Method of defending software from debugger attacks

Electrical computers and digital processing systems: support – Data processing protection using cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S187000, C713S194000, C717S124000, C717S129000, C726S022000, C726S026000

Reexamination Certificate

active

07149900

ABSTRACT:
Deterring an attack on a tamper-resistant application program may be accomplished by loading a plurality of agents and starting a plurality of processing threads, each thread executing one of the agents, concurrently executing each agent substantially in parallel to produce a processing result for each agent for an iteration of a stage of protocol processing, storing each processing result in an entry in a buffer associated with each agent, and repeating the executing and storing actions for multiple iterations of the protocol processing. When one of the agents stores a processing result in a last entry of the agent's buffer, the processing results from the first entries in the buffers are combined to produce a combined result, and if the combined result indicates an error, failure semantics may be executed.

REFERENCES:
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 6105137 (2000-08-01), Graunke et al.
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6330670 (2001-12-01), England et al.
patent: 6795845 (2004-09-01), Kalafatis et al.
patent: 2002/0042884 (2002-04-01), Wu et al.
patent: 2002/0049909 (2002-04-01), Jackson et al.
patent: 2002/0166085 (2002-11-01), Peikari
patent: WO 99/01815 (1999-01-01), None
S. I Hyder, et al., “A Unified Model for Concurrent Debugging,” International Conference on Parallel Processing, 1993, pp. II-58-II-67, USA.
Peter A. Buhr, et al., “KDB: A Multi-Threaded Debugger for Multi-Threaded Applications,” SPDT '96, pp. 80-87, Philadelphia, Pa, USA.
Michael B. Jones, et al., “CPU Reservations and Time Constraints: Efficient, Predictable Scheduling of Independent Activities,” SOSP-16, Oct. 1997, pp. 198-211 Saint-Malo, France.
Partha Pal, et al., “Survival by Defense-Enabling,” NSPW'01, Sep. 10-13th, 2002 pp. 71-78, Cloudcroft, New Mexico, USA.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of defending software from debugger attacks does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of defending software from debugger attacks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of defending software from debugger attacks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3688482

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.