1. Field
The present invention relates to computer systems, and more particularly to the solidification of software to maintain the integrity of software and computer systems using unique module translation.
2. Related Art
The set of software available for execution on a computer is generally dynamic and modifiable, even when such modification is not desirable. Restricting the ability of users or administrators of a computer to install and remove software or to modify configuration of the existing software is enforced with passwords or verbal and written policies and guidelines. However, when passwords are used, possessors of administrative passwords generally have access beyond their immediate responsibilities.
Accordingly, there is a need for a technique for providing solidified (or “frozen”) software for maintaining the integrity of software and computer systems. The present invention addresses such a need.
A method for providing solidified software in a computing environment includes creating a new reference for at least one function in a function table; copying an address of the at least one function and associating the address with the new reference; replacing the address associated with an old reference of the at least one function with a dummy address; and substituting each old reference in normal code with the new reference, where injected code is not able to execute in the computing environment. The function table entries can be further randomized. The randomization can include reordering the entries, introducing intermediate mappings, or providing non-operative entries with the operative entries. Alternatively, all or part of the code of the function can be copied and moved to a different storage location and associated with the new reference. To save storage space, a portion of the code can be copied and moved, with the copied portion referencing the remaining portion of the code at its original location. The copied code can be further randomized. The randomization can include the insertion of dummy code, utilizing reverse peephole techniques, varying the size of the copied portion, or interleaving non-operative code with the copied code. In the above manner, the code for the function is solidified.
The following serves as a glossary of terms as used herein:
Computer: Any computing system comprising an operating system providing a set of resources for use by one or more pieces of software for execution on the computing system.
Injected Code. A set of instructions attempting to access a computing environment that has not been determined to have authorization to be installed or be executed in the computing environment.
Interface: A language, protocol or other boundary for providing a service or making available a resource to a piece of software on a computer. An interface comprises a name space, knowledge of which is needed for successful usage of the interface. For a given interface to a service or resource, an implementation of the service or resource fulfills requests made through the interface. One example of an interface comprises an Application Programming Interface (API) such as a system call interface of an operating system, wherein the name space comprises system call names or system call addresses, and the implementation comprises the portion of the operating system implementing the actual system calls. Another example of an interface comprises a set of function calls to a library, wherein the name space comprises function names or function addresses, and the implementation comprises the actual library code implementing the functions. Other interface examples include language APIs (such as a PERL API, Java API, PHP API, shell script APIs, etc.), database APIs, an interface to a file system of a computer (wherein the name space comprises a set of file names), and any interface to a container of data.
Normal Code: A set of instructions for execution on a computer that has been determined to have authorization to install and execute in a computing environment.
Reference: A thing that relates to an instruction for execution on a computer. The thing can be any mechanism, such as a name, a direct or indirect address for the location of the instruction, a number, a place in a data structure, an index in a list, an entry in a table, or an object in a data structure of any kind.
Software: Any set of instructions for execution on a computer. A piece of software may use one or more services or resources as provided by the computer through one or more interfaces.
Solidification: Creation of a unique computing system by converting uniform systems into functionally equivalent but logically unique systems, generally by breaking assumptions about a computer that software programs normally make in order to execute on that computer.
For example, referring to
The dummy address, Ax, can initiate any number of operations. The dummy address can point to an invalid address, a function that performs nothing, a function that performs an alternative function (execution exception, logging, etc.), or any other possible operation.
The randomization can be one of any number of techniques. One randomization technique is the reordering of the new function entries. For example, referring to
Another randomization technique is to introduce an intermediate mapping for the ordinal numbers. For example, referring to
Thus, in both randomization techniques, the place in a data structure cannot be used as a reference.
For example, referring to
Although the example of
The randomization can be any number of techniques, such as the insertion of dummy code, a reverse peephole technique, varying the size of the portion of code copied, and interleaving dead space into the copied code. Other randomization techniques can be used. By randomizing normal code in this manner, the normal code is able to continue executing in the computing environment while injected code that is not authorized to be installed or executed in the computing environment is not.
The various randomizations of the entries in the function table or of the function code described above can be used in any combination without departing from the spirit and scope of the present invention.
Foregoing described embodiments of the invention are provided as illustrations and descriptions. They are not intended to limit the invention to precise form described. In particular, it is contemplated that functional implementation of invention described herein may be implemented equivalently in hardware, software, firmware, and/or other available functional components or building blocks, and that networks may be wired, wireless, or a combination of wired and wireless. Other variations and embodiments are possible in light of above teachings, and it is thus intended that the scope of invention not be limited by this Detailed Description, but rather by Claims following.
| Number | Name | Date | Kind |
|---|---|---|---|
| 4688169 | Joshi | Aug 1987 | A |
| 4982430 | Frezza et al. | Jan 1991 | A |
| 5222134 | Waite et al. | Jun 1993 | A |
| 5390314 | Swanson | Feb 1995 | A |
| 5521849 | Adelson et al. | May 1996 | A |
| 5560008 | Johnson et al. | Sep 1996 | A |
| 5699513 | Feigen et al. | Dec 1997 | A |
| 5778349 | Okonogi | Jul 1998 | A |
| 5787427 | Benantar et al. | Jul 1998 | A |
| 5842017 | Hookway et al. | Nov 1998 | A |
| 5907709 | Cantey et al. | May 1999 | A |
| 6141698 | Krishnan et al. | Oct 2000 | A |
| 6275938 | Bond et al. | Aug 2001 | B1 |
| 6338149 | Ciccone, Jr. et al. | Jan 2002 | B1 |
| 6356957 | Sanchez, II et al. | Mar 2002 | B2 |
| 6393465 | Leeds | May 2002 | B2 |
| 6442686 | McArdle et al. | Aug 2002 | B1 |
| 6587877 | Douglis et al. | Jul 2003 | B1 |
| 6769115 | Oldman | Jul 2004 | B1 |
| 6832227 | Seki et al. | Dec 2004 | B2 |
| 6834301 | Hanchett | Dec 2004 | B1 |
| 6918110 | Hundt et al. | Jul 2005 | B2 |
| 6930985 | Rathi et al. | Aug 2005 | B1 |
| 6988101 | Ham et al. | Jan 2006 | B2 |
| 7065767 | Kambhammettu et al. | Jun 2006 | B2 |
| 7082456 | Mani-Meitav et al. | Jul 2006 | B2 |
| 7139916 | Billingsley et al. | Nov 2006 | B2 |
| 7177267 | Oliver et al. | Feb 2007 | B2 |
| 7251655 | Kaler et al. | Jul 2007 | B2 |
| 7290266 | Gladstone et al. | Oct 2007 | B2 |
| 7302558 | Campbell et al. | Nov 2007 | B2 |
| 7353501 | Tang et al. | Apr 2008 | B2 |
| 7363022 | Whelan et al. | Apr 2008 | B2 |
| 7441265 | Staamann et al. | Oct 2008 | B2 |
| 20020099671 | Mastin Crosbie et al. | Jul 2002 | A1 |
| 20030073894 | Chiang et al. | Apr 2003 | A1 |
| 20030074552 | Olkin et al. | Apr 2003 | A1 |
| 20030120811 | Hanson et al. | Jun 2003 | A1 |
| 20030120935 | Teal et al. | Jun 2003 | A1 |
| 20040015554 | Wilson | Jan 2004 | A1 |
| 20040051736 | Daniell | Mar 2004 | A1 |
| 20040143749 | Tajalli et al. | Jul 2004 | A1 |
| 20040230963 | Rothman et al. | Nov 2004 | A1 |
| 20040255161 | Cavanaugh | Dec 2004 | A1 |
| 20050018651 | Yan et al. | Jan 2005 | A1 |
| 20050228990 | Kato et al. | Oct 2005 | A1 |
| 20050262558 | Usov | Nov 2005 | A1 |
| 20070039049 | Kupferman et al. | Feb 2007 | A1 |
| 20070101435 | Konanka et al. | May 2007 | A1 |