Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2006-01-17
2010-02-02
Barron, Jr., Gilberto (Department: 2432)
Information security
Monitoring or scanning of software or data including attack...
C713S164000
Reexamination Certificate
active
07657936
ABSTRACT:
A method for preventing time of check to time of use exploits includes receiving a system call from a user space at a system call intercept and copying user space parameters from the user space to a kernel space responsive to the system call. The method also includes copying the user space parameters from the kernel space to a secure location in the user space, receiving the user space parameters from the secure location at the system call intercept, and executing the system call based on the received user space parameters. A computer readable medium including computer readable code and a system for executing the method steps are also disclosed.
REFERENCES:
patent: 7207065 (2007-04-01), Chess et al.
patent: 7266688 (2007-09-01), Fronberg
Horton Brian H.
Kime Christopher F.
Lita Christian
Barron Jr. Gilberto
International Business Machines - Corporation
Kanaan Simon
LeBaw Jeffrey S.
Walder, Jr. Stephen J.
LandOfFree
Method for preventing time of check to time of use exploits does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for preventing time of check to time of use exploits, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for preventing time of check to time of use exploits will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4205717