Abstract:
Providing synchronous processing of the designated computing events using hardware-assisted virtualization technology by performing at least the following: detecting a designated computing event using a high priority, low capability routine, creating a copy code in an alternate memory space of a first code located in a first memory space, modifying the copy code to call for analysis of at least a portion of the copy code that corresponds to the first code, switching execution of the first code with the modified copy code using an address translation data structure that translates a guest memory address to a host memory address after a return of the high priority, low capability routine; and analyzing synchronously the at least a portion of the code within the copy code that corresponds to the first code based on the replacement of the first code with the modified copy code.
Abstract:
Techniques are provided for establishing a secure exchange of data between containerized applications. A method can include registering, by a device, a first containerized application on the device with an access server, registering, by the device, a second containerized application on the device with the access server, verifying that the first containerized application and the second containerized application are configured to exchange data, and exchanging data between the first containerized application and the second containerized application registered with the access server.
Abstract:
The present disclosure relates to systems and methods for mapping an address to a memory region in a process. The mapping may involve receiving an address to be mapped. Based on the address to be mapped, it can be determined that a module corresponding to the address to be mapped I present in a module list associated with the process. The address to be mapped is then converted to a relative address within the identified module and mapping information for the address to be mapped is returned.
Abstract:
A method of verifying the integrity of a virtual machine in a cloud computing deployment comprises: creating a virtual machine image derived from a trusted virtual machine, wherein the trusted virtual machine has a Keyless Signature Infrastructure signature stored in a signature store; and verifying that a computation resource can be trusted. If it is verified that a computation resource can be trusted, the method further comprises: submitting the virtual machine image to the trusted computation resource; checking a signature of the virtual machine image against the stored signature of the trusted virtual machine; launching the virtual machine image on the trusted computation resource, and creating a Keyless Signature Infrastructure signature of the virtual machine image; and storing the signature of the virtual machine image in a signature store.
Abstract:
A migration service (200) and module (300) for software modules (111, 112, 121, 122) are disclosed. The migration service detects a security flaw in a first environment (110) in which the software modules (111, 112) are running and migrates the software modules or part of the software modules from the first environment (110) to a second environment (120) when a security flaw is detected.
Abstract:
The invention is a system comprising a host device and a secure element including a plurality of virtual profiles and an execution component configured to run simultaneously several of said virtual profiles. The system comprises a discovery agent configured to provide a subset of the plurality of virtual profiles, configuration data for each virtual profile of said subset and capability data reflecting the maximum of logical channels handled by the host device. The system comprises an allocating agent configured to cooperate with the discovery agent to allocate a range of logical channels to each virtual profile of the subset based on the capability data and to determine in each of the ranges a main logical channel which remains permanently available when the virtual profile to which the range is allocated has been booted.
Abstract:
Die vorliegende Erfindung betrifft ein System zur Überwachung der Integrität einer von einem Serversystem an ein Clientsystem ausgelieferten und auf dem Clientsystem verarbeitbaren und/oder ausführbaren Komponente, mit einem Integrationssystem und mit einem Sensor, wobei das Integrationssystem den Sensor in die von dem Serversystem an das Clientsystem ausgelieferte Komponente integriert, und wobei der Sensor so ausgestaltet ist, dass er bei der Verarbeitung und/oder Ausführung der Komponente ausgeführt wird und Modifikationen der Komponente erkennt.
Abstract:
L'invention se rapporte à un procédé de traitement, par un serveur de traitement de transactions, d'une transaction initiée au moins partiellement à partir d'un terminal de communication connectable audit serveur par l'intermédiaire d'un réseau de communication. Ce procédé comprend: -une étape de création (30) d'un canal de communication sécurisé avec le terminal de communication; -une étape d'instanciation (31), au sein d'un serveur d'exécution sur le réseau de communication, d'un terminal de paiement virtuel (VPOI) apte à échanger des informations avec le terminal de communication par le biais du canal de communication sécurisé; -une étape de traitement (32) de transaction entre le terminal de communication et le terminal de paiement virtuel (VPOI) mettant en œuvre au moins un module de sécurisation du terminal de communication, ledit module de sécurisation étant configuré pour échanger un identifiant du type de service.