Method of protecting the integrity of a computer program
First Claim
1. A method of protecting the integrity of a computer program running on a computer device, comprising the steps of:
- starting execution of the program, detecting whether or not an unauthorized modification of the address space of the program has occurred, terminating program execution if an unauthorized modification is detected and continuing program execution if no such modification has been detected; and
wherein the detecting step further comprises detecting unauthorized modification of program modules of the program and run-time libraries used by program.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of protecting the integrity of a computer program running on a computer device includes a procedure of detecting whether or not an unauthorized modification of the address space of the program has occurred and terminating program execution if an authorized modification is detected and continuing program execution if no such modification has been detected. A communication method between at least two communication parties of a computing device includes the step of generating at each of the communication parties for every communication sequence at runtime a private key and a public key for a digital signature, making available the public key to the other communication parties and performing the communication between the communication parties using a digital signature based on the private and public keys. Both methods provide improved protection against possible violations of integrity and authenticity by malicious programs on a local computer system.
-
Citations
29 Claims
-
1. A method of protecting the integrity of a computer program running on a computer device, comprising the steps of:
- starting execution of the program, detecting whether or not an unauthorized modification of the address space of the program has occurred, terminating program execution if an unauthorized modification is detected and continuing program execution if no such modification has been detected; and
wherein the detecting step further comprises detecting unauthorized modification of program modules of the program and run-time libraries used by program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 22, 29)
- starting execution of the program, detecting whether or not an unauthorized modification of the address space of the program has occurred, terminating program execution if an unauthorized modification is detected and continuing program execution if no such modification has been detected; and
-
18. A communication method between at least two communication parties (A, B) of a computing device, comprising the steps of:
- starting a communication sequence between the at least two communication parties, generating at each of the communication parties for every communication sequence a private key and a public key for a digital signature, making the public key of one communication party available to the other communication party, and exchanging encrypted messages between the communication parties with attached digital signatures using the respective private and public keys.
- View Dependent Claims (19, 20, 21, 23, 24, 25)
-
26. A computing device comprising a plurality of functional modules (A, B, C, D), which communicate with each other, comprising:
- a key generating unit (212) for generating a private key and a corresponding public key, a signature attaching unit (211) for providing a message with attached digital signature using the private key, a modification-protected memory area (214) having a fixed address for storing the public key, and further fixed addresses of the public keys of the other modules to which secure communication should be enabled, and a signature verifying unit (210) for verifying received messages from the other modules using the respective public keys of the sender modules.
- View Dependent Claims (27, 28)
Specification