Method of obfuscating computer instruction streams

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S027000, C726S030000, C713S162000, C713S165000, C713S167000, C713S189000, C717S136000, C717S140000, C717S148000, C717S162000

Reexamination Certificate

active

07322045

ABSTRACT:
Methods and apparatuses for obfuscating computer instruction streams. In one aspect of the invention, an exemplary method includes breaking each of at least two operative instruction streams into a plurality of parts and interleaving the parts into a new instruction stream. In another aspect of the invention, an exemplary method includes breaking each of at least two operative instruction streams into a plurality of parts and interleaving the parts with obfuscation codes into a new instruction stream. The obfuscation codes interrelate the parts from different instruction streams to prevent reversal of interleaving.

REFERENCES:
patent: 5485620 (1996-01-01), Sadre et al.
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 5903761 (1999-05-01), Tyma
patent: 5978883 (1999-11-01), Hanna
patent: 6059840 (2000-05-01), Click, Jr.
patent: 6102966 (2000-08-01), Tyma
patent: 6427234 (2002-07-01), Chambers et al.
patent: 6694435 (2004-02-01), Kiddy
patent: 7134119 (2006-11-01), Nevill
patent: 7152223 (2006-12-01), Brumme et al.
patent: WO- 99/01815 (1994-01-01), None
patent: WO 99/01815 (1999-01-01), None
Cosoroaba, Synchronous DRAM Evolutionary Changes Bring Cost/Performance Advantages in Memory Systems, 1996, IEEE, pp. 360-364.
Low, Java Control Flow Obfuscation, 1998, www.cs.arizona.edu pp. 19-25.
Collberg, Thomborson and Low, A Taxonomy of Obfuscating Transformation, Technical Report Department of Computer Science, University of Auckland Jul. 1997.
Rugaber, et. al. The Interleaving Problem in Program Understanding, Proc. of the secon working conference on Reverse Engineering IEEE Jul. 1995.
PCT International Search Report for PCT Int'l Appln No. US 02/23605 mailed Nov. 26, 2002 (7 pages).
Christian Collberg, Clark Thomborson & Douglas Low, “A Taxonomy of Obfuscating Transformations.”Technical Report, Department of Computer Science, University of Auckland, No. 148 (Jul. 1997), pp. 1-36.
Spencer Rugaber, Kurt Stirewalt, & Linda M. Wills, “The Interleaving Problem in Program Understanding.”Proceedings of the Second Working Conference on Reverse Engineering(Jul. 1995), pp. 1-10.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of obfuscating computer instruction streams does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of obfuscating computer instruction streams, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of obfuscating computer instruction streams will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2771999

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.