scispace - formally typeset
Patent

Method for authenticating software

Reads0
Chats0
TLDR
In this paper, the authors propose a method for authenticating software by defining a set of parameters to use for trace mapping the software, wherein the set of parameter represents the software functionality when executed.
Abstract
The present invention relates to a method for authenticating software. The method comprises defining 41 a set of parameters to use for trace mapping the software, wherein the set of parameters represents the software functionality when executed. The method further comprises: a) creating 42 a trusted fingerprint that is created by trace mapping the software using the set of parameters when executed in a trusted environment; b) creating 43 an operating fingerprint that is created by trace mapping the software using the set of parameters when executed in an operating environment; c) comparing 44 the operating fingerprint with the trusted fingerprint, and identifying 45 any difference between the trusted fingerprint and the operating fingerprint; and d) when said operating fingerprint is non-identical with the trusted fingerprint, initiating 46 predefined action(s) in response to the identified differences between the trusted fingerprint and the operating fingerprint.

read more

References
More filters
Proceedings ArticleDOI

Remote attestation to dynamic system properties: Towards providing complete system integrity evidence

TL;DR: A novel remote dynamic attestation system named ReDAS (Remote Dynamic Attestation System) that provides integrity evidence for dynamic system properties that represent the runtime behavior of the attested system and enable an attester to prove its runtime integrity to a remote party.
Patent

Method to validate availability of applications within a backup image

TL;DR: In this paper, a health services module can be installed on a virtual machine to test one or more applications that a user wishes to validate and if the application(s) of the virtual machine are available, a guarantee of availability can be provided for the backup image of the VM disk file.
Patent

Computing device to detect malware

TL;DR: In this article, the authors present an apparatus and method for a computing device to determine if an application is malware, which includes a query logger to log the behavior of the application on the computing device, a behavior analysis engine to analyze the log from the query logger, and a classifier to classify the behavior vector for the application as benign or malware.
Patent

Using Power Fingerprinting (PFP) to Monitor the Integrity and Enhance Security of Computer Based Systems

TL;DR: In this paper, power fingerprinting (PFP) is integrated into the detection phase of comprehensive defense-in-depth security, by deploying a network of PFP enabled nodes with predefined inputs forcing a specific state sequence and specific software execution.
Patent

Event anomaly analysis and prediction

TL;DR: In this paper, an anomaly analysis and prediction may include accessing a master-directed graph that specifies known events and transitions between the known events, and ranking each of the ranked known events may be clustered into a plurality of anomaly categories.