-
公开(公告)号:US20190394171A1
公开(公告)日:2019-12-26
申请号:US16450934
申请日:2019-06-24
Applicant: Virtual Software Systems, Inc.
Inventor: Charles H. Kaman , Nathaniel Welch , Richard D. Fiorentino , Mario Troiani
Abstract: Techniques for securing communication. The techniques include using at least one device to perform: selecting a first operation from a plurality of operations, each of the plurality of operations associated with a respective type of data to be encrypted; generating first data to be encrypted at least in part by performing the first operation; encrypting both information identifying the first operation and the first data to obtain corresponding first ciphertext; and outputting the first ciphertext.
-
公开(公告)号:US20190394022A1
公开(公告)日:2019-12-26
申请号:US16450938
申请日:2019-06-24
Applicant: Virtual Software Systems, Inc.
Inventor: Charles H. Kaman , Nathaniel Welch , Richard D. Fiorentino , Mario Troiani
Abstract: Techniques for securing communication. The techniques include using at least one device to perform method for encrypting input data using a cipher associated with a plurality of languages including a first language, the first language associated with a first set of ciphertext symbols, a first permutation for the first set, and a first partition for the first permutation. The method includes obtaining, from the input data, a first plaintext symbol; mapping the first plaintext symbol to a first ciphertext symbol using the cipher, the mapping including: identifying a first set of candidate ciphertext symbols using the first plaintext symbol, the first permutation, and the first partition; and identifying, at random, the first ciphertext symbol from the first set of candidate ciphertext symbols; and outputting the first ciphertext symbol.
-
公开(公告)号:US10063567B2
公开(公告)日:2018-08-28
申请号:US14939467
申请日:2015-11-12
Applicant: VIRTUAL SOFTWARE SYSTEMS, INC.
Inventor: Richard D. Fiorentino , Charles H. Kaman , Mario Troiani , Erik Muench
CPC classification number: H04L63/14 , G06F9/54 , G06F11/1438 , G06F11/1492 , G06F21/52 , H04L63/123 , H04L63/1408
Abstract: A method of detecting aberrant behavior in a software application is described. The method includes instantiating replicated applications on computing devices using identical initial setting. Each replicated application is a replicated instance of the software application. Information associated with a first API call from the first replicated application, and information associated with a second API call from the second replicated application is received. The information includes a call identifier of the API call and a digest. The call identifier is unique during the lifetime of the replicated application issuing it and is identical across the replicated applications. If the first and second call identifiers are identical, the method determines whether the first and second digests match. The method also includes, in response to the first and second digests not matching, signaling that aberrant behavior has occurred. Apparatus and computer readable media are also described.
-
4.
公开(公告)号:US20160142422A1
公开(公告)日:2016-05-19
申请号:US14939467
申请日:2015-11-12
Applicant: VIRTUAL SOFTWARE SYSTEMS, INC.
Inventor: Richard D. Fiorentino , Charles H. Kaman , Mario Troiani , Erik Muench
CPC classification number: H04L63/14 , G06F9/54 , G06F11/1482 , G06F11/1683 , G06F11/2041 , G06F11/2097 , G06F2201/82 , H04L63/123 , H04L63/1408
Abstract: A method of detecting aberrant behavior in a software application is described. The method includes instantiating replicated applications on computing devices using identical initial setting. Each replicated application is a replicated instance of the software application. Information associated with a first API call from the first replicated application, and information associated with a second API call from the second replicated application is received. The information includes a call identifier of the API call and a digest. The call identifier is unique during the lifetime of the replicated application issuing it and is identical across the replicated applications. If the first and second call identifiers are identical, the method determines whether the first and second digests match. The method also includes, in response to the first and second digests not matching, signaling that aberrant behavior has occurred. Apparatus and computer readable media are also described.
Abstract translation: 描述了一种在软件应用中检测异常行为的方法。 该方法包括使用相同的初始设置实例化计算设备上的复制应用程序。 每个复制的应用程序是软件应用程序的复制实例。 与来自第一复制应用程序的第一API调用相关联的信息以及与来自第二复制应用程序的第二API调用相关联的信息被接收。 该信息包括API调用的呼叫标识符和摘要。 呼叫标识符在发布它的复制应用程序的生存期内是唯一的,并且在复制的应用程序中是相同的。 如果第一和第二呼叫标识符相同,则该方法确定第一和第二摘要是否匹配。 该方法还包括响应于不匹配的第一和第二摘要,表明发生了异常行为。 还描述了装置和计算机可读介质。
-
-
-