BR112013018294A2 - sistema e método para suportar jit em um sistema seguro com faixas de memórias alocadas randomicamente - Google Patents
sistema e método para suportar jit em um sistema seguro com faixas de memórias alocadas randomicamenteInfo
- Publication number
- BR112013018294A2 BR112013018294A2 BR112013018294A BR112013018294A BR112013018294A2 BR 112013018294 A2 BR112013018294 A2 BR 112013018294A2 BR 112013018294 A BR112013018294 A BR 112013018294A BR 112013018294 A BR112013018294 A BR 112013018294A BR 112013018294 A2 BR112013018294 A2 BR 112013018294A2
- Authority
- BR
- Brazil
- Prior art keywords
- code
- time
- unsigned
- jit
- supporting
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 3
- 230000001052 transient effect Effects 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
- Memory System Of A Hierarchy Structure (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Devices For Executing Special Programs (AREA)
Abstract
sistema e método para suportar jit em um sistema seguro com faixas de memórias alocadas randomicamente a presente invenição refere-se a sistemas, métodos e meios de armazenamento não transitórios, legíveis em computador, para processamento de código just-in-time em um dispositivo que impõe uma exigência de assinatura de código. a descrição inclui recebimento de código de computador, em que uma porção do código just-in-time executável, em um dispositivo que impõe uma exigência de assinatura de código; identificação da porção executável de código just-in-time não assinado; alocação de uma região de memória selecionada randomicamente no dispositivo para pelo menos alguma da porção executável just-in-time não assinada; e execução da porção de código executável just-in-time não assinada na região da memória selecionada randomicamente, como se a porção de código executável just-in-time não assinada fosse código de computador assinado.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/008,880 US8646050B2 (en) | 2011-01-18 | 2011-01-18 | System and method for supporting JIT in a secure system with randomly allocated memory ranges |
PCT/US2012/021696 WO2012099945A1 (en) | 2011-01-18 | 2012-01-18 | System and method for supporting jit in a secure system with randomly allocated memory ranges |
Publications (1)
Publication Number | Publication Date |
---|---|
BR112013018294A2 true BR112013018294A2 (pt) | 2016-11-16 |
Family
ID=45615051
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112013018294A BR112013018294A2 (pt) | 2011-01-18 | 2012-01-18 | sistema e método para suportar jit em um sistema seguro com faixas de memórias alocadas randomicamente |
Country Status (11)
Country | Link |
---|---|
US (1) | US8646050B2 (pt) |
EP (1) | EP2666116B1 (pt) |
JP (1) | JP5647360B2 (pt) |
KR (1) | KR101504857B1 (pt) |
CN (1) | CN103329139B (pt) |
AU (1) | AU2012200181B2 (pt) |
BR (1) | BR112013018294A2 (pt) |
DE (1) | DE102012200613A1 (pt) |
GB (1) | GB2487645B (pt) |
MX (1) | MX2013008218A (pt) |
WO (1) | WO2012099945A1 (pt) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9135434B2 (en) * | 2010-04-19 | 2015-09-15 | Appcentral, Inc. | System and method for third party creation of applications for mobile appliances |
US8646050B2 (en) * | 2011-01-18 | 2014-02-04 | Apple Inc. | System and method for supporting JIT in a secure system with randomly allocated memory ranges |
US10193927B2 (en) * | 2012-02-27 | 2019-01-29 | University Of Virginia Patent Foundation | Method of instruction location randomization (ILR) and related system |
US9111093B1 (en) * | 2014-01-19 | 2015-08-18 | Google Inc. | Using signals from developer clusters |
US9130996B1 (en) * | 2014-03-26 | 2015-09-08 | Iboss, Inc. | Network notifications |
US9361102B2 (en) * | 2014-06-09 | 2016-06-07 | Lehigh University | Methods for enforcing control flow of a computer program |
US9390260B2 (en) * | 2014-06-09 | 2016-07-12 | Lehigh University | Methods for enforcing control flow of a computer program |
US10311228B2 (en) | 2014-09-30 | 2019-06-04 | Apple Inc. | Using a fine-grained address space layout randomization to mitigate potential security exploits |
US10311227B2 (en) | 2014-09-30 | 2019-06-04 | Apple Inc. | Obfuscation of an address space layout randomization mapping in a data processing system |
US9507526B2 (en) * | 2014-11-14 | 2016-11-29 | Netapp, Inc. | Just-in time remote data storage allocation |
US10303885B2 (en) | 2016-03-02 | 2019-05-28 | Apple Inc. | Methods and systems for securely executing untrusted software |
US10268601B2 (en) | 2016-06-17 | 2019-04-23 | Massachusetts Institute Of Technology | Timely randomized memory protection |
US10310991B2 (en) * | 2016-08-11 | 2019-06-04 | Massachusetts Institute Of Technology | Timely address space randomization |
US10810137B2 (en) | 2017-02-27 | 2020-10-20 | Red Hat, Inc. | Physical address randomization for secure encrypted memory |
US11017078B2 (en) * | 2018-04-24 | 2021-05-25 | Microsoft Technology Licensing, Llc | Environmentally-trained time dilation |
US10965444B2 (en) | 2018-04-24 | 2021-03-30 | Microsoft Technology Licensing, Llc | Mitigating timing attacks via dynamically triggered time dilation |
US10785017B2 (en) | 2018-04-24 | 2020-09-22 | Microsoft Technology Licensing, Llc | Mitigating timing attacks via dynamically scaled time dilation |
US11593483B2 (en) * | 2018-12-19 | 2023-02-28 | The Board Of Regents Of The University Of Texas System | Guarder: an efficient heap allocator with strongest and tunable security |
US10747510B1 (en) * | 2019-06-04 | 2020-08-18 | Apptimize Llc | Application runtime modification |
Family Cites Families (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69323926T2 (de) * | 1992-05-15 | 1999-09-30 | Addison M. Fischer | Verfahren und Vorrichtung zur Sicherheit eines Computersystem mit Programmberechtigungsdatenstrukturen |
US5412717A (en) * | 1992-05-15 | 1995-05-02 | Fischer; Addison M. | Computer system security method and apparatus having program authorization information data structures |
JPH10301773A (ja) * | 1997-04-30 | 1998-11-13 | Sony Corp | 情報処理装置および情報処理方法、並びに記録媒体 |
US6308315B1 (en) * | 1998-10-14 | 2001-10-23 | Sun Microsystems, Inc. | System and method for automatically and selectively promoting object variables to method fields and variables in a digital computer system |
JP2000207223A (ja) * | 1999-01-12 | 2000-07-28 | Matsushita Electric Ind Co Ltd | 並列処理向けのプログラム処理方法および装置、並びに並列処理向けのプログラム処理を実行するプログラムを記録した記録媒体および並列処理向けの命令列を記録した記録媒体 |
JP3355602B2 (ja) * | 1999-01-27 | 2002-12-09 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 多次元配列オブジェクトの処理方法及び装置 |
US20110178613A9 (en) * | 2000-02-14 | 2011-07-21 | Pierre Bonnat | Method And System For Processing Signals For A MEMS Detector That Enables Control Of A Device Using Human Breath |
US6922782B1 (en) * | 2000-06-15 | 2005-07-26 | International Business Machines Corporation | Apparatus and method for ensuring data integrity of unauthenticated code |
US7302467B2 (en) * | 2000-08-07 | 2007-11-27 | Sony Corporation | Information processing device and information processing method, service providing system, and computer-executable program for the same |
US6883165B1 (en) * | 2000-09-28 | 2005-04-19 | International Business Machines Corporation | Apparatus and method for avoiding deadlocks in a multithreaded environment |
US20020099563A1 (en) * | 2001-01-19 | 2002-07-25 | Michael Adendorff | Data warehouse system |
US7526811B1 (en) * | 2001-05-22 | 2009-04-28 | Novell, Inc. | Methods for detecting executable code which has been altered |
JP2004303114A (ja) * | 2003-04-01 | 2004-10-28 | Hitachi Ltd | インタープリタおよびネイティブコード実行方法 |
US7380242B2 (en) * | 2003-05-14 | 2008-05-27 | Mainsoft Israel Ltd. | Compiler and software product for compiling intermediate language bytecodes into Java bytecodes |
US7634778B2 (en) * | 2003-06-26 | 2009-12-15 | Microsoft Corporation | Operating system managing a linked list of callback dynamic function tables for acquiring exception handling information from a runtime environment |
US7797239B2 (en) * | 2004-03-12 | 2010-09-14 | Sybase, Inc. | Hierarchical entitlement system with integrated inheritance and limit checks |
US7191422B1 (en) * | 2004-05-26 | 2007-03-13 | Sun Microsystems, Inc. | System and method for determining a carrier layout using cornered chip-to-chip input/output |
US7260691B2 (en) * | 2004-06-30 | 2007-08-21 | Intel Corporation | Apparatus and method for initialization of a double-sided DIMM having at least one pair of mirrored pins |
US20060009112A1 (en) * | 2004-07-06 | 2006-01-12 | Guenther Donald E | Electronic random message storage and generation novelty device |
US7502928B2 (en) * | 2004-11-12 | 2009-03-10 | Sony Computer Entertainment Inc. | Methods and apparatus for secure data processing and transmission |
US7546430B1 (en) * | 2005-08-15 | 2009-06-09 | Wehnus, Llc | Method of address space layout randomization for windows operating systems |
JP4754299B2 (ja) * | 2005-08-18 | 2011-08-24 | 株式会社エヌ・ティ・ティ・データ | 情報処理装置 |
US20070283336A1 (en) * | 2006-06-01 | 2007-12-06 | Michael Karl Gschwind | System and method for just-in-time compilation in a heterogeneous processing environment |
US20070283117A1 (en) * | 2006-06-05 | 2007-12-06 | Microsoft Corporation | Unmanaged memory accessor |
US8028148B2 (en) * | 2006-09-06 | 2011-09-27 | Microsoft Corporation | Safe and efficient allocation of memory |
JP4598857B2 (ja) * | 2006-09-11 | 2010-12-15 | パナソニック株式会社 | Icカード、およびそのアクセス制御方法 |
US20080127142A1 (en) | 2006-11-28 | 2008-05-29 | Microsoft Corporation | Compiling executable code into a less-trusted address space |
US8875271B2 (en) * | 2006-12-08 | 2014-10-28 | Microsoft Corporation | Executing unsigned content and securing access in a closed system |
JP4473256B2 (ja) * | 2006-12-27 | 2010-06-02 | インターナショナル・ビジネス・マシーンズ・コーポレーション | アプリケーションプログラムによるリソースアクセスを制御するための情報処理装置、方法、及びプログラム |
US8413125B2 (en) * | 2007-01-26 | 2013-04-02 | Oracle International Corporation | Asynchronous dynamic compilation based on multi-session profiling to produce shared native code |
JP4930078B2 (ja) * | 2007-01-31 | 2012-05-09 | 富士通株式会社 | 情報処理方法、情報処理装置、情報処理プログラムおよび該プログラムを記録した記録媒体 |
US8561135B2 (en) * | 2007-12-28 | 2013-10-15 | Motorola Mobility Llc | Wireless device authentication using digital certificates |
US8819647B2 (en) * | 2008-01-25 | 2014-08-26 | International Business Machines Corporation | Performance improvements for nested virtual machines |
CN101515300B (zh) * | 2009-04-02 | 2011-07-20 | 阿里巴巴集团控股有限公司 | 一种Ajax网页内容的抓取方法及*** |
JP2011002976A (ja) * | 2009-06-18 | 2011-01-06 | Panasonic Corp | プログラム実行制御装置 |
US20110191848A1 (en) * | 2010-02-03 | 2011-08-04 | Microsoft Corporation | Preventing malicious just-in-time spraying attacks |
US8646050B2 (en) * | 2011-01-18 | 2014-02-04 | Apple Inc. | System and method for supporting JIT in a secure system with randomly allocated memory ranges |
-
2011
- 2011-01-18 US US13/008,880 patent/US8646050B2/en active Active
-
2012
- 2012-01-12 AU AU2012200181A patent/AU2012200181B2/en not_active Ceased
- 2012-01-17 DE DE102012200613A patent/DE102012200613A1/de not_active Ceased
- 2012-01-18 JP JP2013550558A patent/JP5647360B2/ja not_active Expired - Fee Related
- 2012-01-18 CN CN201280005660.8A patent/CN103329139B/zh not_active Expired - Fee Related
- 2012-01-18 BR BR112013018294A patent/BR112013018294A2/pt not_active IP Right Cessation
- 2012-01-18 EP EP12704460.0A patent/EP2666116B1/en not_active Not-in-force
- 2012-01-18 GB GB1200836.3A patent/GB2487645B/en not_active Expired - Fee Related
- 2012-01-18 MX MX2013008218A patent/MX2013008218A/es not_active Application Discontinuation
- 2012-01-18 KR KR1020137021671A patent/KR101504857B1/ko active IP Right Grant
- 2012-01-18 WO PCT/US2012/021696 patent/WO2012099945A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
EP2666116A1 (en) | 2013-11-27 |
EP2666116B1 (en) | 2018-01-10 |
CN103329139B (zh) | 2016-08-10 |
KR20130114733A (ko) | 2013-10-17 |
JP2014504764A (ja) | 2014-02-24 |
AU2012200181B2 (en) | 2014-04-17 |
KR101504857B1 (ko) | 2015-03-20 |
DE102012200613A1 (de) | 2012-12-06 |
MX2013008218A (es) | 2013-08-09 |
GB201200836D0 (en) | 2012-02-29 |
GB2487645B (en) | 2014-03-19 |
US20120185700A1 (en) | 2012-07-19 |
JP5647360B2 (ja) | 2014-12-24 |
AU2012200181A1 (en) | 2012-08-02 |
CN103329139A (zh) | 2013-09-25 |
WO2012099945A1 (en) | 2012-07-26 |
US8646050B2 (en) | 2014-02-04 |
GB2487645A (en) | 2012-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112013018294A2 (pt) | sistema e método para suportar jit em um sistema seguro com faixas de memórias alocadas randomicamente | |
MX2017002542A (es) | Sistema y metodo para la gestion de un espacio de estacionamiento. | |
BR112016021172A2 (pt) | Método para armazenar dados por dispositivo de armazenamento e dispositivo de armazenamento | |
BR112015032123A8 (pt) | método, um ou mais meios de armazenamento não-transitório legível por computador e sistema | |
BR112016014387A2 (pt) | Sistemas, métodos e aparelho para composição e/ou recuperação digital | |
CL2017002887A1 (es) | Exhibición inteligente de recordatorios. | |
BR112015005588A2 (pt) | sistema e método implementado por computador para perfilamento de utilização de recursos de computação. | |
BR112013032037A2 (pt) | método para processar uma solicitação de pesquisa, meio legível por computador, programa legível por computador e sistema para processar uma solicitação de pesquisa | |
BR112018004593A2 (pt) | sistemas e métodos para atualizar dados de contas de proprietários de cartões | |
BR112018005164A2 (pt) | anticorpos, ácido nucleico, célula hospedeira, método para produzir um anticorpo, formulação farmacêutica, uso do anticorpo e método de tratamento de um indivíduo que tem câncer | |
MX2017001845A (es) | Asistente para el estacionamiento en paralelo. | |
BR112015024773A8 (pt) | Método, sistema e aparelho para comparação de imagens | |
BR112013030584A2 (pt) | sistema e método para preservar referências em sandboxes | |
BR112014030210A2 (pt) | métodos e aparelhos para determinar impressões usando informações demográficas distribuídas | |
CL2016000138A1 (es) | Sistema, dispositivo inteligente y método de repartición de las operaciones y de los costes de un dispositivo inteligente. | |
BR112015026753A2 (pt) | método e dispositivo para a gestão de memória de dispositivo de usuário | |
BR112014030585A2 (pt) | sistema de processamento de informação, método executado por um sistema de processamento de informação, e, meio legível por computador não transitório | |
BR112014018995A2 (pt) | Sistemas para executar ensaio automatizado | |
CL2017001389A1 (es) | Manejo de permisos de acceso a cuadernos de clase y sus grupos de sección en una aplicación de cuaderno | |
BR112014018864A8 (pt) | Sistema de categorização de resultado de pesquisa e método implementado por computador | |
BR112016016822A2 (pt) | métodos para operar um dispositivo e para conduzir uma transação, meio legível por computador não transitório, e, sistema para conduzir uma transação | |
BR112018011027A2 (pt) | técnicas para alocação de casos | |
BR112016009697A2 (pt) | ?micropeptídeos e uso dos mesmos para modulação de expressão gênica? | |
BR112016006403A2 (pt) | método e aparelho para executar aplicativo em sistema de comunicação sem fio | |
BR112016008970A2 (pt) | Método de ativação ex vivo e para avaliar ativação plasmática em um indivíduo, ensaio ex vivo para determinar atividade de calicreína plasmática em uma amostra |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B08F | Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette] |
Free format text: REFERENTE A 5A ANUIDADE. |
|
B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |