Image verification

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C719S330000, C719S331000

Reexamination Certificate

active

07577997

ABSTRACT:
Tampering with pieces of software is inhibited. Software obfuscation inhibits reverse engineering by hackers by manipulating names of functions and adding jump instructions into various pieces of software. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.

REFERENCES:
patent: 5748739 (1998-05-01), Press
patent: 5794232 (1998-08-01), Mahlum et al.
patent: 5802368 (1998-09-01), Grigsby et al.
patent: 5845129 (1998-12-01), Wendorf et al.
patent: 5915019 (1999-06-01), Ginter et al.
patent: 6006328 (1999-12-01), Drake
patent: 6236971 (2001-05-01), Stefik et al.
patent: 6731756 (2004-05-01), Pizano et al.
patent: 6978303 (2005-12-01), McCreesh et al.
patent: 7000100 (2006-02-01), Lacombe et al.
patent: 7146505 (2006-12-01), Harada et al.
patent: 7281271 (2007-10-01), Szor
patent: 7424615 (2008-09-01), Jalbert et al.
patent: 2001/0027383 (2001-10-01), Maliszewski
patent: 2002/0002678 (2002-01-01), Chow et al.
patent: 2002/0062451 (2002-05-01), Scheidt et al.
patent: 2003/0097577 (2003-05-01), Sotoodeh et al.
patent: 2003/0208562 (2003-11-01), Hauck et al.
patent: 2004/0107368 (2004-06-01), Colvin
patent: 2004/0158708 (2004-08-01), Peyravian et al.
patent: 2004/0260953 (2004-12-01), Jamieson et al.
patent: WO 99/01815 (1999-01-01), None
patent: WO0208873 (2002-01-01), None
patent: WO 03/007571 (2003-01-01), None
Microsoft, Creating and Using Dynamic Link Library, printed year 2008.
Rector, .NET Obfuscation and Intellectual Property, year 2002.
Execution characteristics of desktop applications on Windows NT Lee, D.C.; Crowley, P.J.; Baer, J.-L.; Anderson, T.E.; Bershad, B.N.; Computer Architecture, 1998. Proceedings. The 25th Annual International Symposium on Jun. 27-Jul. 1, 1998 pp. 27-38.
Detection of DLL Inserted by Windows Malicious Code Moonsu Jang; Hongchul Kim; Youngtae Yun; Convergence Information Technology, 2007. International Conference on Nov. 21-23, 2007 pp. 1059-1064.
An Empirical Study for Security of Windows DLL Files Using Automated API Fuzz Testing YoungHan Choi; HyoungChun Kim; DoHoon Lee; Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on vol. 2, Feb. 17-20, 2008 pp. 1473-1475.
Labir, E., “Unpacking by Code Injection,”The CodeBreakers Journal1(2):1-16, 2004.
PCT/US05/20638, International Search Report and Written Opinion, Jan. 18, 2006.
“Code Integrity (ci.dll) Security Policy,” http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp890,pdf, printed out in 2008 (pp. 1-6).
“Description of El-Gammal (one of the inventors),” http://www.linkedin.com/pub/5/985/36, printed out in 2008 (pp. 1-2).
“Library (computing),”Wikipedia, http://en.wikipedia.org/wiki/library—(computing) printed out in 2008 (pp. 1-8).
“List of Unicode Directors,”Unicode Consortium, http://unicode.org/consortium/directors.html, printed out in 2008, which includes Julie Bennett of Microsoft (pp. 1-9).
“Sorting it all Out,”MSDN Blogs, http://blogs.msdn.com/michkap/archive/2005/02/12/371650.aspx, including a section on Julie Bennett, printed out in 2008 (7 pages).
“Unicode Directors,”Unicode Consortium, http://unicode.org/consortium/directors.html, listing Julie Bennett, printed out in 2008 (pp. 1-9).
Baldi et al. “The TrustedFlow™ Protocol Idiosyncratic Signatures for Authenticated Execution” copyright 2002, presented in Jun. 2003 at West Point, New York (2 pages).
Eyers et al., “Compile-Time Enforcement of Dynamic Security Policies,”IEEE Workshop, pp. 119-126 (2008).
Jochen et al., “Towards the Safe Use of Dynamically Transformed Itinerant Software,”Univ. of Delaware(printed 2008) 7 pages.
Kaplan, Michael, “Lunch with Julie Bennett,”MSDN Blogs—Sorting it all Out, http://blogs.msdn.com/michkap/archive/2005/02/12/371650.aspx, printed out in 2008 (pp. 1-7) (see pp. 2 and 3).
Madou et al. “Software Protection Through Dynamic Code Mutation”In Information Security Applications, (2005) (15 pages).
Memon et al., “Preventing Reverse Engineering Threat in Java Using Byte Code Obfuscation Techniques,”IEEE-ICET, pp. 689-694 (2006).
Petkac et al., “Security Agility for Dynamic Execution Environments,”DARPA contract(printed 2008).
Preda et al., “Control Code Obfuscation by Abstract Interpretation,”IEEE, 10 pages (2005).
Udupa et al., Deobfuscation Reverse Engineering Obfuscated Code,IEEE, 10 pages (2005).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Image verification does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Image verification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Image verification will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4065156

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.