SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT

Methods, systems, and computer-readable mediums for detection of policy violations in an unmodified binary in a virtual environment include receiving the unmodified binary in an executable and linkable format (ELF). The unmodified binary is executed, via an emulator, within the virtual environment....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: JONES, Frederick K, MOYER, Geoffrey G, VERNON, Jeffrey M, WATTERS, Stephen L, DELY, Alex, NISHAT, Uzma
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator JONES, Frederick K
MOYER, Geoffrey G
VERNON, Jeffrey M
WATTERS, Stephen L
DELY, Alex
NISHAT, Uzma
description Methods, systems, and computer-readable mediums for detection of policy violations in an unmodified binary in a virtual environment include receiving the unmodified binary in an executable and linkable format (ELF). The unmodified binary is executed, via an emulator, within the virtual environment. The executing includes determining, by an instruction set emulator, a symbol that is referenced during the executing of the unmodified binary. The symbol, a current state, and a global state is sent to a software policy engine. The software policy engine determines an assertion associated with the symbol. The assertion verifies a policy is enforced. A previous state is updated based on the symbol. The assertion is executed based on the current state, the previous state, and the global state. The assertion is determined to have failed based on the executing the assertion. A warning is logged indicating the failed assertion.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3853754A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3853754A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3853754A13</originalsourceid><addsrcrecordid>eNrjZNAN9ncLCXcMclUI8PfxdI5UcPVz9_RzVfD0UwjzDAoJdfQBigBZ_n6-rn4hPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7Uk3jXA2MLU2NzUxNHQmAglAJPSJWY</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT</title><source>esp@cenet</source><creator>JONES, Frederick K ; MOYER, Geoffrey G ; VERNON, Jeffrey M ; WATTERS, Stephen L ; DELY, Alex ; NISHAT, Uzma</creator><creatorcontrib>JONES, Frederick K ; MOYER, Geoffrey G ; VERNON, Jeffrey M ; WATTERS, Stephen L ; DELY, Alex ; NISHAT, Uzma</creatorcontrib><description>Methods, systems, and computer-readable mediums for detection of policy violations in an unmodified binary in a virtual environment include receiving the unmodified binary in an executable and linkable format (ELF). The unmodified binary is executed, via an emulator, within the virtual environment. The executing includes determining, by an instruction set emulator, a symbol that is referenced during the executing of the unmodified binary. The symbol, a current state, and a global state is sent to a software policy engine. The software policy engine determines an assertion associated with the symbol. The assertion verifies a policy is enforced. A previous state is updated based on the symbol. The assertion is executed based on the current state, the previous state, and the global state. The assertion is determined to have failed based on the executing the assertion. A warning is logged indicating the failed assertion.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2021</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20210728&amp;DB=EPODOC&amp;CC=EP&amp;NR=3853754A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76294</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20210728&amp;DB=EPODOC&amp;CC=EP&amp;NR=3853754A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>JONES, Frederick K</creatorcontrib><creatorcontrib>MOYER, Geoffrey G</creatorcontrib><creatorcontrib>VERNON, Jeffrey M</creatorcontrib><creatorcontrib>WATTERS, Stephen L</creatorcontrib><creatorcontrib>DELY, Alex</creatorcontrib><creatorcontrib>NISHAT, Uzma</creatorcontrib><title>SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT</title><description>Methods, systems, and computer-readable mediums for detection of policy violations in an unmodified binary in a virtual environment include receiving the unmodified binary in an executable and linkable format (ELF). The unmodified binary is executed, via an emulator, within the virtual environment. The executing includes determining, by an instruction set emulator, a symbol that is referenced during the executing of the unmodified binary. The symbol, a current state, and a global state is sent to a software policy engine. The software policy engine determines an assertion associated with the symbol. The assertion verifies a policy is enforced. A previous state is updated based on the symbol. The assertion is executed based on the current state, the previous state, and the global state. The assertion is determined to have failed based on the executing the assertion. A warning is logged indicating the failed assertion.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2021</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZNAN9ncLCXcMclUI8PfxdI5UcPVz9_RzVfD0UwjzDAoJdfQBigBZ_n6-rn4hPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7Uk3jXA2MLU2NzUxNHQmAglAJPSJWY</recordid><startdate>20210728</startdate><enddate>20210728</enddate><creator>JONES, Frederick K</creator><creator>MOYER, Geoffrey G</creator><creator>VERNON, Jeffrey M</creator><creator>WATTERS, Stephen L</creator><creator>DELY, Alex</creator><creator>NISHAT, Uzma</creator><scope>EVB</scope></search><sort><creationdate>20210728</creationdate><title>SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT</title><author>JONES, Frederick K ; MOYER, Geoffrey G ; VERNON, Jeffrey M ; WATTERS, Stephen L ; DELY, Alex ; NISHAT, Uzma</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3853754A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2021</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>JONES, Frederick K</creatorcontrib><creatorcontrib>MOYER, Geoffrey G</creatorcontrib><creatorcontrib>VERNON, Jeffrey M</creatorcontrib><creatorcontrib>WATTERS, Stephen L</creatorcontrib><creatorcontrib>DELY, Alex</creatorcontrib><creatorcontrib>NISHAT, Uzma</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>JONES, Frederick K</au><au>MOYER, Geoffrey G</au><au>VERNON, Jeffrey M</au><au>WATTERS, Stephen L</au><au>DELY, Alex</au><au>NISHAT, Uzma</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT</title><date>2021-07-28</date><risdate>2021</risdate><abstract>Methods, systems, and computer-readable mediums for detection of policy violations in an unmodified binary in a virtual environment include receiving the unmodified binary in an executable and linkable format (ELF). The unmodified binary is executed, via an emulator, within the virtual environment. The executing includes determining, by an instruction set emulator, a symbol that is referenced during the executing of the unmodified binary. The symbol, a current state, and a global state is sent to a software policy engine. The software policy engine determines an assertion associated with the symbol. The assertion verifies a policy is enforced. A previous state is updated based on the symbol. The assertion is executed based on the current state, the previous state, and the global state. The assertion is determined to have failed based on the executing the assertion. A warning is logged indicating the failed assertion.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP3853754A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T06%3A02%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=JONES,%20Frederick%20K&rft.date=2021-07-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3853754A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true