SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT
Methods, systems, and computer-readable mediums for detection of policy violations in an unmodified binary in a virtual environment include receiving the unmodified binary in an executable and linkable format (ELF). The unmodified binary is executed, via an emulator, within the virtual environment....
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | JONES, Frederick K MOYER, Geoffrey G VERNON, Jeffrey M WATTERS, Stephen L DELY, Alex NISHAT, Uzma |
description | Methods, systems, and computer-readable mediums for detection of policy violations in an unmodified binary in a virtual environment include receiving the unmodified binary in an executable and linkable format (ELF). The unmodified binary is executed, via an emulator, within the virtual environment. The executing includes determining, by an instruction set emulator, a symbol that is referenced during the executing of the unmodified binary. The symbol, a current state, and a global state is sent to a software policy engine. The software policy engine determines an assertion associated with the symbol. The assertion verifies a policy is enforced. A previous state is updated based on the symbol. The assertion is executed based on the current state, the previous state, and the global state. The assertion is determined to have failed based on the executing the assertion. A warning is logged indicating the failed assertion. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3853754A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3853754A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3853754A13</originalsourceid><addsrcrecordid>eNrjZNAN9ncLCXcMclUI8PfxdI5UcPVz9_RzVfD0UwjzDAoJdfQBigBZ_n6-rn4hPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7Uk3jXA2MLU2NzUxNHQmAglAJPSJWY</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT</title><source>esp@cenet</source><creator>JONES, Frederick K ; MOYER, Geoffrey G ; VERNON, Jeffrey M ; WATTERS, Stephen L ; DELY, Alex ; NISHAT, Uzma</creator><creatorcontrib>JONES, Frederick K ; MOYER, Geoffrey G ; VERNON, Jeffrey M ; WATTERS, Stephen L ; DELY, Alex ; NISHAT, Uzma</creatorcontrib><description>Methods, systems, and computer-readable mediums for detection of policy violations in an unmodified binary in a virtual environment include receiving the unmodified binary in an executable and linkable format (ELF). The unmodified binary is executed, via an emulator, within the virtual environment. The executing includes determining, by an instruction set emulator, a symbol that is referenced during the executing of the unmodified binary. The symbol, a current state, and a global state is sent to a software policy engine. The software policy engine determines an assertion associated with the symbol. The assertion verifies a policy is enforced. A previous state is updated based on the symbol. The assertion is executed based on the current state, the previous state, and the global state. The assertion is determined to have failed based on the executing the assertion. A warning is logged indicating the failed assertion.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2021</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20210728&DB=EPODOC&CC=EP&NR=3853754A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76294</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20210728&DB=EPODOC&CC=EP&NR=3853754A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>JONES, Frederick K</creatorcontrib><creatorcontrib>MOYER, Geoffrey G</creatorcontrib><creatorcontrib>VERNON, Jeffrey M</creatorcontrib><creatorcontrib>WATTERS, Stephen L</creatorcontrib><creatorcontrib>DELY, Alex</creatorcontrib><creatorcontrib>NISHAT, Uzma</creatorcontrib><title>SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT</title><description>Methods, systems, and computer-readable mediums for detection of policy violations in an unmodified binary in a virtual environment include receiving the unmodified binary in an executable and linkable format (ELF). The unmodified binary is executed, via an emulator, within the virtual environment. The executing includes determining, by an instruction set emulator, a symbol that is referenced during the executing of the unmodified binary. The symbol, a current state, and a global state is sent to a software policy engine. The software policy engine determines an assertion associated with the symbol. The assertion verifies a policy is enforced. A previous state is updated based on the symbol. The assertion is executed based on the current state, the previous state, and the global state. The assertion is determined to have failed based on the executing the assertion. A warning is logged indicating the failed assertion.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2021</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZNAN9ncLCXcMclUI8PfxdI5UcPVz9_RzVfD0UwjzDAoJdfQBigBZ_n6-rn4hPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7Uk3jXA2MLU2NzUxNHQmAglAJPSJWY</recordid><startdate>20210728</startdate><enddate>20210728</enddate><creator>JONES, Frederick K</creator><creator>MOYER, Geoffrey G</creator><creator>VERNON, Jeffrey M</creator><creator>WATTERS, Stephen L</creator><creator>DELY, Alex</creator><creator>NISHAT, Uzma</creator><scope>EVB</scope></search><sort><creationdate>20210728</creationdate><title>SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT</title><author>JONES, Frederick K ; MOYER, Geoffrey G ; VERNON, Jeffrey M ; WATTERS, Stephen L ; DELY, Alex ; NISHAT, Uzma</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3853754A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2021</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>JONES, Frederick K</creatorcontrib><creatorcontrib>MOYER, Geoffrey G</creatorcontrib><creatorcontrib>VERNON, Jeffrey M</creatorcontrib><creatorcontrib>WATTERS, Stephen L</creatorcontrib><creatorcontrib>DELY, Alex</creatorcontrib><creatorcontrib>NISHAT, Uzma</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>JONES, Frederick K</au><au>MOYER, Geoffrey G</au><au>VERNON, Jeffrey M</au><au>WATTERS, Stephen L</au><au>DELY, Alex</au><au>NISHAT, Uzma</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT</title><date>2021-07-28</date><risdate>2021</risdate><abstract>Methods, systems, and computer-readable mediums for detection of policy violations in an unmodified binary in a virtual environment include receiving the unmodified binary in an executable and linkable format (ELF). The unmodified binary is executed, via an emulator, within the virtual environment. The executing includes determining, by an instruction set emulator, a symbol that is referenced during the executing of the unmodified binary. The symbol, a current state, and a global state is sent to a software policy engine. The software policy engine determines an assertion associated with the symbol. The assertion verifies a policy is enforced. A previous state is updated based on the symbol. The assertion is executed based on the current state, the previous state, and the global state. The assertion is determined to have failed based on the executing the assertion. A warning is logged indicating the failed assertion.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng ; fre ; ger |
recordid | cdi_epo_espacenet_EP3853754A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T06%3A02%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=JONES,%20Frederick%20K&rft.date=2021-07-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3853754A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |