Matches 1 - 50 out of 364 1 2 3 4 5 6 7 8 >


Match Document Document Title
US20140032932 METHOD, MANUFACTURE, AND APPARATUS FOR SECURE DEBUG AND CRASH LOGGING OF OBFUSCATED LIBRARIES  
A method, apparatus, and manufacture for debugging and crash logging is provided. A log file is received, where the log file includes encrypted log messages that indicate execution trace of...
US20140258733 ROOTS-OF-TRUST FOR MEASUREMENT OF VIRTUAL MACHINES  
Embodiments of techniques and systems associated with roots-of-trust (RTMs) for measurement of virtual machines (VMs) are disclosed. In some embodiments, a computing platform may provide a virtual...
US20110055592 METHOD OF OBFUSCATING A CODE  
A method of obfuscating a code is provided, wherein the method comprises performing a first level obfuscating technique on a code to generate a first obfuscated code, and performing a second level...
US20130061061 PROTECTING LOOK UP TABLES BY MIXING CODE AND OPERATIONS  
In the field of computer enabled cryptography, such as a cipher using lookup tables, the cipher is hardened against an attack by a protection process which obscures the lookup tables using the...
US20140101458 CODE TAMPERING PROTECTION FOR INSECURE ENVIRONMENTS  
In the field of computer software (code) security, it is known to include verification data such as hash values in or associated with the code to allow subsequent detection of tampering by a...
US20140215225 METHOD FOR INCREASING THE SECURITY OF SOFTWARE  
A method for increasing security of software is provided. The method includes replacing a part of a code section comprised in a binary source file of the software with a pre-set special command,...
US20150026483 Systems and Methods for Mobile Application Protection  
Systems and methods are provided for mobile application protection. An executable code associated with an application is received. An encrypted code and a wrapper code are generated based at least...
US20150039906 SYSTEMS AND METHODS FOR LONG UNIVERSAL RESOURCE LOCATOR COMPRESSION  
Methods and systems for managing universal resource locators (URLs) at a server include receiving, at the server, a search query from a client device; creating, by the server, a compressed hash...
US20120159194 RELATING TO CRYPTOGRAPHY  
A method and apparatus 20 for securing executable code embodying a cipher 12 using a metamorphic algorithm 24. The metamorphic algorithm 24 dynamically executes polymorphic primitives 43, each of...
US20120246487 System and Method to Protect Java Bytecode Code Against Static And Dynamic Attacks Within Hostile Execution Environments  
A method and system that provides secure modules that can address Java platform weaknesses and protect Java bytecode during execution time. The secure modules are implemented in C/C++ as an...
US20120159193 SECURITY THROUGH OPCODE RANDOMIZATION  
An opcode obfuscation system is described herein that varies the values of opcodes used by operating system or application code while the application is stored in memory. The system puts...
US20120110348 Secure Page Tables in Multiprocessor Environments  
A system comprises a memory module configured to store signed page table data and a selected processing element coupled to the memory module. The selected processing element is one of a plurality...
US20120204038 PERFORMING BOOLEAN LOGIC OPERATIONS USING ARITHMETIC OPERATIONS BY CODE OBFUSCATION  
Method and apparatus for obfuscating computer software code, to protect against reverse-engineering of the code. The obfuscation here is of the part of the code that performs a Boolean logic...
US20130103955 Controlling Transmission of Unauthorized Unobservable Content in Email Using Policy  
A system, method, and apparatus is disclosed to control mail server in handling encrypted messages according to a policy.
US20150178007 METHOD AND SYSTEM FOR INTEGRATED CLOUD STORAGE MANAGEMENT  
A system and method for storing and retrieving files across multiple cloud storages, including the steps of splitting a file into a plurality of chunks, sending a first chunk to a first storage...
US20150012757 SYSTEM AND METHOD FOR ROUTING-BASED INTERNET SECURITY  
Method and system for improving the security of storing digital data in a memory or its delivery as a message over the Internet from a sender to a receiver using one or more hops is disclosed. The...
US20120284532 METHOD AND SYSTEM FOR RECOVERING CRYPTOGRAPHIC OPERATIONS AND/OR SECRETS  
A computerized system and method for identifying one or more cryptographic operations from software code, comprising: performing processing associated with identifying, one or more cryptographic...
US20130198530 Low-Power Multi-Standard Cryptography Processing Units with Common Flip-Flop/Register Banks  
A method, system, and apparatus for managing a plurality of cipher processor units. A cipher module may receive a cipher instruction indicating a cipher algorithm to be used. The cipher module may...
US20120204039 COUNTERACTING MEMORY TRACING ON COMPUTING SYSTEMS BY CODE OBFUSCATION  
Method and apparatus for obfuscating computer software code, to protect against reverse-engineering of the code. The obfuscation here is on the part of the code that accesses buffers (memory...
US20110202775 ATOMIC HASH INSTRUCTION  
A method for performing a hash operation, including providing an atomic hash instruction that directs a microprocessor to perform a the hash operation and to indicate whether the hash operation...
US20120124393 System and Methods for Silencing Hardware Backdoors  
Methods for preventing activation of hardware backdoors installed in a digital circuit, the digital circuit comprising one or more hardware units to be protected. A timer is repeatedly initiated...
US20120254628 CIPHER MESSAGE EXECUTION IN A COMPUTING SYSTEM  
A method, system and program product for executing a multi-function instruction in an emulated computer system by specifying, via the multi-function instruction, either a capability query or...
US20140047245 IDENTIFICATION AND EXECUTION OF SUBSETS OF A PLURALITY OF INSTRUCTIONS IN A MORE SECURE EXECUTION ENVIRONMENT  
Embodiments of apparatus, computer-implemented methods, systems, devices, and computer-readable media are described herein for identifying and encrypting a subset of a plurality of instructions,...
US20150186627 SECURE SOFTWARE COMPNENTS ANTI-REVERSE-ENGINEERING BY TABLE INTERLEAVING  
A method of securely implementing functions in a secure software application, including: determining, by a processor, two functions to be implemented by the secure software application; generating...
US20090192898 Remote Ordering System  
A remote ordering system is provided using an electronic menu having a series of input devices associated with various menu items, and a wireless transmitter to send selected menu items to a...
US20130132736 System And Method For Establishing A Shared Secret For Communication Between Different Security Domains  
Embodiments may include generating an initial verifier for a first process, the initial verifier generated based on a trusted image of the first process. Embodiments may include, subsequent to...
US20060047973 Method of preventing multimedia copy  
A method of preventing a multimedia copy is disclosed, by which an illegal use such as a distribution, a copy and the like without permission can be prevented through fast transformation and...
US20110296201 METHOD AND APPARATUS FOR TRUSTED EXECUTION IN INFRASTRUCTURE AS A SERVICE CLOUD ENVIRONMENTS  
The present disclosure presents a method and apparatus configured to provide for the trusted execution of virtual machines (VMs) on a virtualization server, e.g., for executing VMs on a...
US20100223478 SYSTEM AND METHOD FOR PERFORMING EXPONENTIATION IN A CRYPTOGRAPHIC SYSTEM  
There are disclosed systems and methods for computing an exponentiatied message. In one embodiment blinding is maintained during the application of a Chinese Remainder Theorem (CRT) algorithm and...
US20120144208 INDEXED TABLE BASED CODE ENCRYPTING/DECRYPTING DEVICE AND METHOD THEREOF  
An indexed table based code encrypting device adapted to encrypt an executable file of a computer program includes: an index creator configured to classify codes of the executable file into code...
US20120036371 Protection from cryptoanalytic side-channel attacks  
A method for protecting a circuit configured for executing functional cryptographic operations according to execution instructions from cryptoanalytic side-channel attacks via differential power...
US20150089243 Secure Evaluation of a Program  
A method for enabling a client in a user device to securely evaluate a linear branching program. The program may include decision nodes and end-labels. A decision node is associated with a...
US20050283622 System for managing security index scores  
A system for managing security index scores is provided. A security index that rates the security level of a portion of code is associated with the code. Development tools, such as packaging...
US20120260105 SYSTEM AND METHOD FOR DEFENDING AGAINST REVERSE ENGINEERING OF SOFTWARE, FIRMWARE AND HARDWARE  
A method for defending a software against reverse engineering in a target environment includes acquiring information from the target environment, encrypting the software to be protected with the...
US20090119515 OBFUSCATION EVALUATION METHOD AND OBFUSCATION METHOD  
An obfuscation evaluation method which sufficiently evaluates an obfuscation performed on a program. The obfuscation evaluation method includes: a step (S424) of executing an obfuscated code...
US20140245026 SYSTEM AND METHOD FOR RESOURCE SHARING ACROSS MULTI-CLOUD ARRAYS  
A system for resource sharing across multi-cloud storage arrays includes a plurality of storage arrays and a cloud array storage (CAS) application. The plurality of storage resources are...
US20110258461 SYSTEM AND METHOD FOR RESOURCE SHARING ACROSS MULTI-CLOUD ARRAYS  
A system for resource sharing across multi-cloud storage arrays includes a plurality of storage arrays and a cloud array storage (CAS) application. The plurality of storage resources are...
US20140181533 SECURE OBJECT HAVING PROTECTED REGION, INTEGRITY TREE, AND UNPROTECTED REGION  
A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected region containing at least one of...
US20120011371 METHOD AND APPARATUS FOR SECURING INDIRECT FUNCTION CALLS BY USING PROGRAM COUNTER ENCODING  
A method for securing indirect function calls by using program counter encoding is provided. The method includes inserting a decoding code for an address of a library function stored in a GOT...
US20090125728 SECURITY METHOD OF SYSTEM BY ENCODING INSTRUCTIONS  
The provided is a method for securing a system by encoding instructions. The method includes encoding instructions composed by a system developer and storing the encoded instructions through an...
US20120096283 OPTIONAL FUNCTION MULTI-FUNCTION INSTRUCTION IN AN EMULATED COMPUTING ENVIRONMENT  
A method, system and program product for executing a multi-function instruction in an emulated computer system by specifying, via the multi-function instruction, either a capability query or...
US20090235089 COMPUTER OBJECT CODE OBFUSCATION USING BOOT INSTALLATION  
In the field of computer software, obfuscation techniques for enhancing software security are applied to compiled (object) software code. The obfuscation results here in different versions...
US20140101460 ARCHITECTURE AND INSTRUCTION SET FOR IMPLEMENTING ADVANCED ENCRYPTION STANDARD (AES)  
A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A...
US20130283064 METHOD AND APPARATUS TO PROCESS SHA-1 SECURE HASHING ALGORITHM  
A processor includes an instruction decoder to receive a first instruction to process a SHA-1 hash algorithm, the first instruction having a first operand to store a SHA-1 state, a second operand...
US20140089679 SECURE EXECUTION OF A COMPUTER PROGRAM USING BINARY TRANSLATORS  
Embodiments of apparatus, computer-implemented methods, systems, devices, and computer-readable media are described herein to provide a computing device with cooperative first and second binary...
US20090235088 Program conversion device, execution support device, and method and computer program for the same  
A method invocation modification unit modifies method invocation described in a body program to dynamic invocation and modifies the method invocation to invocation via an execution support device....
US20090235087 Security for Computer Software  
Persistent protection for application-specific or dependent software such as a workbook for use with independent software (such as Excelâ„¢) includes encryption of at least some instructions or...
US20080086647 METHOD AND SYSTEM FOR ALLOWING CUSTOMER OR THIRD PARTY TESTING OF SECURE PROGRAMMABLE CODE  
Methods and systems for allowing customer or third party testing of secure programmable code are disclosed and may include verifying code loaded in a set-top box utilizing a test hash or a...
US20100017624 From polymorphic executable to polymorphic operating system  
A method, capable of being implemented in executable instructions or programmes in device(s), including computer system(s) or computer-controlled device(s) or operating-system-controlled device(s)...
US20090228717 SYSTEM FOR MAKING PROGRAM DIFFICULT TO READ, DEVICE FOR MAKING PROGRAM DIFFICULT TO READ, AND METHOD FOR MAKING PROGRAM DIFFICULT TO READ  
Provided is an obfuscating apparatus for making a program analysis more difficult. The obfuscating apparatus creates a table for inputting the same number of arguments, for multiplying and...

Matches 1 - 50 out of 364 1 2 3 4 5 6 7 8 >