Using Assured Calling Sequences in Micro-Sandboxes
The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | TAJALLI Homayoon GRAHAM Jeffrey J |
description | The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The validation may involve mapping calling sequence addresses to modules or functions present in the process. Additionally, some embodiments relate to eliminating unnecessary code from various modules and controlling which modules can be loaded into a program. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2017083701A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2017083701A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2017083701A13</originalsourceid><addsrcrecordid>eNrjZDAKLc7MS1dwLC4uLUpNUXBOzMkB8YNTC0tT85JTixUy8xR8M5OL8nWDE_NSkvIrUot5GFjTEnOKU3mhNDeDsptriLOHbmpBfnxqcUFicmpeakl8aLCRgaG5gYWxuYGho6ExcaoARoIsjw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Using Assured Calling Sequences in Micro-Sandboxes</title><source>esp@cenet</source><creator>TAJALLI Homayoon ; GRAHAM Jeffrey J</creator><creatorcontrib>TAJALLI Homayoon ; GRAHAM Jeffrey J</creatorcontrib><description>The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The validation may involve mapping calling sequence addresses to modules or functions present in the process. Additionally, some embodiments relate to eliminating unnecessary code from various modules and controlling which modules can be loaded into a program.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170323&DB=EPODOC&CC=US&NR=2017083701A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170323&DB=EPODOC&CC=US&NR=2017083701A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>TAJALLI Homayoon</creatorcontrib><creatorcontrib>GRAHAM Jeffrey J</creatorcontrib><title>Using Assured Calling Sequences in Micro-Sandboxes</title><description>The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The validation may involve mapping calling sequence addresses to modules or functions present in the process. Additionally, some embodiments relate to eliminating unnecessary code from various modules and controlling which modules can be loaded into a program.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDAKLc7MS1dwLC4uLUpNUXBOzMkB8YNTC0tT85JTixUy8xR8M5OL8nWDE_NSkvIrUot5GFjTEnOKU3mhNDeDsptriLOHbmpBfnxqcUFicmpeakl8aLCRgaG5gYWxuYGho6ExcaoARoIsjw</recordid><startdate>20170323</startdate><enddate>20170323</enddate><creator>TAJALLI Homayoon</creator><creator>GRAHAM Jeffrey J</creator><scope>EVB</scope></search><sort><creationdate>20170323</creationdate><title>Using Assured Calling Sequences in Micro-Sandboxes</title><author>TAJALLI Homayoon ; GRAHAM Jeffrey J</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2017083701A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>TAJALLI Homayoon</creatorcontrib><creatorcontrib>GRAHAM Jeffrey J</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>TAJALLI Homayoon</au><au>GRAHAM Jeffrey J</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Using Assured Calling Sequences in Micro-Sandboxes</title><date>2017-03-23</date><risdate>2017</risdate><abstract>The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The validation may involve mapping calling sequence addresses to modules or functions present in the process. Additionally, some embodiments relate to eliminating unnecessary code from various modules and controlling which modules can be loaded into a program.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2017083701A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Using Assured Calling Sequences in Micro-Sandboxes |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T01%3A43%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=TAJALLI%20Homayoon&rft.date=2017-03-23&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2017083701A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |