Using Assured Calling Sequences in Micro-Sandboxes

The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: TAJALLI Homayoon, GRAHAM Jeffrey J
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator TAJALLI Homayoon
GRAHAM Jeffrey J
description The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The validation may involve mapping calling sequence addresses to modules or functions present in the process. Additionally, some embodiments relate to eliminating unnecessary code from various modules and controlling which modules can be loaded into a program.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2017083701A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2017083701A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2017083701A13</originalsourceid><addsrcrecordid>eNrjZDAKLc7MS1dwLC4uLUpNUXBOzMkB8YNTC0tT85JTixUy8xR8M5OL8nWDE_NSkvIrUot5GFjTEnOKU3mhNDeDsptriLOHbmpBfnxqcUFicmpeakl8aLCRgaG5gYWxuYGho6ExcaoARoIsjw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Using Assured Calling Sequences in Micro-Sandboxes</title><source>esp@cenet</source><creator>TAJALLI Homayoon ; GRAHAM Jeffrey J</creator><creatorcontrib>TAJALLI Homayoon ; GRAHAM Jeffrey J</creatorcontrib><description>The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The validation may involve mapping calling sequence addresses to modules or functions present in the process. Additionally, some embodiments relate to eliminating unnecessary code from various modules and controlling which modules can be loaded into a program.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20170323&amp;DB=EPODOC&amp;CC=US&amp;NR=2017083701A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20170323&amp;DB=EPODOC&amp;CC=US&amp;NR=2017083701A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>TAJALLI Homayoon</creatorcontrib><creatorcontrib>GRAHAM Jeffrey J</creatorcontrib><title>Using Assured Calling Sequences in Micro-Sandboxes</title><description>The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The validation may involve mapping calling sequence addresses to modules or functions present in the process. Additionally, some embodiments relate to eliminating unnecessary code from various modules and controlling which modules can be loaded into a program.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDAKLc7MS1dwLC4uLUpNUXBOzMkB8YNTC0tT85JTixUy8xR8M5OL8nWDE_NSkvIrUot5GFjTEnOKU3mhNDeDsptriLOHbmpBfnxqcUFicmpeakl8aLCRgaG5gYWxuYGho6ExcaoARoIsjw</recordid><startdate>20170323</startdate><enddate>20170323</enddate><creator>TAJALLI Homayoon</creator><creator>GRAHAM Jeffrey J</creator><scope>EVB</scope></search><sort><creationdate>20170323</creationdate><title>Using Assured Calling Sequences in Micro-Sandboxes</title><author>TAJALLI Homayoon ; GRAHAM Jeffrey J</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2017083701A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>TAJALLI Homayoon</creatorcontrib><creatorcontrib>GRAHAM Jeffrey J</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>TAJALLI Homayoon</au><au>GRAHAM Jeffrey J</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Using Assured Calling Sequences in Micro-Sandboxes</title><date>2017-03-23</date><risdate>2017</risdate><abstract>The present disclosure relates to methods, systems, and devices that use assured calling sequences to validate proper application behavior. Validating calling sequences ensures that attackers have not modified the process' stack to gain control of the execution path for critical operations. The validation may involve mapping calling sequence addresses to modules or functions present in the process. Additionally, some embodiments relate to eliminating unnecessary code from various modules and controlling which modules can be loaded into a program.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2017083701A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Using Assured Calling Sequences in Micro-Sandboxes
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T01%3A43%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=TAJALLI%20Homayoon&rft.date=2017-03-23&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2017083701A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true