System and method for securing compiled program code

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

395726, H04L 900

Patent

active

058676473

ABSTRACT:
A system and method of providing increased security for compiled program code. Compiled program code is installed in a computer having type enforcement capability. The compiled program code is allowed to execute and type enforcement violations are logged. The execution environment of the compiled program code is then modified to prevent recurrence of the logged type enforcement violations.

REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4177510 (1979-12-01), Appell et al.
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 4584639 (1986-04-01), Hardy
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4648031 (1987-03-01), Jenner
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4870571 (1989-09-01), Frink
patent: 4885789 (1989-12-01), Burger et al.
patent: 5093914 (1992-03-01), Coplien et al.
patent: 5153918 (1992-10-01), Tuai
patent: 5204961 (1993-04-01), Barlow
patent: 5228083 (1993-07-01), Lozowick et al.
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5272754 (1993-12-01), Boebert
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5303303 (1994-04-01), White
patent: 5305385 (1994-04-01), Schanning et al.
patent: 5355474 (1994-10-01), Thuraisngham et al.
patent: 5359659 (1994-10-01), Rosenthal
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5684951 (1997-11-01), Goldman et al.
News Release: "100% of Hackers Failed to Break Into One Internet Site Protected by Sidewinder.TM.", Secure Computing Corporation (Feb. 16, 1995).
News Release: "Internet Security System Given `Product of the Year` Award", Secure Computing Corporation (Mar. 28, 1995).
News Release: "SATAN No Threat to Sidewinder.TM.", Secure Computing Corporation (Apr. 26, 1995).
"Sidewinder Internals", Product information, Secure Computing Corporation, 16 p. (Oct. 1994).
"Special Report: Secure Computing Corporation and Network Security", Computer Select, 13 p. (Dec. 1995).
Ancilotti, P., et al., "Language Features for Access Control", IEEE Transactions on Software Engineering, SE-9, 16-25 (Jan. 1983).
Cobb, S., "Establishing Firewall Policy", IEEE, 198-205 (1996).
Damashek, M., "Gauging Similarity with n-Grams: Language-Independent Categorization of Text", Science, 267, 843-848 (Feb. 10, 1995).
Gassman, B., "Internet Security, and Firewalls Protection on the Internet", IEEE, 93-107 (1996).
Greenwald, M., et al., "Designing an Academic Firewall: Policy, Practice, and Experience with SURF", IEEE, 79-92 (1996).
Karn, P., et al., "The ESP DES-CBC Transform", Network Working Group, Request for Comment No. 1829, http//ds.internic.net/rfc/rfc1829.txt, 9 p. (Aug. 1995).
Lampson, B.W., et al., "Dynamic Protection Structures", AFIPS Conference Proceedings, 35, 1969 Fall Joint Computer Conference, Las Vegas, NV, 27-38 (Nov. 18-20, 1969).
McCarthy, S.P., "Hey Hackers| Secure Computing Says You Can't Break into This Telnet Site", Computer Select, 2 p. (Dec. 1995).
Metzger, P., et al., "IP Authentication using Keyed MD5", Network Working Group, Request for Comments No. 1828, http//ds.internic.net/rfc/rfc1828.txt, 5 p. (Aug. 1995).
Peterson, L.L., et al., In: Computer Networks, Morgan Kaufmann Publishers, Inc., San Francisco, CA, pp. 218-221, 284-286 (1996).
Schroeder, M.D., et al., "A Hardware Architecture for Implementing Protection Rings", Communications of the ACM, 15, 157-170 (Mar. 1972).
Smith, R.E., "Constructing a High Assurance Mail Guard", Secure Computing Corporation (Appeared in the Proceedings of the National Computer Security Conference), 7 p. (1994).
Stadnyk, I., et al., "Modeling User's Interests in Information Filters", Communications of the ACM, 35, 49-50 (Dec. 1992).
Stempel, S., "IpAccess--An Internet Service Access System for Firewall Installations", IEEE, 31-41 (1995).
Stevens, C., "Automating the Creation of Information Filters", Communications of the ACM, 35, 48 (Dec. 1992).
Thomsen, D., "Type Enforcement: The New Security Model", SPIE, 2617, 143-150 (1995).
Warrier, U.S., et al., "A Platform for Heterogeneous Interconnection Network Management", IEEE Journal on Selected Areas in Communications, 8, 119-126 (Jan. 1990).
White, L.J., et al., "A Firewall Concept for Both Control-Flow and Data-Flow in Regression Integration Testing", IEEE, 262-271 (1992).
Wolfe, A., "Honeywell Builds Hardware for Computer Security", Electronics, 14-15 (Sep. 2, 1985).
Commun. of the ACM, vol. 35, p. 28, (Dec. 1992).
"Answers to Frequently Asked Questions About Network Security", Secure Computing Corporation, pp. 1-41 & pp. 1-16, (Date unavailable).
"Copy of PCT Search Report", Application No. PCT/US95/12681, 8 pages, (Apr. 9, 1996).
J. A. Adam, "Meta-matrices", IEEE Spectrum, p. 26, (Oct. 1992).
J. A. Adam, "Playing on the net", IEEE Spectrum, 29 (Oct. 1992).
Lee Badger, et al., "Practical Domain and Type Enforcement for UNIX", 1995 IEEE Symposium on Security and Privacy, pp. 66-77, (May, 1995).
N. J. Belkin, et al., "Information filtering and information retrieval: Two sides of the same coin?", Commun. of the ACM, vol. 35, p. 29, (1992).
S. M. Bellovin, et al., "Network Firewalls", IEEE Communications Magazine, vol. 32, 9 pages, (Sep. 1994).
William R. Bevier, et al., "Connection Policies and Controlled Interference", The Eighth IEEE Computer Security Foundations Workshop, IEEE Computer Society Technical Committee on Security and Privacy, pp. 167-176, (Jun., 1995).
T. F. Bowen, et al., "The datacycle architecture", Commun. of the ACM, 35, 71 (1992).
J. Bryan, "Firewalls For Sale", BYTE, 99-100, 102, 104-105, (Apr. 1995).
B. B. Dillaway, et al., "A Practical Design For A Multilevel Secure Database Management System", American Institute of Aeronautics and Astronautics, Inc., pp. 44-57, (Dec. 1986).
Todd Fine, et al., "Assuring Distributed Trusted Mach", IEEE Computer Society Symposium on Research in Security and Privacy, pp. 206-218, (1993).
P. W. Foltz, et al., "Personalized information delivery: an analysis of information filtering methods", Commun. of the ACM, vol. 35, p. 51, (1992).
D. Goldberg, et al., "Using collaborative filtering to weave an information tapestry", Commun. of the ACM, vol. 35, p. 61, (1992).
F. T. Grampp, "Unix Operating System Security", AT&T Bell Laboratories Technical Journal, vol. 63, No. 8, 1649-1672, (Oct. 1984).
J. Thomas Haigh, et al., "Extending the Noninterference Version of MLS", IEEE Transactions of Software Engineering, vol. SE-13, No. 2, pp. 141-150, (Feb., 1987).
S. T. Kent, "Internet privacy enhanced mail", Commun. of the ACM, vol. 36, p. 48, (1993).
K. Lee, et al., "A framework for controlling cooperative agents", Computer, p. 8, (1993).
Yuet C. Lee, et al., "Multimedia: Full-Service Impact on Business, Education, and the Home", SPIE--The International Society for Optical Engineering, vol. 2617, pp. 143-150, (Oct. 1995).
S. Loeb, "Architecting personalized delivery of multimedia information", Commun. of the ACM, 35, 39 (1992).
Paul Merenbloom, "Network `fire walls` safeguard LAN data from outside intrusion", Infoworld, LAN Talk, pp. 69 & add'l page, (Jul. 25, 1994).
K. Obraczka, et al., "Internet resource discovery services", Computer, p. 8, (Sep., 1993).
L. Press, "The net: progress and opportunity", Commun. of the ACM, vol. 35, p. 21, (1992).
M. F. Schwartz, "Internet resource discovery at the University of Colorado", Computer, p. 25, (Sep. 1993).
Richard E. Smith, "Sidewinder: Defense in Depth Using Type Enforcement", International Journal of Network Management, pp. 219-229, (Jul.-Aug. 1995) .

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for securing compiled program code does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for securing compiled program code, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for securing compiled program code will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1125350

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.