Electrical computers and digital processing systems: support – Data processing protection using cryptography – Computer instruction/address encryption
Reexamination Certificate
2003-09-25
2008-08-19
Vu, Klmyen (Department: 2135)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
Computer instruction/address encryption
C726S026000, C707S793000, C717S127000, C713S194000, C711S163000, C711S164000
Reexamination Certificate
active
07415618
ABSTRACT:
Obfuscating an application program comprises reading an application program comprising code, transforming the application program code into transformed application program code that uses one of multiple opcode value encoding schemes of a dispatch table associated with the application program, and sending the transformed application program code. Executing an obfuscated application program comprises receiving an obfuscated application program comprising at least one instruction opcode value encoded using one of multiple instruction set opcode value encoding schemes, determining a dispatch table associated with the application program, and executing the application program using the associated dispatch table. The dispatch table corresponds to the one of multiple instruction set opcode value encoding schemes.
REFERENCES:
patent: 4434436 (1984-02-01), Kleykamp et al.
patent: 5057997 (1991-10-01), Chang et al.
patent: 5136705 (1992-08-01), Stubbs et al.
patent: 5367687 (1994-11-01), Tarsy et al.
patent: 5463746 (1995-10-01), Brodnax et al.
patent: 5524256 (1996-06-01), Turkowski
patent: 5636352 (1997-06-01), Bealkowski et al.
patent: 5659754 (1997-08-01), Grove et al.
patent: 5819117 (1998-10-01), Hansen
patent: 5828853 (1998-10-01), Regal
patent: 5887161 (1999-03-01), Cheong et al.
patent: 5905876 (1999-05-01), Pawlowski et al.
patent: 5913064 (1999-06-01), Chen
patent: 5968164 (1999-10-01), Loen et al.
patent: 5999732 (1999-12-01), Bak et al.
patent: 6006328 (1999-12-01), Drake
patent: 6081665 (2000-06-01), Nilsen et al.
patent: 6098056 (2000-08-01), Rusnak et al.
patent: 6101606 (2000-08-01), Diersch et al.
patent: 6175925 (2001-01-01), Nardone et al.
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6266416 (2001-07-01), Sigbjørnsen et al.
patent: 6272616 (2001-08-01), Fernando et al.
patent: 6289455 (2001-09-01), Kocher et al.
patent: 6308256 (2001-10-01), Folmsbee
patent: 6334189 (2001-12-01), Granger et al.
patent: 6374402 (2002-04-01), Schmeidler et al.
patent: 6449721 (2002-09-01), Pensak et al.
patent: 6480959 (2002-11-01), Granger et al.
patent: 6594761 (2003-07-01), Chow et al.
patent: 6598166 (2003-07-01), Folmsbee
patent: 6609201 (2003-08-01), Folmsbee
patent: 6615350 (2003-09-01), Schell et al.
patent: 6640305 (2003-10-01), Kocher et al.
patent: 6643775 (2003-11-01), Granger et al.
patent: 6665796 (2003-12-01), Folmsbee
patent: 6668325 (2003-12-01), Collberg et al.
patent: 6675298 (2004-01-01), Folmsbee
patent: 6694435 (2004-02-01), Kiddy
patent: 6757831 (2004-06-01), Folmsbee
patent: 6779114 (2004-08-01), Chow et al.
patent: 6789177 (2004-09-01), Okada
patent: 6842862 (2005-01-01), Chow et al.
patent: 6862683 (2005-03-01), Wille et al.
patent: 6871298 (2005-03-01), Cavanaugh et al.
patent: 6966002 (2005-11-01), Torrubia-Saez
patent: 6981217 (2005-12-01), Knauft et al.
patent: 7017188 (2006-03-01), Schmeidler et al.
patent: 7054443 (2006-05-01), Jakubowski et al.
patent: 7065652 (2006-06-01), Xu et al.
patent: 7073713 (2006-07-01), Silverbrook et al.
patent: 7080039 (2006-07-01), Marsh
patent: 7089594 (2006-08-01), Lal et al.
patent: 7124445 (2006-10-01), Cronce et al.
patent: 7127712 (2006-10-01), Noble et al.
patent: 7150003 (2006-12-01), Naumovich et al.
patent: 7170999 (2007-01-01), Kessler et al.
patent: 7193482 (2007-03-01), Silverbrook
patent: 7201319 (2007-04-01), Silverbrook et al.
patent: 2002/0120854 (2002-08-01), LeVine et al.
patent: 2002/0184618 (2002-12-01), Bala et al.
patent: 2003/0093685 (2003-05-01), Tobin
patent: 2003/0123664 (2003-07-01), Pedlow et al.
patent: 2003/0172270 (2003-09-01), Newcombe et al.
patent: 2003/0177391 (2003-09-01), Ofek et al.
patent: 2003/0188187 (2003-10-01), Uchida
patent: 2003/0191938 (2003-10-01), Woods et al.
patent: 2003/0233542 (2003-12-01), Benaloh
patent: 2004/0003264 (2004-01-01), Zeman et al.
patent: 2004/0003278 (2004-01-01), Chen et al.
patent: 2004/0039932 (2004-02-01), Elazar et al.
patent: 2004/0103404 (2004-05-01), Naumovich et al.
patent: 2004/0151306 (2004-08-01), Kiddy
patent: 2004/0260933 (2004-12-01), Lee
patent: 2005/0002053 (2005-01-01), Meador et al.
patent: 2005/0015454 (2005-01-01), Goodman et al.
patent: 2005/0021995 (2005-01-01), Lal et al.
patent: 2005/0044359 (2005-02-01), Eriksson et al.
patent: 2005/0055564 (2005-03-01), Haselden et al.
patent: 2005/0102264 (2005-05-01), Nason et al.
patent: 2006/0026430 (2006-02-01), Luo
patent: 2006/0048228 (2006-03-01), Takemori et al.
patent: 2006/0218539 (2006-09-01), Stiemens et al.
patent: 2006/0271921 (2006-11-01), Cronce et al.
patent: 0 605 872 (1993-12-01), None
patent: 0 751 458 (1996-05-01), None
patent: 0 821 305 (1997-07-01), None
patent: 1 063 585 (2000-06-01), None
patent: WO 97/45817 (1997-12-01), None
patent: WO 98/59292 (1998-12-01), None
patent: WO 99/08188 (1999-02-01), None
patent: WO 99/08191 (1999-02-01), None
patent: WO 00/75760 (2000-12-01), None
patent: WO 01/79972 (2001-10-01), None
patent: WO 02/079955 (2002-10-01), None
patent: WO 2004/027678 (2004-04-01), None
Chi-Keung Luk et al., “Compiler-Based Prefetching for Recursive Data Structures”, Department of Computer Science, 1996, pp. 222-233.
Borislav Deianov, “Authentication—Lamport hash and biometrics”, printed from http://www.cs.cornell.edu/html/cs513-sp99/NL12.html, Mar. 4, 1999, pp. 1-3.
Oded Goldreich, “The Foundations of Modern Cryptography”, Version Nr. 3.1, Department of Computer Science and Applied Mathematics, May 2, 1998, pp. 0-41.
Moni Naor et al., “Universal One-Way Hash Functions and their Cryptographic Applications”, Mar. 13, 1995, pp. 1-14.
George C. Necula et al., “Proof-Carrying Code”, School of Computer Science, Nov. 1996, pp. 1-60.
R. Rivest, “The MD4 Message Digest Algorithm”, Request for Comments (RFC) 1320, MIT Laboratory for Computer Science and RSA Data Security , Inc., Apr. 1992, pp. 1-20.
R. Rivest, “The MD5 Message-Digest Algorithm”, Request for Comments (RFC) 1321 MIT Laboratory for Computer Science and RSA Data Security, Inc., Apr. 1992.
“Secure Hash Standard”, Federal Information Processing Standard Publication 180-1, Apr. 17, 1995.
“Smart Card Stage I Description”, Version 1.1, CDMA Development Group—Smart Card Team Document, May 22, 1996.
“Digital Cellular Telecommunications Systems(Phase 2+);AT Command Set for GSM Mobile Equipment(ME)”, ETSI TS 100 916 V7.4.0, 1998.
“Wireless Identity Module Pert: Security” Version 12, Wireless Application Protocol WAP-260-WIM-20010712-a, Jul. 2001.
“3rdGeneration Partnership Project; Technical Specification Group Terminals; USIM and IC Card Requirements(Release 4)”, 3GPP TS 21.111 V4.0.0, 2001.
“3rdGeneration Partnership Project 2: Removable User Identity Module for Spread Spectum Systems” 3GPP2 C.S0023-A, Version 1.0, Sep. 13, 2002, pp. 1-1-5-2, A1-A4.
Dean, Jeffrey, “ProfileMe: Hardware Support for Instruction-Level Profiling on Out-of-Order Processors”, IEEE 1072-4451/97(SUN-P4929).
Collberg et al., “Breaking Abstractions and Unstructuring Data Structures”, IEEE 2005, pp. 1-12 [Online]. Retrieved on Sep. 13, 2005 from the Internet: URL:<http://ieeexplore.ieee.org/xpl/absprintf.jsp?arnumber=674154>.
Collberg et al., “A Taxonomy of Obfuscating Transformations”, 1997, pp. 1-36.
Mambo et al., “A Tentative Approach to Constructing Tamper-Resistant Software”, ACM 1998, pp. 23-33.
Low, “Protecting Java Code via Code Obfuscation”, pp. 1-5 [online]. Retrieved on May 12, 2007 from the Internet: <URL:http//www.acm.org/crossroads/xrds4-3/codeob.html>.
Collberg et al., “Software Watermarking: Models and Dynamic Embeddings”, ACM, 1999, pp. 311-324.
Gunnison Forrest
Gunnison McKay & Hodgson, L.L.P.
Shan April Y
Sun Microsystems Inc.
Vu Klmyen
LandOfFree
Permutation of opcode values for application program... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Permutation of opcode values for application program..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Permutation of opcode values for application program... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4009028