Electrical computers and digital processing systems: processing – Processing control – Instruction modification based on condition
Reexamination Certificate
2011-08-30
2011-08-30
Faherty, Corey S (Department: 2183)
Electrical computers and digital processing systems: processing
Processing control
Instruction modification based on condition
C712S228000
Reexamination Certificate
active
08010773
ABSTRACT:
Restricting execution by a computing device of instructions within an application program. The application program is modified such that execution of the selected instructions is dependent upon a corresponding expected state of one or more hardware components in the computing device. In an embodiment, the application program is modified to place the hardware components in the expected states prior to execution of the corresponding selected instructions. Creating the dependency on the hardware components prevents the unintended or malicious execution of the selected instructions.
REFERENCES:
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 6069647 (2000-05-01), Sullivan et al.
patent: 6175925 (2001-01-01), Nardone et al.
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6230307 (2001-05-01), Davis et al.
patent: 6453470 (2002-09-01), Gazda et al.
patent: 7085670 (2006-08-01), Odom et al.
patent: 7249351 (2007-07-01), Songer et al.
patent: 2005/0144471 (2005-06-01), Shupak et al.
patent: 2006/0101047 (2006-05-01), Rice
patent: 2007/0083738 (2007-04-01), Fischer
patent: 2382891 (2003-06-01), None
Forrest et al.; Building Diverse Computer Systems; 1997; IEEE Workshop on Hot Topics in Operating Systems.
Barrantes, et al., “Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks”, Conference on Computer and Communications Security, Proceedings of the 10th ACM conference on Computer and communications security, Date: Oct. 27-30, 2003, 10 Pages, Publisher: ACM Press New York, USA.
Schellekens, et al., “Remote Attestation on Legacy Operating Systems with Trusted Platform Modules”, Electronic Notes in Theoretical Computer Science (ENTCS), Date: 2008, pp. 59-72, vol. 197, Issue: 1, Publisher: Elsevier Science Publishers B. V. Amsterdam, The Netherlands, The Netherlands.
Seshadri, et al., “Pioneer Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems”, ACM Symposium on Operating Systems Principles, Proceedings of the twentieth ACM symposium on Operating systems principles, date: Oct. 23-26, 2005, 16 Pages, Publisher: ACM Press New York, USA.
Bostanci Hakki Tunc
Dhillon Karan Singh
Goldsmid Aaron Payne
Ide Nathan Jeffrey
McDowell John Richard
Faherty Corey S
Microsoft Corporation
LandOfFree
Hardware constrained software execution does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Hardware constrained software execution, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hardware constrained software execution will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2771520