Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2004-05-20
2008-05-27
Jung, David Y (Department: 2134)
Information security
Monitoring or scanning of software or data including attack...
C726S025000, C726S026000
Reexamination Certificate
active
07380276
ABSTRACT:
Processor extensions and software verification to support type-safe language environments running with untrusted code. Code and data spaces are partitioned into trusted and untrusted regions. Type-safe code is loaded into the trusted region of the code space, while non-type-safe code is loaded into the untrusted region of the code space. The trusted region of the data space is allocated to the type-safe code. The untrusted region of the data space is allocated to the non-type-safe code. Hardware-based truth tables are employed for defining allowable and disallowable code sequences and memory access operations. For code sequences, allowable operations are based on the location (i.e., region) of a code sequence including a current instruction and a prior instruction. For memory access, the location of the requesting instruction and data requested are considered. Disallowed code sequence or memory access operations cause the processor to generate a safe access protection trap. In response to the safe access protection trap, a software-based dynamic verifier applies a security policy to determine whether to allow the operation to proceed.
REFERENCES:
Security Briefs: Beware of Fully Trusted Code—MSDN Magazine, Apr. 2004; http://msdn.microsoft.com/msdnmag/issues/04/04/SecurityBriefs/, year 2004.
Trusted search software labels fraud site as ‘safe’, http://www.theregister.co.uk/2005/09/27/untrusted—search/, year 2005.
News, SIP: News; Secure Internet Programming; http://www.cs.princeton.edu/sip/history/, year 2000.
Auto-coding/auto-proving flight control software Tudor, N.; Adams, M.; Clayton, P.; O'Halloran, C.; Digital Avionics Systems Conference, 2004. DASC 04, The 23rd vol. 2, Oct. 24-28, 2004 pp. 6.E.4-61-11 vol. 2.
Best practices in code inspection for safety-critical software de Almeida, J.R., Jr.; Camargo, J.B., Jr.; Basseto, B.A.; Paz, S.M.; Software, IEEE vol. 20, Issue 3, May-Jun. 2003 pp. 56-63.
The power of 10: rules for developing safety-critical code Holzmann, G.J.; Computer vol. 39, Issue 6, Jun. 2006 pp. 95-99.
Held James Paul
Saha Bratin
Washburn Weldon
Intel Corporation
Jung David Y
LandOfFree
Processor extensions and software verification to support... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Processor extensions and software verification to support..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Processor extensions and software verification to support... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3984545