Hardware constrained software execution

Electrical computers and digital processing systems: processing – Processing control – Instruction modification based on condition

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C712S228000

Reexamination Certificate

active

08010773

ABSTRACT:
Restricting execution by a computing device of instructions within an application program. The application program is modified such that execution of the selected instructions is dependent upon a corresponding expected state of one or more hardware components in the computing device. In an embodiment, the application program is modified to place the hardware components in the expected states prior to execution of the corresponding selected instructions. Creating the dependency on the hardware components prevents the unintended or malicious execution of the selected instructions.

REFERENCES:
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 6069647 (2000-05-01), Sullivan et al.
patent: 6175925 (2001-01-01), Nardone et al.
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6230307 (2001-05-01), Davis et al.
patent: 6453470 (2002-09-01), Gazda et al.
patent: 7085670 (2006-08-01), Odom et al.
patent: 7249351 (2007-07-01), Songer et al.
patent: 2005/0144471 (2005-06-01), Shupak et al.
patent: 2006/0101047 (2006-05-01), Rice
patent: 2007/0083738 (2007-04-01), Fischer
patent: 2382891 (2003-06-01), None
Forrest et al.; Building Diverse Computer Systems; 1997; IEEE Workshop on Hot Topics in Operating Systems.
Barrantes, et al., “Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks”, Conference on Computer and Communications Security, Proceedings of the 10th ACM conference on Computer and communications security, Date: Oct. 27-30, 2003, 10 Pages, Publisher: ACM Press New York, USA.
Schellekens, et al., “Remote Attestation on Legacy Operating Systems with Trusted Platform Modules”, Electronic Notes in Theoretical Computer Science (ENTCS), Date: 2008, pp. 59-72, vol. 197, Issue: 1, Publisher: Elsevier Science Publishers B. V. Amsterdam, The Netherlands, The Netherlands.
Seshadri, et al., “Pioneer Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems”, ACM Symposium on Operating Systems Principles, Proceedings of the twentieth ACM symposium on Operating systems principles, date: Oct. 23-26, 2005, 16 Pages, Publisher: ACM Press New York, USA.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Hardware constrained software execution does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Hardware constrained software execution, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hardware constrained software execution will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2771520

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.