CA2469633A1 - Software safety execution system - Google Patents

Software safety execution system Download PDF

Info

Publication number
CA2469633A1
CA2469633A1 CA002469633A CA2469633A CA2469633A1 CA 2469633 A1 CA2469633 A1 CA 2469633A1 CA 002469633 A CA002469633 A CA 002469633A CA 2469633 A CA2469633 A CA 2469633A CA 2469633 A1 CA2469633 A1 CA 2469633A1
Authority
CA
Canada
Prior art keywords
file
execution system
storage unit
file name
pot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002469633A
Other languages
French (fr)
Other versions
CA2469633C (en
Inventor
Kazuhiko Kato
Yoshihiro Oyama
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Japan Science and Technology Agency
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2469633A1 publication Critical patent/CA2469633A1/en
Application granted granted Critical
Publication of CA2469633C publication Critical patent/CA2469633C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

A mechanism for safely executing software which is appropriate for software distribution. At site (312) of a transmitter side, an execution file (332) and a data file (334) processed by the execution file are encapsulated. Two remaining files (336, 338) do not exist physically at a pot (320) of the transmitter site. An archive file (320) is transmitted to the receiver site (314). At the receiver site (314), according to the rule of the security policy (340), a program (332) can map the file (336, 338) substantially not existing in the port to the file (354) of the local file system and file (356) of another pot (350) and perform processing by using the file (334) in the pot and the mapped files (354, 356).

Claims (21)

WHAT IS CLAIMED IS:
1. A secure software execution system allowing secure software execution comprising:
a pot that, includes a file name storage unit, which stores the names of files to be used including an executable file, and a file storage unit, which stores files; and a mapping means that translates a file name in the file name storage unit into the file name of an execution system, wherein the mapping means limits accessible files to only those described in the file name storage unit in the pot.
2. The secure software execution system of Claim 1, wherein the mapping means extracts a file from the file storage unit and provides it to an execution system before excecution.
3. The secure software execution system of Claim 1, wherein the mapping means extracts a file from the file storage unit and provides it to an execution system when required during execution.
4. The secure software execution system of any of Claims 1 through 3, wherein an executable file name to be initiated first can be stored in the file name storage unit.
5. The secure software execution system of any of Claims 1 through 4, wherein the file name storage unit stores a file name of a file other than those in the file storage unit, and the mapping means maps that file name to a file for an execution system and/
or a file in another pot.
6. The secure software execution system of any of Claims 1 through 5, wherein the file name storage unit can store directory names, and the mapping means maps each of those directory names to a directory for an execution system and/ or a directory in another pot.
7. The secure software execution system of Claim 6, wherein the mapping means associates the directory names with a plurality of directories in a predetermined order, and maps them to files in the directories in that order.
8. The secure software execution system of any of Claims 1 through 7, wherein the file name storage unit, can store file names in a site on a network, and the mapping means transfers a file having the file name from a site to an execution system.
9. The secure software execution system of any of Claims 1 through 8, wherein the mapping moans can map a process as a file.
10. The secure software execution system of any of Claims 1 through 9, wherein the mapping means can map to a file created by a process.
11. The secure software execution system of any of Claims 1 through 10, wherein the mapping means carries out mapping in conformity with a security policy specification for a execution system.
12. The secure software execution system of Claim 11, wherein the security policy specification includes specification of system calls that can be issued during execution.
13. The secure software execution system of Claim 11 or 12, wherein the security policy specification can be downloaded from another site on the network.
14. The secure software execution system of Claims 1 to 13, wherein specifications of file access authority of each user can be stored in the file name storage unit, and the mapping means controls access to a file in conformity with the specification of the access authority.
15. The secure software execution system of Claim 14, wherein the mapping means decrypts and reads out a tile by each user's read-out key.
16. The secure software execution system of Claim 14, wherein the mapping means decrypts a read-out key by each user's secret key, and decrypts and reads out a tile using that decrypted key.
17. The secure software execution system of Claim 14, wherein the mapping means decrypts a pair of a public key and a secret key or a read-out key and a write-in key by each user's secret key, and decrypts or encrypts a file using that decrypted key.
l8. A server system including pot information and security policy information comprising:
a datatase, which stores pot information and security policy specification corresponding to the pot information; and a retrieving means, which can retrieve the security policy by identifying a pot.
19. A recording medium that records a pot including a file name storage unit, which stores the names of files to be used including an executable file, and a file storage unit, which stores files.
20. A recording medium that records a program describing implementation of a mapping means in a computer system, which translates a file name in a file name storage unit in a pot into a file name for an execution system, wherein the pot includes a file name storage unit, which stores the names of files to be used including an executable file, and a file storage unit, which stores files; wherein the mapping means limits accessible files to only those described in the file name storage unit in the pot when executing that program.
21. A program describing information of a mapping means in a computer system, which translates a file name in a file name storage unit in a hot into a file name for an execution system, wherein the pot includes a file name storage unit, which stores the names of files to be used including an executable file, and a file storage unit, which stores files; wherein the mapping means limits accessible files to only those described in the file name storage unit in the pot when executing that program.
CA2469633A 2001-12-13 2002-12-03 Software safety execution system Expired - Fee Related CA2469633C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2001-380629 2001-12-13
JP2001380629 2001-12-13
PCT/JP2002/012659 WO2003050662A1 (en) 2001-12-13 2002-12-03 Software safety execution system

Publications (2)

Publication Number Publication Date
CA2469633A1 true CA2469633A1 (en) 2003-06-19
CA2469633C CA2469633C (en) 2011-06-14

Family

ID=19187209

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2469633A Expired - Fee Related CA2469633C (en) 2001-12-13 2002-12-03 Software safety execution system

Country Status (4)

Country Link
US (1) US7690023B2 (en)
JP (1) JP4522705B2 (en)
CA (1) CA2469633C (en)
WO (1) WO2003050662A1 (en)

Families Citing this family (66)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4512331B2 (en) * 2003-07-11 2010-07-28 株式会社リコー Encapsulated document creation device
US8539063B1 (en) 2003-08-29 2013-09-17 Mcafee, Inc. Method and system for containment of networked application client software by explicit human input
US7464408B1 (en) * 2003-08-29 2008-12-09 Solidcore Systems, Inc. Damage containment by translation
US7840968B1 (en) 2003-12-17 2010-11-23 Mcafee, Inc. Method and system for containment of usage of language interfaces
US7546286B2 (en) * 2004-02-19 2009-06-09 Microsoft Corporation Offline multi-table data editing and storage
US7716168B2 (en) 2005-06-29 2010-05-11 Microsoft Corporation Modifying table definitions within a database application
US7546291B2 (en) * 2004-02-19 2009-06-09 Microsoft Corporation Data source task pane
US8135755B2 (en) 2005-06-29 2012-03-13 Microsoft Corporation Templates in a schema editor
US7783735B1 (en) * 2004-03-22 2010-08-24 Mcafee, Inc. Containment of network communication
JP2005293109A (en) * 2004-03-31 2005-10-20 Canon Inc Software execution management device, software execution management method, and control program
US8607299B2 (en) * 2004-04-27 2013-12-10 Microsoft Corporation Method and system for enforcing a security policy via a security virtual machine
JP4745238B2 (en) * 2004-08-12 2011-08-10 富士通株式会社 Java applet, JAR file generation method, JAR file generation program, JAR file generation apparatus
US7873955B1 (en) 2004-09-07 2011-01-18 Mcafee, Inc. Solidifying the executable software set of a computer
JP4376233B2 (en) * 2005-02-04 2009-12-02 株式会社エヌ・ティ・ティ・ドコモ Client apparatus, device verification apparatus, and verification method
US7603552B1 (en) 2005-05-04 2009-10-13 Mcafee, Inc. Piracy prevention using unique module translation
US7856661B1 (en) 2005-07-14 2010-12-21 Mcafee, Inc. Classification of software on networked systems
US7617534B1 (en) 2005-08-26 2009-11-10 Symantec Corporation Detection of SYSENTER/SYSCALL hijacking
US7685638B1 (en) 2005-12-13 2010-03-23 Symantec Corporation Dynamic replacement of system call tables
US7743026B2 (en) * 2006-01-31 2010-06-22 Microsoft Corporation Redirection to local copies of server-based files
US7757269B1 (en) 2006-02-02 2010-07-13 Mcafee, Inc. Enforcing alignment of approved changes and deployed changes in the software change life-cycle
US7895573B1 (en) 2006-03-27 2011-02-22 Mcafee, Inc. Execution environment file inventory
US8893111B2 (en) 2006-03-31 2014-11-18 The Invention Science Fund I, Llc Event evaluation using extrinsic state information
US7870387B1 (en) 2006-04-07 2011-01-11 Mcafee, Inc. Program-based authorization
US8352930B1 (en) 2006-04-24 2013-01-08 Mcafee, Inc. Software modification by group to minimize breakage
US8555404B1 (en) 2006-05-18 2013-10-08 Mcafee, Inc. Connectivity-based authorization
US20080127142A1 (en) * 2006-11-28 2008-05-29 Microsoft Corporation Compiling executable code into a less-trusted address space
US9424154B2 (en) 2007-01-10 2016-08-23 Mcafee, Inc. Method of and system for computer system state checks
US8332929B1 (en) 2007-01-10 2012-12-11 Mcafee, Inc. Method and apparatus for process enforced configuration management
US7671567B2 (en) * 2007-06-15 2010-03-02 Tesla Motors, Inc. Multi-mode charging system for an electric vehicle
KR100897849B1 (en) 2007-09-07 2009-05-15 한국전자통신연구원 Apparatus and Method for finding malicious process
US8195931B1 (en) 2007-10-31 2012-06-05 Mcafee, Inc. Application change control
US8701189B2 (en) 2008-01-31 2014-04-15 Mcafee, Inc. Method of and system for computer system denial-of-service protection
US8615502B2 (en) 2008-04-18 2013-12-24 Mcafee, Inc. Method of and system for reverse mapping vnode pointers
US20100125830A1 (en) * 2008-11-20 2010-05-20 Lockheed Martin Corporation Method of Assuring Execution for Safety Computer Code
US8544003B1 (en) 2008-12-11 2013-09-24 Mcafee, Inc. System and method for managing virtual machine configurations
US8381284B2 (en) 2009-08-21 2013-02-19 Mcafee, Inc. System and method for enforcing security policies in a virtual environment
US8341627B2 (en) 2009-08-21 2012-12-25 Mcafee, Inc. Method and system for providing user space address protection from writable memory area in a virtual environment
US9552497B2 (en) 2009-11-10 2017-01-24 Mcafee, Inc. System and method for preventing data loss using virtual machine wrapped applications
US8925101B2 (en) 2010-07-28 2014-12-30 Mcafee, Inc. System and method for local protection against malicious software
US8938800B2 (en) 2010-07-28 2015-01-20 Mcafee, Inc. System and method for network level protection against malicious software
US8549003B1 (en) 2010-09-12 2013-10-01 Mcafee, Inc. System and method for clustering host inventories
US9075993B2 (en) 2011-01-24 2015-07-07 Mcafee, Inc. System and method for selectively grouping and managing program files
US9112830B2 (en) 2011-02-23 2015-08-18 Mcafee, Inc. System and method for interlocking a host and a gateway
KR20120100046A (en) * 2011-03-02 2012-09-12 삼성전자주식회사 Apparatus and method for access control of contents in distributed environment network
US9594881B2 (en) 2011-09-09 2017-03-14 Mcafee, Inc. System and method for passive threat detection using virtual memory inspection
US8694738B2 (en) 2011-10-11 2014-04-08 Mcafee, Inc. System and method for critical address space protection in a hypervisor environment
US8973144B2 (en) 2011-10-13 2015-03-03 Mcafee, Inc. System and method for kernel rootkit protection in a hypervisor environment
US9069586B2 (en) 2011-10-13 2015-06-30 Mcafee, Inc. System and method for kernel rootkit protection in a hypervisor environment
US8713668B2 (en) 2011-10-17 2014-04-29 Mcafee, Inc. System and method for redirected firewall discovery in a network environment
US8800024B2 (en) 2011-10-17 2014-08-05 Mcafee, Inc. System and method for host-initiated firewall discovery in a network environment
US8739272B1 (en) 2012-04-02 2014-05-27 Mcafee, Inc. System and method for interlocking a host and a gateway
JP5591883B2 (en) * 2012-07-23 2014-09-17 株式会社東芝 Information processing apparatus and program
US8826432B2 (en) 2012-12-06 2014-09-02 Airwatch, Llc Systems and methods for controlling email access
US9021037B2 (en) 2012-12-06 2015-04-28 Airwatch Llc Systems and methods for controlling email access
US8832785B2 (en) 2012-12-06 2014-09-09 Airwatch, Llc Systems and methods for controlling email access
US8978110B2 (en) 2012-12-06 2015-03-10 Airwatch Llc Systems and methods for controlling email access
US8862868B2 (en) 2012-12-06 2014-10-14 Airwatch, Llc Systems and methods for controlling email access
US8973146B2 (en) 2012-12-27 2015-03-03 Mcafee, Inc. Herd based scan avoidance system in a network environment
US8935781B1 (en) 2013-02-01 2015-01-13 Google Inc. Native code module security for arm 64-bit instruction set architectures
US9787686B2 (en) 2013-04-12 2017-10-10 Airwatch Llc On-demand security policy activation
JP6079875B2 (en) 2013-05-27 2017-02-15 富士通株式会社 Application execution program, application execution method, and information processing terminal device for executing application
WO2015060857A1 (en) 2013-10-24 2015-04-30 Mcafee, Inc. Agent assisted malicious application blocking in a network environment
EP3108395B1 (en) * 2014-02-18 2018-10-24 Proofpoint, Inc. Targeted attack protection using predictive sandboxing
WO2016024480A1 (en) * 2014-08-11 2016-02-18 日本電信電話株式会社 Browser-emulator device, construction device, browser emulation method, browser emulation program, construction method, and construction program
US11700241B2 (en) * 2019-02-27 2023-07-11 Sevitech, Llc Isolated data processing modules
US11409864B1 (en) 2021-06-07 2022-08-09 Snowflake Inc. Tracing supervisor for UDFs in a database system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6167522A (en) 1997-04-01 2000-12-26 Sun Microsystems, Inc. Method and apparatus for providing security for servers executing application programs received via a network
JP2001175526A (en) 1999-12-20 2001-06-29 Ando Electric Co Ltd System and method for testing ic
US20020092003A1 (en) * 2000-11-29 2002-07-11 Brad Calder Method and process for the rewriting of binaries to intercept system calls in a secure execution environment

Also Published As

Publication number Publication date
WO2003050662A1 (en) 2003-06-19
JPWO2003050662A1 (en) 2005-04-21
JP4522705B2 (en) 2010-08-11
US20050228990A1 (en) 2005-10-13
US7690023B2 (en) 2010-03-30
CA2469633C (en) 2011-06-14

Similar Documents

Publication Publication Date Title
CA2469633A1 (en) Software safety execution system
CA2417516C (en) Method and apparatus for automatic database encryption
US5548721A (en) Method of conducting secure operations on an uncontrolled network
EP1012691B1 (en) Encrypting file system and method
CA2253585C (en) Cryptographic file labeling system for supporting secured access by multiple users
CN106131048B (en) Non-trust remote transaction file safe storage system for block chain
US7840750B2 (en) Electrical transmission system in secret environment between virtual disks and electrical transmission method thereof
US7949693B1 (en) Log-structured host data storage
JP3516591B2 (en) Data storage method and system and data storage processing recording medium
US7908489B2 (en) Method for managing external storage devices
EP2043073A1 (en) Method for encrypting and decrypting shared encrypted files
US20040143733A1 (en) Secure network data storage mediator
AU2002213436A1 (en) Method and apparatus for automatic database encryption
JP4167476B2 (en) Data protection / storage method / server
WO2016128070A1 (en) Method for storing a data file of a client on a storage entity
KR20130107298A (en) Managing shared data using a virtual machine
CN110990863B (en) Method for realizing file access control through timestamp and encryption algorithm
CN101630292A (en) File encryption-decryption method of USB removable storage device
US20050138398A1 (en) System of databases of personal data and a method of governing access to databases of personal data
JP4587688B2 (en) Encryption key management server, encryption key management program, encryption key acquisition terminal, encryption key acquisition program, encryption key management system, and encryption key management method
CN108900510A (en) Off-line data storage method, device, computer equipment and storage medium
WO2008065342A1 (en) Data maps
WO2004001561A2 (en) Computer encryption systems
KR100923394B1 (en) Method of network-storage implementation in VPN
EP2028603B1 (en) External storage medium adapter

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20141203

MKLA Lapsed

Effective date: 20141203