scispace - formally typeset
Search or ask a question
Topic

Legacy mode

About: Legacy mode is a research topic. Over the lifetime, 51 publications have been published within this topic receiving 693 citations. The topic is also known as: compatibility mode.


Papers
More filters
Patent
25 Sep 2001
TL;DR: In this article, the authors present a method for monitoring location capabilities of mobile stations in a database (120) of a communication network, which includes one or more of the following capabilities: an autonomous mode capability, an assisted mode capability and a legacy mode capability.
Abstract: The present invention is a communication network (100) and method for monitoring location capabilities of mobile stations (102) in a database (120) of a communication network. Initially, the network receives an identification number from a mobile station (102). If the database (120) does not include a location capability corresponding to the identification number, then a processor (118) requests the location capability from the mobile station (102) and stores the requested location capability in the database (120). The location capability includes one or more of the following capabilities: an autonomous mode capability, an assisted mode capability and a legacy mode capability. To retrieve an entry from the database (120), the network reads the location capability corresponding to the identification number from the database (120). The network then assembles an assistance message based on the location capability of the mobile station (102) and transmits the assistance message to the mobile station (102).

119 citations

Patent
21 Apr 2004
TL;DR: In this article, a switching routine is implemented to switch from one operating mode to another and to transfer control from one software entity to another, such as a host operating system and a virtual machine monitor.
Abstract: A processor has multiple operating modes, such as the long/compatibility mode, the long/64-bit mode and the legacy modes of the x86-64 microprocessor. Different software entities execute in different ones of these operating modes. A switching routine is implemented to switch from one operating mode to another and to transfer control from one software entity to another. The software entities may be, for example, a host operating system and a virtual machine monitor. Thus, for example, a virtual computer system may comprise a 64-bit host operating system and a 32-bit virtual machine monitor, executing on an x86-64 microprocessor in long mode and legacy mode, respectively, with the virtual machine monitor supporting an x86 virtual machine. The switching routine may be implemented partially or completely in an identity-mapped memory page. Execution of the switching routine may be initiated by a driver that is installed in the host operating system of a virtual computer system.

67 citations

Posted Content
01 Jan 2002
TL;DR: In this paper, a man-in-the-middle attack for impersonating the legitimate client is presented. But the PIC protocol does not even have this option, because the goal of PIC is to obtain credentials that can be used for client authentication.
Abstract: Recently new protocols have been proposed in the IETF for protecting remote client authentication protocols by running them within a secure tunnel. Examples of such protocols are PIC, PEAP and EAP-TTLS. One goal of these new protocols is to enable the migration from legacy client authentication protocols to more secure protocols, e.g., from plain EAP type to, say, PEAP. In these protocols, the security of the subsequent session credentials are based only on keys derived during the unilateral authentication where the network server is authenticated to the client. Client authentication is mentioned as an option in PEAP and EAP-TTLS, but is not mandated. Naturally, the PIC protocol does not even oer this option, because the goal of PIC is to obtain credentials that can be used for client authentication. In addition to running the authentication protocols within such tunnel, it should also be possible to use them in legacy mode without any tunneling so as to leverage the legacy advantages such as widespread use. In this paper we show that in practical situations, such a mixed mode usage opens up the possibility to run a man-in-the-middle attack for impersonating the legitimate client. For those well-designed client authentication protocols that already have a sucient level of security, the use of tunneling in the proposed form is a step backwards because they introduce a new vulnerability. The problem is due to the fact that the legacy client authentication protocol is not aware if it is run in protected or unprotected mode. We propose to solve the discovered problem by using a cryptographic binding between the client authentication protocol and the protection protocol.

63 citations

Proceedings ArticleDOI
22 Mar 2006
TL;DR: The approach reifies the execution traces and uses logic programming to express tests on them, which eliminates the need to programatically bring the system in a particular state, and handles the test-writer a high-level abstraction mechanism to query the trace.
Abstract: When reengineering legacy systems, it is crucial to assess if the legacy behavior has been preserved or how it changed due to the reengineering effort. Ideally if a legacy system is covered by tests, running the tests on the new version can identify potential differences or discrepancies. However, writing tests for an unknown and large system is difficult due to the lack of internal knowledge. It is especially difficult to bring the system to an appropriate state. Our solution is based on the acknowledgment that one of the few trustable piece of information available when approaching a legacy system is the running system itself. Our approach reifies the execution traces and uses logic programming to express tests on them. Thereby it eliminates the need to programatically bring the system in a particular state, and handles the test-writer a high-level abstraction mechanism to query the trace. The resulting system, called Testlog, was used on several real-world case studies to validate our claims.

50 citations

Patent
06 Jan 1998
TL;DR: The inventive mechanism as mentioned in this paper allows an application to switch modes during its operation, between a compatibility or legacy mode for a previous architecture and a native one for a current architecture, by using an official function descriptor which describes information for accessing a function which resides in one module.
Abstract: The inventive mechanism allows an application to switch modes during its operation, between a compatibility or legacy mode for a previous architecture, and a native mode for a current architecture. The mechanism includes an official function descriptor which describes information for accessing a function which resides in one module. The OFD has a legacy portion is useable by a legacy module and a native portion is useable by a native module. The mechanism also includes a linkage table that resides in a second module which references the function in the first module. The portion of the OFD which corresponds to the mode of the linkage table module is copied into the linkage table. Each portion contains one entry that corresponds to an address location of the function, and another entry that is a value for a register which refers to the data segment corresponding to the load module containing the function. The information in the OFD depends on whether the function is a legacy function or a native function.

43 citations

Network Information
Related Topics (5)
Layer (object-oriented design)
5.8K papers, 44.8K citations
83% related
Reference architecture
11K papers, 196.4K citations
81% related
Software measurement
5.3K papers, 129.1K citations
79% related
Darwin (ADL)
4.2K papers, 72.3K citations
79% related
Software design pattern
5.9K papers, 147.8K citations
79% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20211
20191
20182
20172
20163
20152