Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2008-01-22
2008-01-22
Vu, Kim (Department: 2135)
Information security
Prevention of unauthorized use of data including prevention...
C726S027000, C726S030000, C713S162000, C713S165000, C713S167000, C713S189000, C717S136000, C717S140000, C717S148000, C717S162000
Reexamination Certificate
active
07322045
ABSTRACT:
Methods and apparatuses for obfuscating computer instruction streams. In one aspect of the invention, an exemplary method includes breaking each of at least two operative instruction streams into a plurality of parts and interleaving the parts into a new instruction stream. In another aspect of the invention, an exemplary method includes breaking each of at least two operative instruction streams into a plurality of parts and interleaving the parts with obfuscation codes into a new instruction stream. The obfuscation codes interrelate the parts from different instruction streams to prevent reversal of interleaving.
REFERENCES:
patent: 5485620 (1996-01-01), Sadre et al.
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 5903761 (1999-05-01), Tyma
patent: 5978883 (1999-11-01), Hanna
patent: 6059840 (2000-05-01), Click, Jr.
patent: 6102966 (2000-08-01), Tyma
patent: 6427234 (2002-07-01), Chambers et al.
patent: 6694435 (2004-02-01), Kiddy
patent: 7134119 (2006-11-01), Nevill
patent: 7152223 (2006-12-01), Brumme et al.
patent: WO- 99/01815 (1994-01-01), None
patent: WO 99/01815 (1999-01-01), None
Cosoroaba, Synchronous DRAM Evolutionary Changes Bring Cost/Performance Advantages in Memory Systems, 1996, IEEE, pp. 360-364.
Low, Java Control Flow Obfuscation, 1998, www.cs.arizona.edu pp. 19-25.
Collberg, Thomborson and Low, A Taxonomy of Obfuscating Transformation, Technical Report Department of Computer Science, University of Auckland Jul. 1997.
Rugaber, et. al. The Interleaving Problem in Program Understanding, Proc. of the secon working conference on Reverse Engineering IEEE Jul. 1995.
PCT International Search Report for PCT Int'l Appln No. US 02/23605 mailed Nov. 26, 2002 (7 pages).
Christian Collberg, Clark Thomborson & Douglas Low, “A Taxonomy of Obfuscating Transformations.”Technical Report, Department of Computer Science, University of Auckland, No. 148 (Jul. 1997), pp. 1-36.
Spencer Rugaber, Kurt Stirewalt, & Linda M. Wills, “The Interleaving Problem in Program Understanding.”Proceedings of the Second Working Conference on Reverse Engineering(Jul. 1995), pp. 1-10.
Apple Inc.
Blakely , Sokoloff, Taylor & Zafman LLP
Dada Beemnet W
Vu Kim
LandOfFree
Method of obfuscating computer instruction streams does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of obfuscating computer instruction streams, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of obfuscating computer instruction streams will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2771999