Patents by Inventor Brad Calder

Brad Calder has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7802236
    Abstract: A method and architecture for analyzing a computer program by finding similar sections of execution of the computer program. Code of the computer program is run over a plurality of intervals of execution, and during the execution of the program, a statistic is tracked for a component. Using the tracked statistic, behavior of the computer program is identified over each of the plurality of intervals of execution, and at least one identified behavior of at least one interval of execution is compared to the behavior of another interval of execution to find similar sections of behavior.
    Type: Grant
    Filed: September 9, 2003
    Date of Patent: September 21, 2010
    Assignee: The Regents of the University of California
    Inventors: Brad Calder, Timothy Sherwood, Erez Perelman, Gregory Hamerly
  • Patent number: 7475394
    Abstract: A method for analyzing the performance of a program when running in an interpreted environment. An interpreter is a program that translates and executes another program. To analyze a binary in an interpreted environment, a mechanism is used to indicate points in the program at source, intermediate, or binary showing where information about the system is to be tracked/profiled/analyzed. Once these analysis points are determined, triggers are created in a separate file or inserted via program instrumentation into the binary to indicate to the interpreter when the analysis triggers need to be processed. The system being analyzed is then run via an interpreter. When one of these triggers occurs during execution, the interpreter calls analysis code passing it the appropriate information so that it may track statistics, metrics, and information about the program corresponding to the trigger.
    Type: Grant
    Filed: December 5, 2003
    Date of Patent: January 6, 2009
    Assignee: ARM Limited
    Inventors: Brad Calder, Todd Austin, Don Yang, Timothy Sherwood
  • Publication number: 20050125777
    Abstract: A method for analyzing the performance of a program when running in an interpreted environment. An interpreter is a program that translates and executes another program. To analyze a binary in an interpreted environment, a mechanism is used to indicate points in the program at source, intermediate, or binary showing where information about the system is to be tracked/profiled/analyzed. Once these analysis points are determined, triggers are created in a separate file or inserted via program instrumentation into the binary to indicate to the interpreter when the analysis triggers need to be processed. The system being analyzed is then run via an interpreter. When one of these triggers occurs during execution, the interpreter calls analysis code passing it the appropriate information so that it may track statistics, metrics, and information about the program corresponding to the trigger.
    Type: Application
    Filed: December 5, 2003
    Publication date: June 9, 2005
    Inventors: Brad Calder, Todd Austin, Don Yang, Timothy Sherwood
  • Publication number: 20040111708
    Abstract: A method and architecture for analyzing a computer program by finding similar sections of execution of the computer program. Code of the computer program is run over a plurality of intervals of execution, and during the execution of the program, a statistic is tracked for a component. Using the tracked statistic, behavior of the computer program is identified over each of the plurality of intervals of execution, and at least one identified behavior of at least one interval of execution is compared to the behavior of another interval of execution to find similar sections of behavior.
    Type: Application
    Filed: September 9, 2003
    Publication date: June 10, 2004
    Applicant: The Regents of the University of California
    Inventors: Brad Calder, Timothy Sherwood, Erez Perelman, Gregory Hamerly
  • Publication number: 20020092003
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: July 11, 2002
    Inventors: Brad Calder, Andrew Chien
  • Publication number: 20020065874
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Andrew Chien, Ying-Hung Chen, Shawn Marlin, Kang Su Gatlin, Brad Calder
  • Publication number: 20020065876
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Andrew Chien, Brad Calder, Steve Pujia
  • Publication number: 20020066022
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Brad Calder, Andrew A. Chien
  • Publication number: 20020065776
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Brad Calder, Ju Wang, Andrew Chien
  • Publication number: 20020065945
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Brad Calder, Andrew A. Chien
  • Publication number: 20020066021
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Andrew A. Chien, Brad Calder
  • Publication number: 20020065869
    Abstract: A system for securing an application for execution in a computer. In one embodiment, a preprocessor module modifies an application binary such that the application invokes an interception module in response to invoking certain system calls. The interception module prevents the application from adversely affecting the operating of a computer that is executing the application. Furthermore, the interception module protects the contents of the application from improper access by a user of the computer. For example, the interception module transparently encrypts all files that are used by the application such that a user of the computer cannot improperly access these files.
    Type: Application
    Filed: November 29, 2000
    Publication date: May 30, 2002
    Inventors: Brad Calder, Andrew Chien