×

Application randomization mechanism

  • US 10,007,498 B2
  • Filed: 08/04/2016
  • Issued: 06/26/2018
  • Est. Priority Date: 12/17/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • generating, by a computing system comprising one or more processors, first unique configuration information;

    generating, by the computing system and based on the first unique configuration information, a first unique instance of a software component that is executable on a runtime computing system, wherein generating the first unique instance of the software component comprises creating, by the computing system, a first modification to an application binary interface (ABI), wherein the first modification to the ABI comprises a first modification to an operating system kernel ABI that is associated with a first reordering of a system call table, and wherein the first unique instance of the software component uses the first modification to the ABI;

    generating, by the computing system, second unique configuration information, wherein the second unique configuration information is different from the first unique configuration information; and

    generating, by the computing system and based on the second unique configuration information, a second unique instance of the software component that is executable on the runtime computing system, wherein generating the second unique instance of the software component comprises creating, by the computing system, a second modification to the ABI, wherein the first modification to the ABI is different than the second modification to the ABI, wherein the second modification to the ABI comprises a second modification to the operating system kernel ABI that is associated with a second reordering of the system call table, and wherein the second unique instance of the software component uses the second modification to the ABI,wherein the first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×