Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2004-03-05
2008-10-28
Moazzami, Nasser (Department: 2136)
Information security
Monitoring or scanning of software or data including attack...
C726S023000, C726S024000, C726S026000, C713S187000, C713S188000, C717S106000
Reexamination Certificate
active
07444677
ABSTRACT:
Additional code is added to sensitive code in order to foil an adversary attempting to examine or modify the sensitive code. The additional code implements a cascade failure system. In the cascade failure system an intrusion is detected by an authorization check, and when an intrusion is detected, further changes are made which will trigger failures of other authorization checks or cause corruptions to the internal execution state of the program. Eventually, the changes will trigger a complete failure of the code to run correctly, however the genesis of the cascading failure will be concealed, so an adversary will not be able to determine how the intrusion was initially detected. The insertion of the additional cascade failure system code can be performed automatically by a mechanism with some random components, and thus the locations and content of the inserted code may be different for each instance of sensitive code into which a content failure system has been inserted.
REFERENCES:
patent: 5583988 (1996-12-01), Crank et al.
patent: 5907709 (1999-05-01), Cantey et al.
patent: 6006328 (1999-12-01), Drake
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6779114 (2004-08-01), Chow et al.
patent: 7051200 (2006-05-01), Manferdelli et al.
patent: 7080257 (2006-07-01), Jakubowski et al.
patent: 7287166 (2007-10-01), Chang et al.
patent: 7383583 (2008-06-01), Marr et al.
patent: 2002/0073323 (2002-06-01), Jordan
patent: 2003/0018906 (2003-01-01), Smith et al.
patent: 2005/0198526 (2005-09-01), Marr et al.
patent: 2005/0198645 (2005-09-01), Marr et al.
US 5,748,741, 05/1998, Johnson et al. (withdrawn)
Aucsmith, D., “Tamper Resistant Software: An Implementation”,Proceedings 1stInternational Information Hiding Workshop(IHW), Cambridge, U.K. 1996, Springer LNCS 1174, 1997, 317-333.
Horne, B. et al., “Dynamic Self-Checking Techniques for Improved Tamper Resistance”,Proceedings 1stACM Workshop on Digital Rights Management(DRM2001), Springer LNCS 2320, 2002, 141-159.
Chinchani, R. et al., “A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors”,1stIEEE Workshop on Information Assurance, Mar. 2003, Germany, 10 Pages.
Abedin Shanto M
Microsoft Corporation
Moazzami Nasser
Woodcock & Washburn LLP
LandOfFree
Intentional cascade failure does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Intentional cascade failure, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Intentional cascade failure will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4000357