Using security-related attributes

Described is a technology including an evaluation methodology by which a set of privileged code such as a platform's API method may be marked as being security critical and/or safe for being called by untrusted code. The set of code is evaluated to determine whether the code is security critica...

Full description

Saved in:
Bibliographic Details
Main Authors Corby, Karen Elizabeth, Alcazar, Mark, Ramdatmisier, Viresh, Kirsman, Ariel Jorge, Needham, Andre A, Kaza, Akhilesh, Krishnaswamy, Raja, Cooperstein, Jeff, Kaufman, Charles W, Anderson, Chris, Tammana, Venkata Rama Prasad, Goldfeder, Aaron R, Hawkins, John
Format Patent
LanguageEnglish
Published 12.04.2011
Online AccessGet full text

Cover

Loading…
More Information
Summary:Described is a technology including an evaluation methodology by which a set of privileged code such as a platform's API method may be marked as being security critical and/or safe for being called by untrusted code. The set of code is evaluated to determine whether the code is security critical code, and if so, it is identified as security critical. Such code is further evaluated to determine whether the code is safe with respect to being called by untrusted code, and if so, is marked as safe. To determine whether the code is safe, a determination is made as to whether the first set of code leaks criticality, including by evaluating one or more code paths corresponding to one or more callers of the first set of code, and by evaluating one or more code paths corresponding to one or more callees of the first set of code.