scispace - formally typeset
Patent

Method and apparatus for the inter-operation of differing architectural and run time conventions

Reads0
Chats0
TLDR
The inventive mechanism as mentioned in this paper allows an application to switch modes during its operation, between a compatibility or legacy mode for a previous architecture and a native one for a current architecture, by using an official function descriptor which describes information for accessing a function which resides in one module.
Abstract
The inventive mechanism allows an application to switch modes during its operation, between a compatibility or legacy mode for a previous architecture, and a native mode for a current architecture. The mechanism includes an official function descriptor which describes information for accessing a function which resides in one module. The OFD has a legacy portion is useable by a legacy module and a native portion is useable by a native module. The mechanism also includes a linkage table that resides in a second module which references the function in the first module. The portion of the OFD which corresponds to the mode of the linkage table module is copied into the linkage table. Each portion contains one entry that corresponds to an address location of the function, and another entry that is a value for a register which refers to the data segment corresponding to the load module containing the function. The information in the OFD depends on whether the function is a legacy function or a native function.

read more

Citations
More filters
Patent

Secure execution of a computer program

TL;DR: In this article, an application-specific policy based on the permitted targets of all indirect transfers is created, and the policy is enforced such that the program is prohibited from executing indirect transfer instructions that do not target one of the allowed targets.
Patent

Constraint injection system for immunizing software programs against vulnerabilities and attacks

TL;DR: In this article, a constraint is inserted into a program to address a vulnerability of the program to attacks, which includes a segment of code that determines when the program has been asked to execute a "corner case" which does not occur in normal operations.
Patent

Secure execution of a computer program using a code cache

TL;DR: In this paper, three basic techniques are used to prevent hijacking of an application: restricted code origins (RCO), restricted control flow transfer (RCT), and un-circumventable sandboxing (UCS).
Patent

Method and apparatus for analyzing a main memory configuration

TL;DR: In this paper, the authors present a method and apparatus for analyzing the configuration of a computer main memory, which can be used to program the memory controller and to determine whether a user-selected configuration is consistent with those restrictions.
Patent

Dynamic native binding

TL;DR: In this article, a native binding technique is provided for insetting calls to native functions during translation of subject code to target code, such that function calls in the subject program to subject code functions are replaced in target code with calls to the native equivalents of the same functions.
References
More filters
Patent

Method and apparatus for forming a translation unit

TL;DR: In this paper, a run-time system for executing a binary image conversion system which converts instructions from a instruction set of a first, non-native computer system to a second, different, native computer system is described.
Proceedings ArticleDOI

Saving legacy with objects

TL;DR: This paper describes the experience providing and using an object-oriented interface to a legacy system and describes the challenges of adding new applications to such systems.
Patent

Method and apparatus for code translation optimization

TL;DR: In this article, a native microprocessor (20) accesses a foreign block of computer code, and an initial block scope defining translation parameters is assigned to the block (106), the block of "foreign" code is translated to "native" code and an optimization efficiency is calculated for the translated block.
Journal ArticleDOI

Legacy object modeling speeds software integration

TL;DR: Handed down from a previous generation of developers, often with a long history of adaptation to the enterprise, the ‘legacy’ now exists in an almost exclusively physical form frequently with inadequate or absent user and technical documentation.
Patent

Hybrid processor and method for executing incrementally upgraded software

TL;DR: In this article, an object request broker and a reference repository are used to provide information regarding the location and format of shared operands in a software-implemented instruction set.
Related Papers (5)