WO2007042940A3 - Method for protecting computer programs and data from hostile code - Google Patents
Method for protecting computer programs and data from hostile code Download PDFInfo
- Publication number
- WO2007042940A3 WO2007042940A3 PCT/IB2006/003831 IB2006003831W WO2007042940A3 WO 2007042940 A3 WO2007042940 A3 WO 2007042940A3 IB 2006003831 W IB2006003831 W IB 2006003831W WO 2007042940 A3 WO2007042940 A3 WO 2007042940A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- untrusted
- data
- computer programs
- computer
- protecting computer
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Abstract
A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can interact with other objects within the system. When an object is classified as untrusted, it can interact with other object within the system on a limited basis. A virtualized system is provided on the computer so that when the untrusted object attempts to perform an operation that is outside its scope of authorization, the virtualized system intercepts the operation but present the untrusted program with an indication that the requested operation has been performed. The method further includes processes to securely move a program from an untrusted group to a trusted group.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US68321105P | 2005-05-23 | 2005-05-23 | |
US60/683,211 | 2005-05-23 | ||
US11/141,909 US7613930B2 (en) | 2001-01-19 | 2005-06-02 | Method for protecting computer programs and data from hostile code |
US11/141,909 | 2005-06-02 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007042940A2 WO2007042940A2 (en) | 2007-04-19 |
WO2007042940A3 true WO2007042940A3 (en) | 2007-10-04 |
Family
ID=37943183
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2006/003831 WO2007042940A2 (en) | 2005-05-23 | 2006-05-23 | Method for protecting computer programs and data from hostile code |
Country Status (2)
Country | Link |
---|---|
US (5) | US7613930B2 (en) |
WO (1) | WO2007042940A2 (en) |
Families Citing this family (103)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7613930B2 (en) * | 2001-01-19 | 2009-11-03 | Trustware International Limited | Method for protecting computer programs and data from hostile code |
US7603614B2 (en) * | 2003-05-13 | 2009-10-13 | Aladdin Knowledge Systems Ltd. | Method and system for indicating an executable as trojan horse |
WO2005065023A2 (en) * | 2004-01-05 | 2005-07-21 | Checkpoint Software Technologies Ltd. | Internal network security |
WO2005099340A2 (en) | 2004-04-19 | 2005-10-27 | Securewave S.A. | On-line centralized and local authorization of executable files |
WO2006017388A1 (en) * | 2004-08-03 | 2006-02-16 | Softricity, Inc. | System and method for controlling inter-application association through contextual policy control |
US7882317B2 (en) * | 2004-12-06 | 2011-02-01 | Microsoft Corporation | Process isolation using protection domains |
US8020141B2 (en) * | 2004-12-06 | 2011-09-13 | Microsoft Corporation | Operating-system process construction |
US8849968B2 (en) | 2005-06-20 | 2014-09-30 | Microsoft Corporation | Secure and stable hosting of third-party extensions to web services |
WO2007011816A2 (en) * | 2005-07-15 | 2007-01-25 | Atka Software, Llc | An improved means for protecting computers from malicious software |
US20070094495A1 (en) * | 2005-10-26 | 2007-04-26 | Microsoft Corporation | Statically Verifiable Inter-Process-Communicative Isolated Processes |
US8074231B2 (en) * | 2005-10-26 | 2011-12-06 | Microsoft Corporation | Configuration of isolated extensions and device drivers |
WO2007057812A1 (en) * | 2005-11-17 | 2007-05-24 | Koninklijke Philips Electronics N.V. | System for managing access control |
KR100825726B1 (en) * | 2005-12-08 | 2008-04-29 | 한국전자통신연구원 | Apparatus and method for user's privacy ? intellectual property protection of enterprise against denial of information |
US20070162510A1 (en) * | 2005-12-30 | 2007-07-12 | Microsoft Corporation | Delayed file virtualization |
JP4769608B2 (en) * | 2006-03-22 | 2011-09-07 | 富士通株式会社 | Information processing apparatus having start verification function |
US20070289019A1 (en) * | 2006-04-21 | 2007-12-13 | David Lowrey | Methodology, system and computer readable medium for detecting and managing malware threats |
US8117441B2 (en) * | 2006-06-20 | 2012-02-14 | Microsoft Corporation | Integrating security protection tools with computer device integrity and privacy policy |
US8032898B2 (en) * | 2006-06-30 | 2011-10-04 | Microsoft Corporation | Kernel interface with categorized kernel objects |
US9860274B2 (en) | 2006-09-13 | 2018-01-02 | Sophos Limited | Policy management |
ATE491999T1 (en) * | 2006-10-06 | 2011-01-15 | Agere Systems Inc | PROTECTION OF SECRET INFORMATION IN A PROGRAMMED ELECTRONIC DEVICE |
US8584109B2 (en) * | 2006-10-27 | 2013-11-12 | Microsoft Corporation | Virtualization for diversified tamper resistance |
US8413135B2 (en) | 2006-10-30 | 2013-04-02 | At&T Intellectual Property I, L.P. | Methods, systems, and computer program products for controlling software application installations |
US20080115215A1 (en) * | 2006-10-31 | 2008-05-15 | Jeffrey Scott Bardsley | Methods, systems, and computer program products for automatically identifying and validating the source of a malware infection of a computer system |
US8875271B2 (en) * | 2006-12-08 | 2014-10-28 | Microsoft Corporation | Executing unsigned content and securing access in a closed system |
JP2008177683A (en) * | 2007-01-16 | 2008-07-31 | Kyocera Mita Corp | Data providing system, data receiving system, data providing method, data providing program and data receiving program |
US8789063B2 (en) | 2007-03-30 | 2014-07-22 | Microsoft Corporation | Master and subordinate operating system kernels for heterogeneous multiprocessor systems |
KR100914771B1 (en) * | 2007-05-09 | 2009-09-01 | 주식회사 웰비아닷컴 | System and method for security using one-time execution code |
US8127358B1 (en) * | 2007-05-30 | 2012-02-28 | Trend Micro Incorporated | Thin client for computer security applications |
CN101335746A (en) * | 2007-06-29 | 2008-12-31 | 国际商业机器公司 | Security apparatus, method and system protecting integrity of software system |
US9049123B2 (en) * | 2008-01-08 | 2015-06-02 | International Business Machines Corporation | Determining policy follow-up action based on user-specified codes |
US8607324B2 (en) * | 2008-01-15 | 2013-12-10 | Microsoft Corporation | Untrusted gaming system access to online gaming service |
US20130276119A1 (en) * | 2008-03-11 | 2013-10-17 | Jonathan L. Edwards | System, method, and computer program product for reacting to a detection of an attempt by a process that is unknown to control a process that is known |
US8782615B2 (en) * | 2008-04-14 | 2014-07-15 | Mcafee, Inc. | System, method, and computer program product for simulating at least one of a virtual environment and a debugging environment to prevent unwanted code from executing |
US8255993B2 (en) * | 2008-06-23 | 2012-08-28 | Symantec Corporation | Methods and systems for determining file classifications |
US7530106B1 (en) * | 2008-07-02 | 2009-05-05 | Kaspersky Lab, Zao | System and method for security rating of computer processes |
US8079085B1 (en) * | 2008-10-20 | 2011-12-13 | Trend Micro Incorporated | Reducing false positives during behavior monitoring |
US9166797B2 (en) * | 2008-10-24 | 2015-10-20 | Microsoft Technology Licensing, Llc | Secured compartment for transactions |
KR100985074B1 (en) * | 2009-02-05 | 2010-10-04 | 주식회사 안철수연구소 | Malicious code prevention apparatus and method using selective virtualization, and computer-readable medium storing program for method thereof |
US8745743B2 (en) * | 2009-06-09 | 2014-06-03 | F-Secure Oyj | Anti-virus trusted files database |
US8205257B1 (en) * | 2009-07-28 | 2012-06-19 | Symantec Corporation | Systems and methods for preventing threats originating from a non-process based component hosted by a trusted process |
US8850428B2 (en) | 2009-11-12 | 2014-09-30 | Trustware International Limited | User transparent virtualization method for protecting computer programs and data from hostile code |
US8280844B2 (en) | 2010-02-15 | 2012-10-02 | Bank Of America Corporation | Anomalous activity detection |
US8938808B1 (en) * | 2010-03-01 | 2015-01-20 | Symantec Corporation | Systems and methods for using virtualization to implement information rights management |
US9147085B2 (en) * | 2010-09-24 | 2015-09-29 | Blackberry Limited | Method for establishing a plurality of modes of operation on a mobile device |
US8935792B1 (en) * | 2010-10-05 | 2015-01-13 | Mcafee, Inc. | System, method, and computer program product for conditionally performing an action based on an attribute |
US9225727B2 (en) | 2010-11-15 | 2015-12-29 | Blackberry Limited | Data source based application sandboxing |
KR20120072120A (en) * | 2010-12-23 | 2012-07-03 | 한국전자통신연구원 | Method and apparatus for diagnosis of malicious file, method and apparatus for monitoring malicious file |
US8726387B2 (en) * | 2011-02-11 | 2014-05-13 | F-Secure Corporation | Detecting a trojan horse |
US9436826B2 (en) * | 2011-05-16 | 2016-09-06 | Microsoft Technology Licensing, Llc | Discovering malicious input files and performing automatic and distributed remediation |
US20130039266A1 (en) | 2011-08-08 | 2013-02-14 | Research In Motion Limited | System and method to increase link adaptation performance with multi-level feedback |
US9026801B2 (en) | 2012-04-26 | 2015-05-05 | Hewlett-Packard Development Company, L.P. | System call interception |
US9047463B2 (en) * | 2012-06-29 | 2015-06-02 | Sri International | Method and system for protecting data flow at a mobile device |
US20150161385A1 (en) * | 2012-08-10 | 2015-06-11 | Concurix Corporation | Memory Management Parameters Derived from System Modeling |
US9294440B1 (en) * | 2012-09-07 | 2016-03-22 | Amazon Technologies, Inc. | Secure inter-zone data communication |
US9680864B2 (en) * | 2013-06-18 | 2017-06-13 | Empire Technology Development Llc | Remediating rogue applications |
US20150113644A1 (en) * | 2013-10-21 | 2015-04-23 | Trusteer, Ltd. | Exploit Detection/Prevention |
RU2571723C2 (en) | 2013-12-05 | 2015-12-20 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of reducing load on operating system when executing antivirus application |
TWI507912B (en) * | 2014-04-03 | 2015-11-11 | Wistron Corp | I/o redirection method, i/o nstruction virtualization system and method,and computer programmed product thereof |
US20170286684A1 (en) * | 2014-05-30 | 2017-10-05 | Beestripe Llc | Method for Identifying and Removing Malicious Software |
US9866582B2 (en) * | 2014-06-30 | 2018-01-09 | Paypal, Inc. | Detection of scripted activity |
US11507663B2 (en) | 2014-08-11 | 2022-11-22 | Sentinel Labs Israel Ltd. | Method of remediating operations performed by a program and system thereof |
US9710648B2 (en) | 2014-08-11 | 2017-07-18 | Sentinel Labs Israel Ltd. | Method of malware detection and system thereof |
US10019602B2 (en) * | 2014-08-28 | 2018-07-10 | Qualcomm Incorporated | System and method for improved security for a processor in a portable computing device (PCD) |
RU2595511C2 (en) * | 2014-12-05 | 2016-08-27 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of trusted applications operation in the presence of suspicious applications |
CN104735091B (en) * | 2015-04-17 | 2018-03-30 | 三星电子(中国)研发中心 | A kind of user access control method and apparatus based on linux system |
US10586076B2 (en) * | 2015-08-24 | 2020-03-10 | Acronis International Gmbh | System and method for controlling access to OS resources |
KR102431266B1 (en) * | 2015-09-24 | 2022-08-11 | 삼성전자주식회사 | Apparatus and method for protecting information in communication system |
US10264008B2 (en) * | 2015-10-08 | 2019-04-16 | Bank Of America Corporation | Vulnerability exposing application characteristic variation identification engine |
US11616812B2 (en) * | 2016-12-19 | 2023-03-28 | Attivo Networks Inc. | Deceiving attackers accessing active directory data |
US11695800B2 (en) | 2016-12-19 | 2023-07-04 | SentinelOne, Inc. | Deceiving attackers accessing network data |
US10599842B2 (en) * | 2016-12-19 | 2020-03-24 | Attivo Networks Inc. | Deceiving attackers in endpoint systems |
US10419377B2 (en) * | 2017-05-31 | 2019-09-17 | Apple Inc. | Method and system for categorizing instant messages |
JP2020530922A (en) | 2017-08-08 | 2020-10-29 | センチネル ラボ, インコーポレイテッドSentinel Labs, Inc. | How to dynamically model and group edge networking endpoints, systems, and devices |
US10885212B2 (en) | 2017-09-12 | 2021-01-05 | Sophos Limited | Secure management of process properties |
US10664351B2 (en) * | 2017-12-12 | 2020-05-26 | Google Llc | Automated recovery of unstable mobile devices |
US11010233B1 (en) | 2018-01-18 | 2021-05-18 | Pure Storage, Inc | Hardware-based system monitoring |
US11470115B2 (en) | 2018-02-09 | 2022-10-11 | Attivo Networks, Inc. | Implementing decoys in a network environment |
US11537477B2 (en) | 2018-03-15 | 2022-12-27 | Huawei Technologies Co., Ltd. | Method for protecting application data and terminal |
US11126721B2 (en) * | 2018-06-28 | 2021-09-21 | Intel Corporation | Methods, systems and apparatus to detect polymorphic malware |
EP3973427A4 (en) | 2019-05-20 | 2023-06-21 | Sentinel Labs Israel Ltd. | Systems and methods for executable code detection, automatic feature extraction and position independent code detection |
US11227052B2 (en) * | 2019-05-21 | 2022-01-18 | The Boeing Company | Malware detection with dynamic operating-system-level containerization |
RU2750628C2 (en) * | 2019-06-28 | 2021-06-30 | Акционерное общество "Лаборатория Касперского" | System and method for determining the file trust level |
EP4049159A4 (en) * | 2019-10-21 | 2023-11-01 | Field Effect Software Inc. | Ransomware prevention |
US11520907B1 (en) | 2019-11-22 | 2022-12-06 | Pure Storage, Inc. | Storage system snapshot retention based on encrypted data |
US11625481B2 (en) | 2019-11-22 | 2023-04-11 | Pure Storage, Inc. | Selective throttling of operations potentially related to a security threat to a storage system |
US20210383010A1 (en) * | 2019-11-22 | 2021-12-09 | Pure Storage, Inc. | Measurement Interval Anomaly Detection-based Generation of Snapshots |
US11341236B2 (en) * | 2019-11-22 | 2022-05-24 | Pure Storage, Inc. | Traffic-based detection of a security threat to a storage system |
US11941116B2 (en) | 2019-11-22 | 2024-03-26 | Pure Storage, Inc. | Ransomware-based data protection parameter modification |
US11720714B2 (en) | 2019-11-22 | 2023-08-08 | Pure Storage, Inc. | Inter-I/O relationship based detection of a security threat to a storage system |
US11657155B2 (en) * | 2019-11-22 | 2023-05-23 | Pure Storage, Inc | Snapshot delta metric based determination of a possible ransomware attack against data maintained by a storage system |
US11645162B2 (en) * | 2019-11-22 | 2023-05-09 | Pure Storage, Inc. | Recovery point determination for data restoration in a storage system |
US11675898B2 (en) | 2019-11-22 | 2023-06-13 | Pure Storage, Inc. | Recovery dataset management for security threat monitoring |
US11687418B2 (en) | 2019-11-22 | 2023-06-27 | Pure Storage, Inc. | Automatic generation of recovery plans specific to individual storage elements |
US11615185B2 (en) | 2019-11-22 | 2023-03-28 | Pure Storage, Inc. | Multi-layer security threat detection for a storage system |
US11755751B2 (en) * | 2019-11-22 | 2023-09-12 | Pure Storage, Inc. | Modify access restrictions in response to a possible attack against data stored by a storage system |
US11500788B2 (en) | 2019-11-22 | 2022-11-15 | Pure Storage, Inc. | Logical address based authorization of operations with respect to a storage system |
US11651075B2 (en) * | 2019-11-22 | 2023-05-16 | Pure Storage, Inc. | Extensible attack monitoring by a storage system |
US11720692B2 (en) | 2019-11-22 | 2023-08-08 | Pure Storage, Inc. | Hardware token based management of recovery datasets for a storage system |
TWI802804B (en) * | 2020-07-09 | 2023-05-21 | 台眾電腦股份有限公司 | Information security management system for multiple information security software |
JP7391802B2 (en) * | 2020-09-11 | 2023-12-05 | 株式会社東芝 | Information processing device, information processing method, and computer program |
US11514161B2 (en) * | 2020-09-11 | 2022-11-29 | Mcafee, Llc | Method and apparatus for detecting malware via analysis of a screen capture |
US11579857B2 (en) | 2020-12-16 | 2023-02-14 | Sentinel Labs Israel Ltd. | Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach |
US11899782B1 (en) | 2021-07-13 | 2024-02-13 | SentinelOne, Inc. | Preserving DLL hooks |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005043360A1 (en) * | 2003-10-21 | 2005-05-12 | Green Border Technologies | Systems and methods for secure client applications |
Family Cites Families (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4962533A (en) | 1989-02-17 | 1990-10-09 | Texas Instrument Incorporated | Data protection for computer systems |
US5280614A (en) | 1990-08-21 | 1994-01-18 | International Business Machines Corporation | Apparatus and method for controlling access to data using domains |
US5551033A (en) * | 1991-05-17 | 1996-08-27 | Zenith Data Systems Corporation | Apparatus for maintaining one interrupt mask register in conformity with another in a manner invisible to an executing program |
US5408642A (en) | 1991-05-24 | 1995-04-18 | Symantec Corporation | Method for recovery of a computer program infected by a computer virus |
US5421006A (en) | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software |
US5361359A (en) | 1992-08-31 | 1994-11-01 | Trusted Information Systems, Inc. | System and method for controlling the use of a computer |
US5446903A (en) * | 1993-05-04 | 1995-08-29 | International Business Machines Corporation | Method and apparatus for controlling access to data elements in a data processing system based on status of an industrial process by mapping user's security categories and industrial process steps |
US5398196A (en) | 1993-07-29 | 1995-03-14 | Chambers; David A. | Method and apparatus for detection of computer viruses |
US5864683A (en) * | 1994-10-12 | 1999-01-26 | Secure Computing Corporartion | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights |
US5613002A (en) | 1994-11-21 | 1997-03-18 | International Business Machines Corporation | Generic disinfection of programs infected with a computer virus |
US5859966A (en) | 1995-10-10 | 1999-01-12 | Data General Corporation | Security system for computer systems |
WO1997024665A1 (en) | 1995-12-28 | 1997-07-10 | Eyal Dotan | Method for protecting executable software programs against infection by software viruses |
WO1997025798A1 (en) * | 1996-01-11 | 1997-07-17 | Mrj, Inc. | System for controlling access and distribution of digital property |
US6405265B1 (en) * | 1996-05-08 | 2002-06-11 | Mijenix Corporation | Device driver for accessing computer files |
US5958050A (en) | 1996-09-24 | 1999-09-28 | Electric Communities | Trusted delegation system |
US5937159A (en) | 1997-03-28 | 1999-08-10 | Data General Corporation | Secure computer system |
US6453334B1 (en) | 1997-06-16 | 2002-09-17 | Streamtheory, Inc. | Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching |
US6275938B1 (en) * | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
IL126149A (en) | 1997-09-09 | 2003-07-31 | Sanctum Ltd | Method and system for protecting operations of trusted internal networks |
US6125447A (en) | 1997-12-11 | 2000-09-26 | Sun Microsystems, Inc. | Protection domains to provide security in a computer system |
US6173404B1 (en) * | 1998-02-24 | 2001-01-09 | Microsoft Corporation | Software object security mechanism |
DE69819301D1 (en) * | 1998-05-01 | 2003-12-04 | Hewlett Packard Co | Procedure for managing dynamic decision trees |
US6189103B1 (en) * | 1998-07-21 | 2001-02-13 | Novell, Inc. | Authority delegation with secure operating system queues |
AUPP660298A0 (en) * | 1998-10-20 | 1998-11-12 | Canon Kabushiki Kaisha | Apparatus and method for preventing disclosure of protected information |
AU745031B2 (en) | 1998-10-20 | 2002-03-07 | Canon Kabushiki Kaisha | Apparatus and method for preventing disclosure of protected information |
US6330670B1 (en) * | 1998-10-26 | 2001-12-11 | Microsoft Corporation | Digital rights management operating system |
US6839850B1 (en) * | 1999-03-04 | 2005-01-04 | Prc, Inc. | Method and system for detecting intrusion into and misuse of a data processing system |
WO2000077974A1 (en) * | 1999-06-11 | 2000-12-21 | Liberate Technologies | Hierarchical open security information delegation and acquisition |
GB2380303B (en) | 2000-05-28 | 2005-09-14 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
GB2411748B (en) | 2000-05-28 | 2005-10-19 | Secureol | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US9213836B2 (en) | 2000-05-28 | 2015-12-15 | Barhon Mayer, Batya | System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages |
US20030159070A1 (en) * | 2001-05-28 | 2003-08-21 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
EP1225512A1 (en) | 2001-01-19 | 2002-07-24 | Eyal Dotan | Method for protecting computer programs and data from hostile code |
US7613930B2 (en) | 2001-01-19 | 2009-11-03 | Trustware International Limited | Method for protecting computer programs and data from hostile code |
EP1225513A1 (en) | 2001-01-19 | 2002-07-24 | Eyal Dotan | Method for protecting computer programs and data from hostile code |
US7188367B1 (en) * | 2001-03-30 | 2007-03-06 | Moafee, Inc. | Virus scanning prioritization using pre-processor checking |
US7028305B2 (en) | 2001-05-16 | 2006-04-11 | Softricity, Inc. | Operating system abstraction and protection layer |
WO2003107221A1 (en) | 2002-06-12 | 2003-12-24 | Fslogic, Inc. | Layered computing systems and methods |
US7512977B2 (en) | 2003-06-11 | 2009-03-31 | Symantec Corporation | Intrustion protection system utilizing layers |
DE50211786D1 (en) * | 2002-09-05 | 2008-04-10 | Ford Global Tech Llc | Electric heating for motor vehicles and regulatory procedures |
US7506338B2 (en) * | 2004-08-30 | 2009-03-17 | International Business Machines Corporation | Method and apparatus for simplifying the deployment and serviceability of commercial software environments |
US7739738B1 (en) | 2006-03-15 | 2010-06-15 | Symantec Corporation | Enabling clean file cache persistence using dual-boot detection |
US20090006744A1 (en) | 2007-06-28 | 2009-01-01 | Cavallo Joseph S | Automated intermittent data mirroring volumes |
US8850428B2 (en) | 2009-11-12 | 2014-09-30 | Trustware International Limited | User transparent virtualization method for protecting computer programs and data from hostile code |
-
2005
- 2005-06-02 US US11/141,909 patent/US7613930B2/en active Active
-
2006
- 2006-05-23 WO PCT/IB2006/003831 patent/WO2007042940A2/en active Application Filing
-
2009
- 2009-09-02 US US12/553,084 patent/US8078886B2/en not_active Expired - Lifetime
-
2011
- 2011-12-09 US US13/316,442 patent/US8484483B2/en not_active Expired - Lifetime
-
2013
- 2013-07-08 US US13/937,136 patent/US8838994B2/en not_active Expired - Lifetime
-
2014
- 2014-09-03 US US14/476,693 patent/US9390262B2/en not_active Expired - Lifetime
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005043360A1 (en) * | 2003-10-21 | 2005-05-12 | Green Border Technologies | Systems and methods for secure client applications |
Non-Patent Citations (2)
Title |
---|
GHORMLEY D P ET AL: "SLIC: AN EXTENSIBILITY SZSTEM FOR COMMODITY OPERATING SYSTEMS", PROCEEDINGS OF THE USENIX ANNUAL TECHNICAL CONFERENCE, 15 June 1998 (1998-06-15), pages 39 - 52, XP000881295 * |
GOLDBERG I ET AL: "A secure environment for untrusted helper applications", INTERNET CITATION, 22 July 1996 (1996-07-22), XP002377441, Retrieved from the Internet <URL:http://www.cs.berkeley.edu/ daw/papers/janus-usenix96.ps> [retrieved on 20060419] * |
Also Published As
Publication number | Publication date |
---|---|
US20050223239A1 (en) | 2005-10-06 |
US20140373181A1 (en) | 2014-12-18 |
US20130298234A1 (en) | 2013-11-07 |
US20100058472A1 (en) | 2010-03-04 |
US20120090029A1 (en) | 2012-04-12 |
US8838994B2 (en) | 2014-09-16 |
US8484483B2 (en) | 2013-07-09 |
WO2007042940A2 (en) | 2007-04-19 |
US9390262B2 (en) | 2016-07-12 |
US7613930B2 (en) | 2009-11-03 |
US8078886B2 (en) | 2011-12-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007042940A3 (en) | Method for protecting computer programs and data from hostile code | |
WO2007077362A3 (en) | Method for authenticating applications of a computer system | |
WO2004049096A3 (en) | Creation of local usage rights voucher | |
WO2006101549A3 (en) | Secure system for allowing the execution of authorized computer program code | |
WO2012115956A3 (en) | Systems and methods for providing a computing device having a secure operating system kernel | |
WO2007061671A3 (en) | Systems and methods for detecting and disabling malicious script code | |
WO2007147495A3 (en) | Method and system for intrusion detection | |
WO2008074382A8 (en) | Obfuscating computer program code | |
WO2007041501A3 (en) | Secure execution environment by preventing execution of unauthorized boot loaders | |
WO2003034188A3 (en) | Method and system for detecting unauthorised executable programs _______________________________________________________________ | |
WO2012088109A3 (en) | Providing a security boundary | |
WO2004055632A3 (en) | Method, system, and computer program product for security within a global computer network | |
WO2008061089A3 (en) | Method and system for trusted/untrusted digital signal processor debugging operations | |
WO2006133222A3 (en) | Constraint injection system for immunizing software programs against vulnerabilities and attacks | |
WO2005001639A3 (en) | Trusted computer system | |
WO2012159940A3 (en) | Method and control unit for detecting manipulations of a vehicle network | |
WO2003005627A3 (en) | Mobile application access control list security system | |
WO2014078585A3 (en) | Methods, systems and computer readable media for detecting command injection attacks | |
WO2007084263A3 (en) | Creating a relatively unique environment for computing platforms | |
WO2005099340A3 (en) | On-line centralized and local authorization of executable files | |
WO2007004219A3 (en) | System, device and method of verifying that a code is executed by a processor | |
WO2006065956A3 (en) | Protecting computing systems from unauthorized programs | |
EP2107489A3 (en) | Obfuscating computer program code | |
WO2008040662A3 (en) | Method for the computer-assisted optimization of the resource utilization of a program | |
MXPA04001386A (en) | Using permissions to allocate device resources to an application. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
NENP | Non-entry into the national phase |
Ref country code: RU |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: RU |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 06831819 Country of ref document: EP Kind code of ref document: A2 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06831819 Country of ref document: EP Kind code of ref document: A2 |