CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS

A constraint is inserted into a program to address a vulnerability of the program to attacks. The constraint includes a segment of code that determines when the program has been asked to execute a "corner case" which does not occur in normal operations. The constraint code can access a lib...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: RENERT, CHARLES, KIRIANSKY, VLADIMIR, L, GARNETT, TIM, AMARASINGHE, SAMAN, P, WILBOURN, SANDY, WU, WARREN, CHANDRAMOHAN, BHARATH, BRUENING, DEREK, L
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator RENERT, CHARLES
KIRIANSKY, VLADIMIR, L
GARNETT, TIM
AMARASINGHE, SAMAN, P
WILBOURN, SANDY
WU, WARREN
CHANDRAMOHAN, BHARATH
BRUENING, DEREK, L
description A constraint is inserted into a program to address a vulnerability of the program to attacks. The constraint includes a segment of code that determines when the program has been asked to execute a "corner case" which does not occur in normal operations. The constraint code can access a library of detector and remediator functions to detect various attacks and remediate against them. Optionally, the detector can be employed without the remediator for analysis. The context of the program can be saved and restored if necessary to continue operating after remediation is performed. The constraints can include descriptors, along with machine instructions or byte code, which indicate how the constraints are to be used.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP1891520A4</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP1891520A4</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP1891520A43</originalsourceid><addsrcrecordid>eNqNizsKwkAQQNNYiHqHuYBg_ICW47qJo9nZsDNRtIlB1ko0EO-PKTyA1YPHe8PkZjyLBiRWID5Yo-QZ5CJqHWQ-ADlXMV2JcxCf6RmDhTL4PKATwLwfReFUFWwDbqkgJdt73gGqojnKOBk8mmcXJz-OEsismv00tu86dm1zj6_4qW2Zrjfpaj7D5eKP5AuQEzPR</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS</title><source>esp@cenet</source><creator>RENERT, CHARLES ; KIRIANSKY, VLADIMIR, L ; GARNETT, TIM ; AMARASINGHE, SAMAN, P ; WILBOURN, SANDY ; WU, WARREN ; CHANDRAMOHAN, BHARATH ; BRUENING, DEREK, L</creator><creatorcontrib>RENERT, CHARLES ; KIRIANSKY, VLADIMIR, L ; GARNETT, TIM ; AMARASINGHE, SAMAN, P ; WILBOURN, SANDY ; WU, WARREN ; CHANDRAMOHAN, BHARATH ; BRUENING, DEREK, L</creatorcontrib><description>A constraint is inserted into a program to address a vulnerability of the program to attacks. The constraint includes a segment of code that determines when the program has been asked to execute a "corner case" which does not occur in normal operations. The constraint code can access a library of detector and remediator functions to detect various attacks and remediate against them. Optionally, the detector can be employed without the remediator for analysis. The context of the program can be saved and restored if necessary to continue operating after remediation is performed. The constraints can include descriptors, along with machine instructions or byte code, which indicate how the constraints are to be used.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2012</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20120620&amp;DB=EPODOC&amp;CC=EP&amp;NR=1891520A4$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76294</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20120620&amp;DB=EPODOC&amp;CC=EP&amp;NR=1891520A4$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>RENERT, CHARLES</creatorcontrib><creatorcontrib>KIRIANSKY, VLADIMIR, L</creatorcontrib><creatorcontrib>GARNETT, TIM</creatorcontrib><creatorcontrib>AMARASINGHE, SAMAN, P</creatorcontrib><creatorcontrib>WILBOURN, SANDY</creatorcontrib><creatorcontrib>WU, WARREN</creatorcontrib><creatorcontrib>CHANDRAMOHAN, BHARATH</creatorcontrib><creatorcontrib>BRUENING, DEREK, L</creatorcontrib><title>CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS</title><description>A constraint is inserted into a program to address a vulnerability of the program to attacks. The constraint includes a segment of code that determines when the program has been asked to execute a "corner case" which does not occur in normal operations. The constraint code can access a library of detector and remediator functions to detect various attacks and remediate against them. Optionally, the detector can be employed without the remediator for analysis. The context of the program can be saved and restored if necessary to continue operating after remediation is performed. The constraints can include descriptors, along with machine instructions or byte code, which indicate how the constraints are to be used.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2012</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNizsKwkAQQNNYiHqHuYBg_ICW47qJo9nZsDNRtIlB1ko0EO-PKTyA1YPHe8PkZjyLBiRWID5Yo-QZ5CJqHWQ-ADlXMV2JcxCf6RmDhTL4PKATwLwfReFUFWwDbqkgJdt73gGqojnKOBk8mmcXJz-OEsismv00tu86dm1zj6_4qW2Zrjfpaj7D5eKP5AuQEzPR</recordid><startdate>20120620</startdate><enddate>20120620</enddate><creator>RENERT, CHARLES</creator><creator>KIRIANSKY, VLADIMIR, L</creator><creator>GARNETT, TIM</creator><creator>AMARASINGHE, SAMAN, P</creator><creator>WILBOURN, SANDY</creator><creator>WU, WARREN</creator><creator>CHANDRAMOHAN, BHARATH</creator><creator>BRUENING, DEREK, L</creator><scope>EVB</scope></search><sort><creationdate>20120620</creationdate><title>CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS</title><author>RENERT, CHARLES ; KIRIANSKY, VLADIMIR, L ; GARNETT, TIM ; AMARASINGHE, SAMAN, P ; WILBOURN, SANDY ; WU, WARREN ; CHANDRAMOHAN, BHARATH ; BRUENING, DEREK, L</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP1891520A43</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2012</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>RENERT, CHARLES</creatorcontrib><creatorcontrib>KIRIANSKY, VLADIMIR, L</creatorcontrib><creatorcontrib>GARNETT, TIM</creatorcontrib><creatorcontrib>AMARASINGHE, SAMAN, P</creatorcontrib><creatorcontrib>WILBOURN, SANDY</creatorcontrib><creatorcontrib>WU, WARREN</creatorcontrib><creatorcontrib>CHANDRAMOHAN, BHARATH</creatorcontrib><creatorcontrib>BRUENING, DEREK, L</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>RENERT, CHARLES</au><au>KIRIANSKY, VLADIMIR, L</au><au>GARNETT, TIM</au><au>AMARASINGHE, SAMAN, P</au><au>WILBOURN, SANDY</au><au>WU, WARREN</au><au>CHANDRAMOHAN, BHARATH</au><au>BRUENING, DEREK, L</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS</title><date>2012-06-20</date><risdate>2012</risdate><abstract>A constraint is inserted into a program to address a vulnerability of the program to attacks. The constraint includes a segment of code that determines when the program has been asked to execute a "corner case" which does not occur in normal operations. The constraint code can access a library of detector and remediator functions to detect various attacks and remediate against them. Optionally, the detector can be employed without the remediator for analysis. The context of the program can be saved and restored if necessary to continue operating after remediation is performed. The constraints can include descriptors, along with machine instructions or byte code, which indicate how the constraints are to be used.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP1891520A4
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T06%3A43%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=RENERT,%20CHARLES&rft.date=2012-06-20&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP1891520A4%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true