 (en) * 2019-11-22 2023-09-12 Pure Storage, Inc. Modify access restrictions in response to a possible attack against data stored by a storage system
US11500788B2 (en) 2019-11-22 2022-11-15 Pure Storage, Inc. Logical address based authorization of operations with respect to a storage system
US11651075B2 (en) * 2019-11-22 2023-05-16 Pure Storage, Inc. Extensible attack monitoring by a storage system
US11720692B2 (en) 2019-11-22 2023-08-08 Pure Storage, Inc. Hardware token based management of recovery datasets for a storage system
TWI802804B (en) * 2020-07-09 2023-05-21 台眾電腦股份有限公司 Information security management system for multiple information security software
JP7391802B2 (en) * 2020-09-11 2023-12-05 株式会社東芝 Information processing device, information processing method, and computer program
US11514161B2 (en) * 2020-09-11 2022-11-29 Mcafee, Llc Method and apparatus for detecting malware via analysis of a screen capture
US11579857B2 (en) 2020-12-16 2023-02-14 Sentinel Labs Israel Ltd. Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach
US11899782B1 (en) 2021-07-13 2024-02-13 SentinelOne, Inc. Preserving DLL hooks

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005043360A1 (en) * 2003-10-21 2005-05-12 Green Border Technologies Systems and methods for secure client applications

Family Cites Families (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4962533A (en) 1989-02-17 1990-10-09 Texas Instrument Incorporated Data protection for computer systems
US5280614A (en) 1990-08-21 1994-01-18 International Business Machines Corporation Apparatus and method for controlling access to data using domains
US5551033A (en) * 1991-05-17 1996-08-27 Zenith Data Systems Corporation Apparatus for maintaining one interrupt mask register in conformity with another in a manner invisible to an executing program
US5408642A (en) 1991-05-24 1995-04-18 Symantec Corporation Method for recovery of a computer program infected by a computer virus
US5421006A (en) 1992-05-07 1995-05-30 Compaq Computer Corp. Method and apparatus for assessing integrity of computer system software
US5361359A (en) 1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer
US5446903A (en) * 1993-05-04 1995-08-29 International Business Machines Corporation Method and apparatus for controlling access to data elements in a data processing system based on status of an industrial process by mapping user's security categories and industrial process steps
US5398196A (en) 1993-07-29 1995-03-14 Chambers; David A. Method and apparatus for detection of computer viruses
US5864683A (en) * 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5613002A (en) 1994-11-21 1997-03-18 International Business Machines Corporation Generic disinfection of programs infected with a computer virus
US5859966A (en) 1995-10-10 1999-01-12 Data General Corporation Security system for computer systems
WO1997024665A1 (en) 1995-12-28 1997-07-10 Eyal Dotan Method for protecting executable software programs against infection by software viruses
WO1997025798A1 (en) * 1996-01-11 1997-07-17 Mrj, Inc. System for controlling access and distribution of digital property
US6405265B1 (en) * 1996-05-08 2002-06-11 Mijenix Corporation Device driver for accessing computer files
US5958050A (en) 1996-09-24 1999-09-28 Electric Communities Trusted delegation system
US5937159A (en) 1997-03-28 1999-08-10 Data General Corporation Secure computer system
US6453334B1 (en) 1997-06-16 2002-09-17 Streamtheory, Inc. Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching
US6275938B1 (en) * 1997-08-28 2001-08-14 Microsoft Corporation Security enhancement for untrusted executable code
IL126149A (en) 1997-09-09 2003-07-31 Sanctum Ltd Method and system for protecting operations of trusted internal networks
US6125447A (en) 1997-12-11 2000-09-26 Sun Microsystems, Inc. Protection domains to provide security in a computer system
US6173404B1 (en) * 1998-02-24 2001-01-09 Microsoft Corporation Software object security mechanism
DE69819301D1 (en) * 1998-05-01 2003-12-04 Hewlett Packard Co Procedure for managing dynamic decision trees
US6189103B1 (en) * 1998-07-21 2001-02-13 Novell, Inc. Authority delegation with secure operating system queues
AUPP660298A0 (en) * 1998-10-20 1998-11-12 Canon Kabushiki Kaisha Apparatus and method for preventing disclosure of protected information
AU745031B2 (en) 1998-10-20 2002-03-07 Canon Kabushiki Kaisha Apparatus and method for preventing disclosure of protected information
US6330670B1 (en) * 1998-10-26 2001-12-11 Microsoft Corporation Digital rights management operating system
US6839850B1 (en) * 1999-03-04 2005-01-04 Prc, Inc. Method and system for detecting intrusion into and misuse of a data processing system
WO2000077974A1 (en) * 1999-06-11 2000-12-21 Liberate Technologies Hierarchical open security information delegation and acquisition
GB2380303B (en) 2000-05-28 2005-09-14 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
GB2411748B (en) 2000-05-28 2005-10-19 Secureol System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US9213836B2 (en) 2000-05-28 2015-12-15 Barhon Mayer, Batya System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages
US20030159070A1 (en) * 2001-05-28 2003-08-21 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
EP1225512A1 (en) 2001-01-19 2002-07-24 Eyal Dotan Method for protecting computer programs and data from hostile code
US7613930B2 (en) 2001-01-19 2009-11-03 Trustware International Limited Method for protecting computer programs and data from hostile code
EP1225513A1 (en) 2001-01-19 2002-07-24 Eyal Dotan Method for protecting computer programs and data from hostile code
US7188367B1 (en) * 2001-03-30 2007-03-06 Moafee, Inc. Virus scanning prioritization using pre-processor checking
US7028305B2 (en) 2001-05-16 2006-04-11 Softricity, Inc. Operating system abstraction and protection layer
WO2003107221A1 (en) 2002-06-12 2003-12-24 Fslogic, Inc. Layered computing systems and methods
US7512977B2 (en) 2003-06-11 2009-03-31 Symantec Corporation Intrustion protection system utilizing layers
DE50211786D1 (en) * 2002-09-05 2008-04-10 Ford Global Tech Llc Electric heating for motor vehicles and regulatory procedures
US7506338B2 (en) * 2004-08-30 2009-03-17 International Business Machines Corporation Method and apparatus for simplifying the deployment and serviceability of commercial software environments
US7739738B1 (en) 2006-03-15 2010-06-15 Symantec Corporation Enabling clean file cache persistence using dual-boot detection
US20090006744A1 (en) 2007-06-28 2009-01-01 Cavallo Joseph S Automated intermittent data mirroring volumes
US8850428B2 (en) 2009-11-12 2014-09-30 Trustware International Limited User transparent virtualization method for protecting computer programs and data from hostile code

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005043360A1 (en) * 2003-10-21 2005-05-12 Green Border Technologies Systems and methods for secure client applications

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GHORMLEY D P ET AL: "SLIC: AN EXTENSIBILITY SZSTEM FOR COMMODITY OPERATING SYSTEMS", PROCEEDINGS OF THE USENIX ANNUAL TECHNICAL CONFERENCE, 15 June 1998 (1998-06-15), pages 39 - 52, XP000881295 *
GOLDBERG I ET AL: "A secure environment for untrusted helper applications", INTERNET CITATION, 22 July 1996 (1996-07-22), XP002377441, Retrieved from the Internet <URL:http://www.cs.berkeley.edu/ daw/papers/janus-usenix96.ps> [retrieved on 20060419] *

Also Published As

Publication number Publication date
US20050223239A1 (en) 2005-10-06
US20140373181A1 (en) 2014-12-18
US20130298234A1 (en) 2013-11-07
US20100058472A1 (en) 2010-03-04
US20120090029A1 (en) 2012-04-12
US8838994B2 (en) 2014-09-16
US8484483B2 (en) 2013-07-09
WO2007042940A2 (en) 2007-04-19
US9390262B2 (en) 2016-07-12
US7613930B2 (en) 2009-11-03
US8078886B2 (en) 2011-12-13

Similar Documents

Publication Publication Date Title
WO2007042940A3 (en) Method for protecting computer programs and data from hostile code
WO2007077362A3 (en) Method for authenticating applications of a computer system
WO2004049096A3 (en) Creation of local usage rights voucher
WO2006101549A3 (en) Secure system for allowing the execution of authorized computer program code
WO2012115956A3 (en) Systems and methods for providing a computing device having a secure operating system kernel
WO2007061671A3 (en) Systems and methods for detecting and disabling malicious script code
WO2007147495A3 (en) Method and system for intrusion detection
WO2008074382A8 (en) Obfuscating computer program code
WO2007041501A3 (en) Secure execution environment by preventing execution of unauthorized boot loaders
WO2003034188A3 (en) Method and system for detecting unauthorised executable programs _______________________________________________________________
WO2012088109A3 (en) Providing a security boundary
WO2004055632A3 (en) Method, system, and computer program product for security within a global computer network
WO2008061089A3 (en) Method and system for trusted/untrusted digital signal processor debugging operations
WO2006133222A3 (en) Constraint injection system for immunizing software programs against vulnerabilities and attacks
WO2005001639A3 (en) Trusted computer system
WO2012159940A3 (en) Method and control unit for detecting manipulations of a vehicle network
WO2003005627A3 (en) Mobile application access control list security system
WO2014078585A3 (en) Methods, systems and computer readable media for detecting command injection attacks
WO2007084263A3 (en) Creating a relatively unique environment for computing platforms
WO2005099340A3 (en) On-line centralized and local authorization of executable files
WO2007004219A3 (en) System, device and method of verifying that a code is executed by a processor
WO2006065956A3 (en) Protecting computing systems from unauthorized programs
EP2107489A3 (en) Obfuscating computer program code
WO2008040662A3 (en) Method for the computer-assisted optimization of the resource utilization of a program
MXPA04001386A (en) Using permissions to allocate device resources to an application.

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

NENP Non-entry into the national phase

Ref country code: RU

WWW Wipo information: withdrawn in national office

Country of ref document: RU

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 06831819

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 06831819

Country of ref document: EP

Kind code of ref document: A2