RETURN-ORIENTED PROGRAMMING AS AN OBFUSCATION TECHNIQUE
    1.
    发明申请
    RETURN-ORIENTED PROGRAMMING AS AN OBFUSCATION TECHNIQUE 有权
    面向方面的面向对象编程作为一种障碍技术

    公开(公告)号:US20150324585A1

    公开(公告)日:2015-11-12

    申请号:US14270558

    申请日:2014-05-06

    Applicant: NXP B.V.

    Abstract: A method for obfuscating functionality of computer software is disclosed. In an embodiment, the method involves determining a first set of instructions needed to perform a target operation and a second set of instructions for at least one or more additional operations. The second set of instructions is tuned to contain instructions such that, by executing the second set of instructions, the function of the first set of instructions can be performed. Once the first and second sets of instruction are determined and tuned, a code library is created and code fragments in the library correspond to code needed to perform the function of the first set of instructions when executed. Instructions are then added to the second set of instructions such that, when executed, will cause the functionality of the first set of instructions to be achieved.

    Abstract translation: 公开了一种用于模糊计算机软件功能的方法。 在一个实施例中,该方法包括确定执行目标操作所需的第一组指令和用于至少一个或多个附加操作的第二组指令。 调整第二组指令以包含指令,使得通过执行第二组指令,可以执行第一组指令的功能。 一旦确定和调整了第一组和第二组指令,就会创建一个代码库,并且库中的代码片段与执行第一组指令的功能所需的代码相对应。 然后将指令添加到第二组指令中,使得当被执行时,将导致实现第一组指令的功能。

    ARCHITECTURE FOR PLATFORM SECURITY USING A DEDICATED SECURITY DEVICE FOR USER INTERACTION
    3.
    发明申请
    ARCHITECTURE FOR PLATFORM SECURITY USING A DEDICATED SECURITY DEVICE FOR USER INTERACTION 审中-公开
    使用用于交互的专用安全设备进行平台安全的架构

    公开(公告)号:US20150326558A1

    公开(公告)日:2015-11-12

    申请号:US14708107

    申请日:2015-05-08

    Applicant: NXP B.V.

    CPC classification number: H04L63/083 G06F21/74 G06F21/83 G06F21/85 H04L63/10

    Abstract: There is provided an architecture for a data processing platform using a dedicated security device for user interaction, the data processing platform (100, 200) comprising: a processing device (108); a security device (102) communicatively coupled (114) with the processing device (108), the security device (102) being adapted for receiving input data (116) and providing the input data (116) to the processing device (108) only if the input data (116) are associated with a predetermined security level range, e.g. if the processing device (108) is in a secure operating mode or if input data (116) are considered by the security device (102) to have a security level in the predetermined security level range.

    Abstract translation: 提供了一种使用专用安全设备进行用户交互的数据处理平台的架构,数据处理平台(100,200)包括:处理设备(108); 与所述处理设备(108)通信地耦合(114)的安全设备(102),所述安全设备(102)适于接收输入数据(116)并且仅将所述输入数据(116)提供给所述处理设备(108) 如果输入数据(116)与预定的安全级别范围相关联,例如, 如果处理设备(108)处于安全操作模式,或者如果安全设备(102)认为输入数据(116)具有在预定安全级别范围内的安全级别。

    Return-oriented programming as an obfuscation technique
    4.
    发明授权
    Return-oriented programming as an obfuscation technique 有权
    回归型编程作为一种混淆技术

    公开(公告)号:US09411597B2

    公开(公告)日:2016-08-09

    申请号:US14270558

    申请日:2014-05-06

    Applicant: NXP B.V.

    Abstract: A method for obfuscating functionality of computer software is disclosed. In an embodiment, the method involves determining a first set of instructions needed to perform a target operation and a second set of instructions for at least one or more additional operations. The second set of instructions is tuned to contain instructions such that, by executing the second set of instructions, the function of the first set of instructions can be performed. Once the first and second sets of instruction are determined and tuned, a code library is created and code fragments in the library correspond to code needed to perform the function of the first set of instructions when executed. Instructions are then added to the second set of instructions such that, when executed, will cause the functionality of the first set of instructions to be achieved.

    Abstract translation: 公开了一种用于模糊计算机软件功能的方法。 在一个实施例中,该方法包括确定执行目标操作所需的第一组指令和用于至少一个或多个附加操作的第二组指令。 调整第二组指令以包含指令,使得通过执行第二组指令,可以执行第一组指令的功能。 一旦确定和调整了第一组和第二组指令,就会创建一个代码库,并且库中的代码片段与执行第一组指令的功能所需的代码相对应。 然后将指令添加到第二组指令中,使得当被执行时,将导致实现第一组指令的功能。

    RESTRICTING SOFTWARE TO AUTHORIZED WIRELESS ENVIRONMENTS
    5.
    发明申请
    RESTRICTING SOFTWARE TO AUTHORIZED WIRELESS ENVIRONMENTS 有权
    限制软件授权无线环境

    公开(公告)号:US20150172917A1

    公开(公告)日:2015-06-18

    申请号:US14105526

    申请日:2013-12-13

    Applicant: NXP B.V.

    Abstract: An apparatus for restricting execution of software is disclosed. The apparatus includes a telecommunication device configured to communicate with a wireless device (e.g., an RFID device) using a first wireless communication protocol. The telecommunication device is configured to determine whether or not the telecommunication device is located in an authorized wireless environment, based on wireless devices detected by the telecommunication device. The telecommunication device is also configured to execute a program in response to determining that it is located in an authorized wireless environment. Conversely, the telecommunication device is also configured to inhibit execution of the program in response to determining that it is not located in an authorized wireless environment.

    Abstract translation: 公开了一种用于限制软件执行的装置。 该装置包括被配置为使用第一无线通信协议与无线设备(例如,RFID设备)进行通信的电信设备。 电信设备被配置为基于由电信设备检测到的无线设备来确定电信设备是否位于授权的无线环境中。 电信设备还被配置为响应于确定其位于授权的无线环境中来执行程序。 相反,电信设备还被配置为响应于确定其不位于授权无线环境中而禁止程序的执行。

Patent Agency Ranking