USING ASSURED CALLING SEQUENCES IN MICRO-SANDBOXES

The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: TAJALLI, Homayoon, GRAHAM, Jeffrey J
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator TAJALLI, Homayoon
GRAHAM, Jeffrey J
description The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The validation may involve mapping calling sequence addresses to modules or functions present in the process. Additionally, some embodiments relate to eliminating unnecessary code from various modules and controlling which modules can be loaded into a program.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3350704A4</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3350704A4</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3350704A43</originalsourceid><addsrcrecordid>eNrjZDAKDfb0c1dwDA4ODXJ1UXB29PEB8YNdA0Nd_ZxdgxU8_RR8PZ2D_HWDHf1cnPwjXIN5GFjTEnOKU3mhNDeDgptriLOHbmpBfnxqcUFicmpeakm8a4CxsamBuYGJo4kxEUoANaImew</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>USING ASSURED CALLING SEQUENCES IN MICRO-SANDBOXES</title><source>esp@cenet</source><creator>TAJALLI, Homayoon ; GRAHAM, Jeffrey J</creator><creatorcontrib>TAJALLI, Homayoon ; GRAHAM, Jeffrey J</creatorcontrib><description>The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The validation may involve mapping calling sequence addresses to modules or functions present in the process. Additionally, some embodiments relate to eliminating unnecessary code from various modules and controlling which modules can be loaded into a program.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190424&amp;DB=EPODOC&amp;CC=EP&amp;NR=3350704A4$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,778,883,25547,76298</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190424&amp;DB=EPODOC&amp;CC=EP&amp;NR=3350704A4$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>TAJALLI, Homayoon</creatorcontrib><creatorcontrib>GRAHAM, Jeffrey J</creatorcontrib><title>USING ASSURED CALLING SEQUENCES IN MICRO-SANDBOXES</title><description>The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The validation may involve mapping calling sequence addresses to modules or functions present in the process. Additionally, some embodiments relate to eliminating unnecessary code from various modules and controlling which modules can be loaded into a program.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDAKDfb0c1dwDA4ODXJ1UXB29PEB8YNdA0Nd_ZxdgxU8_RR8PZ2D_HWDHf1cnPwjXIN5GFjTEnOKU3mhNDeDgptriLOHbmpBfnxqcUFicmpeakm8a4CxsamBuYGJo4kxEUoANaImew</recordid><startdate>20190424</startdate><enddate>20190424</enddate><creator>TAJALLI, Homayoon</creator><creator>GRAHAM, Jeffrey J</creator><scope>EVB</scope></search><sort><creationdate>20190424</creationdate><title>USING ASSURED CALLING SEQUENCES IN MICRO-SANDBOXES</title><author>TAJALLI, Homayoon ; GRAHAM, Jeffrey J</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3350704A43</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>TAJALLI, Homayoon</creatorcontrib><creatorcontrib>GRAHAM, Jeffrey J</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>TAJALLI, Homayoon</au><au>GRAHAM, Jeffrey J</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>USING ASSURED CALLING SEQUENCES IN MICRO-SANDBOXES</title><date>2019-04-24</date><risdate>2019</risdate><abstract>The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The validation may involve mapping calling sequence addresses to modules or functions present in the process. Additionally, some embodiments relate to eliminating unnecessary code from various modules and controlling which modules can be loaded into a program.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP3350704A4
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title USING ASSURED CALLING SEQUENCES IN MICRO-SANDBOXES
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T08%3A21%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=TAJALLI,%20Homayoon&rft.date=2019-04-24&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3350704A4%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true