Method of defending software from debugger attacks
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-011/30
G06F-012/14
G06F-009/44
H04L-009/32
출원번호
US-0319736
(2002-12-12)
발명자
/ 주소
Rothrock,Lewis V.
출원인 / 주소
Intel Corporation
인용정보
피인용 횟수 :
12인용 특허 :
7
초록▼
Deterring an attack on a tamper-resistant application program may be accomplished by loading a plurality of agents and starting a plurality of processing threads, each thread executing one of the agents, concurrently executing each agent substantially in parallel to produce a processing result for e
Deterring an attack on a tamper-resistant application program may be accomplished by loading a plurality of agents and starting a plurality of processing threads, each thread executing one of the agents, concurrently executing each agent substantially in parallel to produce a processing result for each agent for an iteration of a stage of protocol processing, storing each processing result in an entry in a buffer associated with each agent, and repeating the executing and storing actions for multiple iterations of the protocol processing. When one of the agents stores a processing result in a last entry of the agent's buffer, the processing results from the first entries in the buffers are combined to produce a combined result, and if the combined result indicates an error, failure semantics may be executed.
대표청구항▼
What is claimed is: 1. A method of deterring an attack on a tamper-resistant application program comprising: beginning execution of the tamper-resistant application program; loading a plurality of agents and starting a plurality of processing threads, each thread executing one of the agents; concur
What is claimed is: 1. A method of deterring an attack on a tamper-resistant application program comprising: beginning execution of the tamper-resistant application program; loading a plurality of agents and starting a plurality of processing threads, each thread executing one of the agents; concurrently executing each agent substantially in parallel to produce a processing result for each agent for an iteration of a stage of protocol processing; storing each processing result in an entry in a buffer associated with each agent; repeating the executing and storing actions for multiple iterations of the protocol processing; when one of the agents stores a processing result in a last entry of the agent's buffer, combining processing results from the first entries of the buffers to produce a combined result; and if the combined result indicates an error, executing failure semantics. 2. The method of claim 1, wherein executing failure semantics comprises terminating execution of the tamper-resistant application program. 3. The method of claim 1, further comprising: if the combined result does not indicate an error, continuing processing of a next stage of protocol processing. 4. The method of claim 1, wherein the protocol comprises a cryptographic protocol. 5. The method of claim 1, wherein each agent operates as an integrity verification kernel continuously verifying the integrity of the tamper-resistant application program. 6. The method of claim 1, wherein the tamper-resistant application program comprises a player application to access protected content. 7. The method of claim 1, wherein the buffer comprises a circular buffer stored in encrypted form in a secure storage. 8. The method of claim 7, wherein storing each processing result comprises decrypting the entry, storing the processing result, and re-encrypting the entry. 9. An article comprising: a tangible storage medium having a plurality of machine accessible instructions, wherein when the instructions are executed by a processor, the processor provides for deterring an attack on a tamper-resistant application program by beginning execution of the tamper-resistant application program; loading a plurality of agents and starting a plurality of processing threads, each thread executing one of the agents; concurrently executing each agent substantially in parallel to produce a processing result for each agent for an iteration of a stage of protocol processing; storing each processing result in an entry in a buffer associated with each agent; repeating the executing and storing actions for multiple iterations of the protocol processing; when one of the agents stores a processing result in a last entry of the agent's buffer, combining processing results from the first entries in the buffers to produce a combined result; and if the combined result indicates an error, executing failure semantics. 10. The article of claim 9, wherein instructions for executing failure semantics comprise instructions for terminating execution of the tamper-resistant application program. 11. The article of claim 9, further comprising instructions for if the combined result does not indicate an error, continuing processing of a next stage of protocol processing. 12. The article of claim 9, wherein the protocol comprises a cryptographic protocol. 13. The article of claim 9, wherein each agent comprises instructions for operating as an integrity verification kernel continuously verifying the integrity of the tamper-resistant application program. 14. The article of claim 9, wherein the tamper-resistant application program comprises a player application to access protected content. 15. The article of claim 9, wherein the buffer comprises a circular buffer stored in encrypted form in a secure storage. 16. The article of claim 15, wherein instructions for storing each processing result comprise instructions for decrypting the entry, storing the processing result, and re-encrypting the entry.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (7)
England Paul ; DeTreville John D. ; Lampson Butler W., Digital rights management operating system.
Kalafatis, Stavros; Kyker, Alan B.; Fisch, Robert D., Method and system to perform a thread switching operation within a multithreaded processor based on detection of a branch instruction.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Nardone Joseph M. ; Mangold Richard P. ; Pfotenhauer Jody L. ; Shippy Keith L. ; Aucsmith David W. ; Maliszewski Richard L. ; Graunke Gary L., Tamper resistant methods and apparatus.
Nardone Joseph M. ; Mangold Richard T. ; Pfotenhauer Jody L. ; Shippy Keith L. ; Aucsmith David W. ; Maliszewski Richard L. ; Graunke Gary L., Tamper resistant methods and apparatus.
Boxall, Alan S.; Guan, James T.; Pett, Roger H. E.; Truong, Trong, Comparative program execution through control of two or more debug sessions to automatically determine execution differences.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.