Intentional cascade failure

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S023000, C726S024000, C726S026000, C713S187000, C713S188000, C717S106000

Reexamination Certificate

active

07444677

ABSTRACT:
Additional code is added to sensitive code in order to foil an adversary attempting to examine or modify the sensitive code. The additional code implements a cascade failure system. In the cascade failure system an intrusion is detected by an authorization check, and when an intrusion is detected, further changes are made which will trigger failures of other authorization checks or cause corruptions to the internal execution state of the program. Eventually, the changes will trigger a complete failure of the code to run correctly, however the genesis of the cascading failure will be concealed, so an adversary will not be able to determine how the intrusion was initially detected. The insertion of the additional cascade failure system code can be performed automatically by a mechanism with some random components, and thus the locations and content of the inserted code may be different for each instance of sensitive code into which a content failure system has been inserted.

REFERENCES:
patent: 5583988 (1996-12-01), Crank et al.
patent: 5907709 (1999-05-01), Cantey et al.
patent: 6006328 (1999-12-01), Drake
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6779114 (2004-08-01), Chow et al.
patent: 7051200 (2006-05-01), Manferdelli et al.
patent: 7080257 (2006-07-01), Jakubowski et al.
patent: 7287166 (2007-10-01), Chang et al.
patent: 7383583 (2008-06-01), Marr et al.
patent: 2002/0073323 (2002-06-01), Jordan
patent: 2003/0018906 (2003-01-01), Smith et al.
patent: 2005/0198526 (2005-09-01), Marr et al.
patent: 2005/0198645 (2005-09-01), Marr et al.
US 5,748,741, 05/1998, Johnson et al. (withdrawn)
Aucsmith, D., “Tamper Resistant Software: An Implementation”,Proceedings 1stInternational Information Hiding Workshop(IHW), Cambridge, U.K. 1996, Springer LNCS 1174, 1997, 317-333.
Horne, B. et al., “Dynamic Self-Checking Techniques for Improved Tamper Resistance”,Proceedings 1stACM Workshop on Digital Rights Management(DRM2001), Springer LNCS 2320, 2002, 141-159.
Chinchani, R. et al., “A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors”,1stIEEE Workshop on Information Assurance, Mar. 2003, Germany, 10 Pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Intentional cascade failure does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Intentional cascade failure, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Intentional cascade failure will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4000357

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.