CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS
A constraint is inserted into a program to address a vulnerability of the program to attacks. The constraint includes a segment of code that determines when the program has been asked to execute a "corner case" which does not occur in normal operations. The constraint code can access a lib...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | RENERT, CHARLES KIRIANSKY, VLADIMIR, L GARNETT, TIM AMARASINGHE, SAMAN, P WILBOURN, SANDY WU, WARREN CHANDRAMOHAN, BHARATH BRUENING, DEREK, L |
description | A constraint is inserted into a program to address a vulnerability of the program to attacks. The constraint includes a segment of code that determines when the program has been asked to execute a "corner case" which does not occur in normal operations. The constraint code can access a library of detector and remediator functions to detect various attacks and remediate against them. Optionally, the detector can be employed without the remediator for analysis. The context of the program can be saved and restored if necessary to continue operating after remediation is performed. The constraints can include descriptors, along with machine instructions or byte code, which indicate how the constraints are to be used. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP1891520A4</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP1891520A4</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP1891520A43</originalsourceid><addsrcrecordid>eNqNizsKwkAQQNNYiHqHuYBg_ICW47qJo9nZsDNRtIlB1ko0EO-PKTyA1YPHe8PkZjyLBiRWID5Yo-QZ5CJqHWQ-ADlXMV2JcxCf6RmDhTL4PKATwLwfReFUFWwDbqkgJdt73gGqojnKOBk8mmcXJz-OEsismv00tu86dm1zj6_4qW2Zrjfpaj7D5eKP5AuQEzPR</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS</title><source>esp@cenet</source><creator>RENERT, CHARLES ; KIRIANSKY, VLADIMIR, L ; GARNETT, TIM ; AMARASINGHE, SAMAN, P ; WILBOURN, SANDY ; WU, WARREN ; CHANDRAMOHAN, BHARATH ; BRUENING, DEREK, L</creator><creatorcontrib>RENERT, CHARLES ; KIRIANSKY, VLADIMIR, L ; GARNETT, TIM ; AMARASINGHE, SAMAN, P ; WILBOURN, SANDY ; WU, WARREN ; CHANDRAMOHAN, BHARATH ; BRUENING, DEREK, L</creatorcontrib><description>A constraint is inserted into a program to address a vulnerability of the program to attacks. The constraint includes a segment of code that determines when the program has been asked to execute a "corner case" which does not occur in normal operations. The constraint code can access a library of detector and remediator functions to detect various attacks and remediate against them. Optionally, the detector can be employed without the remediator for analysis. The context of the program can be saved and restored if necessary to continue operating after remediation is performed. The constraints can include descriptors, along with machine instructions or byte code, which indicate how the constraints are to be used.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2012</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20120620&DB=EPODOC&CC=EP&NR=1891520A4$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76294</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20120620&DB=EPODOC&CC=EP&NR=1891520A4$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>RENERT, CHARLES</creatorcontrib><creatorcontrib>KIRIANSKY, VLADIMIR, L</creatorcontrib><creatorcontrib>GARNETT, TIM</creatorcontrib><creatorcontrib>AMARASINGHE, SAMAN, P</creatorcontrib><creatorcontrib>WILBOURN, SANDY</creatorcontrib><creatorcontrib>WU, WARREN</creatorcontrib><creatorcontrib>CHANDRAMOHAN, BHARATH</creatorcontrib><creatorcontrib>BRUENING, DEREK, L</creatorcontrib><title>CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS</title><description>A constraint is inserted into a program to address a vulnerability of the program to attacks. The constraint includes a segment of code that determines when the program has been asked to execute a "corner case" which does not occur in normal operations. The constraint code can access a library of detector and remediator functions to detect various attacks and remediate against them. Optionally, the detector can be employed without the remediator for analysis. The context of the program can be saved and restored if necessary to continue operating after remediation is performed. The constraints can include descriptors, along with machine instructions or byte code, which indicate how the constraints are to be used.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2012</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNizsKwkAQQNNYiHqHuYBg_ICW47qJo9nZsDNRtIlB1ko0EO-PKTyA1YPHe8PkZjyLBiRWID5Yo-QZ5CJqHWQ-ADlXMV2JcxCf6RmDhTL4PKATwLwfReFUFWwDbqkgJdt73gGqojnKOBk8mmcXJz-OEsismv00tu86dm1zj6_4qW2Zrjfpaj7D5eKP5AuQEzPR</recordid><startdate>20120620</startdate><enddate>20120620</enddate><creator>RENERT, CHARLES</creator><creator>KIRIANSKY, VLADIMIR, L</creator><creator>GARNETT, TIM</creator><creator>AMARASINGHE, SAMAN, P</creator><creator>WILBOURN, SANDY</creator><creator>WU, WARREN</creator><creator>CHANDRAMOHAN, BHARATH</creator><creator>BRUENING, DEREK, L</creator><scope>EVB</scope></search><sort><creationdate>20120620</creationdate><title>CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS</title><author>RENERT, CHARLES ; KIRIANSKY, VLADIMIR, L ; GARNETT, TIM ; AMARASINGHE, SAMAN, P ; WILBOURN, SANDY ; WU, WARREN ; CHANDRAMOHAN, BHARATH ; BRUENING, DEREK, L</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP1891520A43</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2012</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>RENERT, CHARLES</creatorcontrib><creatorcontrib>KIRIANSKY, VLADIMIR, L</creatorcontrib><creatorcontrib>GARNETT, TIM</creatorcontrib><creatorcontrib>AMARASINGHE, SAMAN, P</creatorcontrib><creatorcontrib>WILBOURN, SANDY</creatorcontrib><creatorcontrib>WU, WARREN</creatorcontrib><creatorcontrib>CHANDRAMOHAN, BHARATH</creatorcontrib><creatorcontrib>BRUENING, DEREK, L</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>RENERT, CHARLES</au><au>KIRIANSKY, VLADIMIR, L</au><au>GARNETT, TIM</au><au>AMARASINGHE, SAMAN, P</au><au>WILBOURN, SANDY</au><au>WU, WARREN</au><au>CHANDRAMOHAN, BHARATH</au><au>BRUENING, DEREK, L</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS</title><date>2012-06-20</date><risdate>2012</risdate><abstract>A constraint is inserted into a program to address a vulnerability of the program to attacks. The constraint includes a segment of code that determines when the program has been asked to execute a "corner case" which does not occur in normal operations. The constraint code can access a library of detector and remediator functions to detect various attacks and remediate against them. Optionally, the detector can be employed without the remediator for analysis. The context of the program can be saved and restored if necessary to continue operating after remediation is performed. The constraints can include descriptors, along with machine instructions or byte code, which indicate how the constraints are to be used.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng ; fre ; ger |
recordid | cdi_epo_espacenet_EP1891520A4 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T06%3A43%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=RENERT,%20CHARLES&rft.date=2012-06-20&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP1891520A4%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |