Processor extensions and software verification to support...

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S025000, C726S026000

Reexamination Certificate

active

07380276

ABSTRACT:
Processor extensions and software verification to support type-safe language environments running with untrusted code. Code and data spaces are partitioned into trusted and untrusted regions. Type-safe code is loaded into the trusted region of the code space, while non-type-safe code is loaded into the untrusted region of the code space. The trusted region of the data space is allocated to the type-safe code. The untrusted region of the data space is allocated to the non-type-safe code. Hardware-based truth tables are employed for defining allowable and disallowable code sequences and memory access operations. For code sequences, allowable operations are based on the location (i.e., region) of a code sequence including a current instruction and a prior instruction. For memory access, the location of the requesting instruction and data requested are considered. Disallowed code sequence or memory access operations cause the processor to generate a safe access protection trap. In response to the safe access protection trap, a software-based dynamic verifier applies a security policy to determine whether to allow the operation to proceed.

REFERENCES:
Security Briefs: Beware of Fully Trusted Code—MSDN Magazine, Apr. 2004; http://msdn.microsoft.com/msdnmag/issues/04/04/SecurityBriefs/, year 2004.
Trusted search software labels fraud site as ‘safe’, http://www.theregister.co.uk/2005/09/27/untrusted—search/, year 2005.
News, SIP: News; Secure Internet Programming; http://www.cs.princeton.edu/sip/history/, year 2000.
Auto-coding/auto-proving flight control software Tudor, N.; Adams, M.; Clayton, P.; O'Halloran, C.; Digital Avionics Systems Conference, 2004. DASC 04, The 23rd vol. 2, Oct. 24-28, 2004 pp. 6.E.4-61-11 vol. 2.
Best practices in code inspection for safety-critical software de Almeida, J.R., Jr.; Camargo, J.B., Jr.; Basseto, B.A.; Paz, S.M.; Software, IEEE vol. 20, Issue 3, May-Jun. 2003 pp. 56-63.
The power of 10: rules for developing safety-critical code Holzmann, G.J.; Computer vol. 39, Issue 6, Jun. 2006 pp. 95-99.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Processor extensions and software verification to support... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Processor extensions and software verification to support..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Processor extensions and software verification to support... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3984545

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.