会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Secure execution of a computer program
    • 安全执行计算机程序
    • US07594111B2
    • 2009-09-22
    • US10740063
    • 2003-12-18
    • Vladimir L. KirianskyDerek L. BrueningSaman P. Amarasinghe
    • Vladimir L. KirianskyDerek L. BrueningSaman P. Amarasinghe
    • G06F21/00
    • G06F21/53G06F21/554
    • Hijacking of an application is prevented by monitoring control flow transfers during program execution in order to enforce a security policy. At least three basic techniques are used. The first technique, Restricted Code Origins (RCO), can restrict execution privileges on the basis of the origins of instruction executed. This distinction can ensure that malicious code masquerading as data is never executed, thwarting a large class of security attacks. The second technique, Restricted Control Transfers (RCT), can restrict control transfers based on instruction type, source, and target. The third technique, Un-Circumventable Sandboxing (UCS), guarantees that sandboxing checks around any program operation will never be bypassed.
    • 通过在程序执行期间监视控制流传输来防止应用程序的劫持,以执行安全策略。 至少使用三种基本技术。 第一种技术限制代码起源(RCO)可以根据执行指令的起源限制执行权限。 这种区别可以确保恶意代码伪装成数据永远不会执行,从而阻止了一大堆安全攻击。 第二种技术,限制控制传输(RCT)可以根据指令类型,源和目标来限制控制传输。 第三种技术,Un-Circumventable Sandboxing(UCS),保证围绕任何程序操作的沙盒检查永远不会被忽略。
    • 5. 发明授权
    • Secure execution of a computer program using a code cache
    • 使用代码缓存来安全地执行计算机程序
    • US07603704B2
    • 2009-10-13
    • US10739499
    • 2003-12-18
    • Derek L. BrueningVladimir L. KirianskySaman P. Amarasinghe
    • Derek L. BrueningVladimir L. KirianskySaman P. Amarasinghe
    • G06F11/00
    • G06F21/566G06F21/52G06F21/54
    • Hijacking of an application is prevented by monitoring control flow transfers during program execution in order to enforce a security policy. At least three basic techniques are used. The first technique, Restricted Code Origins (RCO), can restrict execution privileges on the basis of the origins of instruction executed. This distinction can ensure that malicious code masquerading as data is never executed, thwarting a large class of security attacks. The second technique, Restricted Control Transfers (RCT), can restrict control transfers based on instruction type, source, and target. The third technique, Un-Circumventable Sandboxing (UCS), guarantees that sandboxing checks around any program operation will never be bypassed.
    • 通过在程序执行期间监视控制流传输来防止应用程序的劫持,以执行安全策略。 至少使用三种基本技术。 第一种技术限制代码起源(RCO)可以根据执行指令的起源限制执行权限。 这种区别可以确保恶意代码伪装成数据永远不会执行,从而阻止了一大堆安全攻击。 第二种技术,限制控制传输(RCT)可以根据指令类型,源和目标来限制控制传输。 第三种技术,Un-Circumventable Sandboxing(UCS),保证围绕任何程序操作的沙盒检查永远不会被忽略。
    • 8. 发明授权
    • Sharing and persisting code caches
    • 共享和持久的代码缓存
    • US08321850B2
    • 2012-11-27
    • US12135020
    • 2008-06-06
    • Derek BrueningVladimir L. Kiriansky
    • Derek BrueningVladimir L. Kiriansky
    • G06F9/45
    • G06F8/41G06F12/0862G06F12/1491
    • Computer code from an application program comprising a plurality of modules that each comprise a separately loadable file is code cached in a shared and persistent caching system. A shared code caching engine receives native code comprising at least a portion of a single module of the application program, and stores runtime data corresponding to the native code in a cache data file in the non-volatile memory. The engine then converts cache data file into a code cache file and enables the code cache file to be pre-loaded as a runtime code cache. These steps are repeated to store a plurality of separate code cache files at different locations in non-volatile memory.
    • 来自包括多个模块的应用程序的计算机代码,每个模块各自包括可单独加载的文件,其代码被缓存在共享和持久缓存系统中。 共享代码高速缓存引擎接收包括应用程序的单个模块的至少一部分的本地代码,并将对应于本地代码的运行时间数据存储在非易失性存储器中的高速缓存数据文件中。 然后,引擎将高速缓存数据文件转换为代码高速缓存文件,并使代码缓存文件作为运行时代码高速缓存预加载。 重复这些步骤以将多个单独的代码高速缓存文件存储在非易失性存储器中的不同位置。
    • 9. 发明申请
    • SHARING AND PERSISTING CODE CACHES
    • 共享代码缓存
    • US20090307430A1
    • 2009-12-10
    • US12135020
    • 2008-06-06
    • Derek BRUENINGVladimir L. Kiriansky
    • Derek BRUENINGVladimir L. Kiriansky
    • G06F12/00
    • G06F8/41G06F12/0862G06F12/1491
    • Computer code from an application program comprising a plurality of modules that each comprise a separately loadable file is code cached in a shared and persistent caching system. A shared code caching engine receives native code comprising at least a portion of a single module of the application program, and stores runtime data corresponding to the native code in a cache data file in the non-volatile memory. The engine then converts cache data file into a code cache file and enables the code cache file to be pre-loaded as a runtime code cache. These steps are repeated to store a plurality of separate code cache files at different locations in non-volatile memory.
    • 来自包括多个模块的应用程序的计算机代码,每个模块各自包括可单独加载的文件,其代码被缓存在共享和持久缓存系统中。 共享代码高速缓存引擎接收包括应用程序的单个模块的至少一部分的本地代码,并将对应于本地代码的运行时间数据存储在非易失性存储器中的高速缓存数据文件中。 然后,引擎将高速缓存数据文件转换为代码高速缓存文件,并使代码缓存文件作为运行时代码高速缓存预加载。 重复这些步骤以将多个单独的代码高速缓存文件存储在非易失性存储器中的不同位置。