Protecting mobile code against malicious hosts

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S176000

Reexamination Certificate

active

07877613

ABSTRACT:
Techniques for using a class loader to protect mobile code against a malicious host. The techniques include using the class loader to extend a class used by the mobile code such that a method is added to the code which authenticates the mobile code. When executed, the method provides a dynamic watermark that authenticates the code. The method may be encrypted until it is added to the code. One such method uses a static watermark in the code to determine whether the code has been modified. The techniques also include using a class loader to extend the class such that obfuscated symbolic names in the program that correspond to symbolic names defined by the class can be resolved. A way of doing this is to include a first association between the obfuscated symbolic names and encrypted forms of the corresponding symbolic names in the program and to make a second association between the encrypted forms of the corresponding symbolic names and information used to resolve the symbolic names defined in the class. The loader then uses the first and second associations to resolve the obfuscated names.

REFERENCES:
patent: 4764959 (1988-08-01), Watanabe et al.
patent: 5287407 (1994-02-01), Holmes
patent: 5287408 (1994-02-01), Samson
patent: 5530752 (1996-06-01), Rubin
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5613004 (1997-03-01), Cooperman et al.
patent: 5692047 (1997-11-01), McManis
patent: 5745569 (1998-04-01), Moskowitz et al.
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 6006328 (1999-12-01), Drake
patent: 6102966 (2000-08-01), Tyma
patent: 6591415 (2003-07-01), Torrubia-Saez
patent: 6647495 (2003-11-01), Takeuchi et al.
patent: 6668325 (2003-12-01), Collberg et al.
patent: 6820200 (2004-11-01), Takeuchi et al.
patent: 7305704 (2007-12-01), Ofek et al.
patent: 7343619 (2008-03-01), Ofek et al.
patent: 7590863 (2009-09-01), Lambert
patent: 2002/0055910 (2002-05-01), Durbin
patent: 2003/0074563 (2003-04-01), Spacey
patent: 2003/0177374 (2003-09-01), Yung et al.
patent: 2003/0177381 (2003-09-01), Ofek et al.
patent: 2003/0177391 (2003-09-01), Ofek et al.
patent: 875814 (1998-11-01), None
patent: 875815 (1998-11-01), None
patent: WO 97/04394 (1997-02-01), None
patent: WO 99/01815 (1999-01-01), None
patent: WO 99/13613 (1999-03-01), None
patent: WO 00/72112 (2000-11-01), None
patent: WO00/721112 (2000-11-01), None
E. Valdez and M. Yung. “Software DisEngineering: Program Hiding Architecture and Experiments” © 2000 Springer-Verlag Berlin Heidelberg. http://www.springerlink.com/content/m1267868I57h772w/fulltext.pdf.
J. Nagra et al. “A Functional Taxonomy for Software Watermarking” © 2001 Australian Computer Society.
“How to Write Doc Comments for the Javadoc Tool” Published Aug. 5, 2002 verified by the Internet Archive http://web.archive.org/web/20020805011049/http://java.sun.com/j2se/javadoc/writingdoccomments/.
Mahmoud, Qusay. “Java Tlp 22: Protect Your Bytecodes from Reverse Engineering/Decompilation” Published Jan. 1, 1997. http://www.javaworld.com/javatips/jw-javatip22.html.
Oaks, Scott. “Java Security” © 1998 O'Reilly Media Inc. Excerpt from chapter 3 (pp. 31-60).
Collberg & Thomborson, “Software Watermarking: Models and Dynamic Embeddings”, Department of Computer Science The Univ. of Auckland, Private Bag 92019, Auckland, NZ.
Collberg, Thomborson & Low, “A Taxonomy of Obfuscating Transformations”, Technical Report #148, Department of Computer Science The Univ. of Auckland, Private 92019, Auckland, NZ.
A, Monden, H. Iida, K. Matsumoto, K. Inoue, and K. Torii, “A Practical Method for Watermarking Java Programs”, In compsac2000, pp. 194-195.
A Monden, H. Iida, K. Matusmoto, K Inoue, and K. Torii, “Watermarking Java Programs,” in Proc. 4th International Symposium on Future Software Technology (ISFST'99), pp. 119-124.
Java Class Loading: The Basics—Developer.com.pdf http://www.developer.com/java/other/article.php/10936—22483—1/Java-Class—loading—The-Basics.htm [downloaded Oct. 5, 2009].
Cracking Java byte-code enryption, by Vladimir Roubtsov, JavaWorld.com, May 9, 2003 http://www.favaworld.com/javaworld/javaqa/2003-0509-jcrypt.html [downloaded Oct. 5, 2009].
Java Classloaders—Wikipedia, The Free Encyclpedia.pdf http://en.wikipedia.org/wiki/Java—classloaders [downloaded Oct. 5, 2009].
Palsberg, J. et al.; “Experience with software watermarking”; Dec. 11-15, 2000; Computer Security Applications 2000. ACSAC '00, 16th Annual Conf., New Orleans, LA, USA; IEEE Computer Society, Dec. 11, 2000, Los Alamitos, CA, USA pp. 308-316, XP010529828, ISBN 978-0-7695-0859-7.
Supplementary European Search Report for parallel application No. EP03794614, PCT/US0327693, said report mailed on Jun. 22, 2010, 4 pages.
A, Monden, H. !Ilda, K. Matsumoto, K. Inoue, and K. Torii, “A Practical Method for Watermarking Java Programs”, In compsac2000, pp. 194-195 (c) 2000 IEEE.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Protecting mobile code against malicious hosts does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Protecting mobile code against malicious hosts, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protecting mobile code against malicious hosts will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2666345

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.