Patents by Inventor Douglas McPherson Little

Douglas McPherson Little has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10803151
    Abstract: In a general aspect, a computer implemented method can include identifying, in a program code stored in computer memory, a location of a dynamic repair target code section for an assignment to a program variable, a value of which is known only at runtime. The method can also include modifying the program code at the identified location of the dynamic repair target code section to assign an immediate value different from a correct runtime value to the program variable. The method can further include inserting, into the program code in the computer memory, a dynamic repair probe code section that is executed before the dynamic repair target code and, at runtime, modifies the immediate value in the code to contain the correct runtime value when an attack has not occurred.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: October 13, 2020
    Assignee: VERIMATRIX
    Inventors: Neil William Stewart, Graeme Kerr Harkness, Douglas McPherson Little
  • Patent number: 9892282
    Abstract: A computer implemented anti-tamper system employing runtime profiling of software in order to decide where to inject integrity checks into the software, to enable verification of whether or not the software has been tampered with. Runtime profiling and analysis is used to record information about the application, in order to establish the locations and targets of runtime integrity checks in order to optimize protection security, while minimizing the performance penalty and the need for hand configuration.
    Type: Grant
    Filed: April 7, 2009
    Date of Patent: February 13, 2018
    Assignee: Inside Secure
    Inventors: Neil William Stewart, Graeme Kerr Harkness, Douglas McPherson Little
  • Publication number: 20170337358
    Abstract: In a general aspect, a computer implemented method can include identifying, in a program code stored in computer memory, a location of a dynamic repair target code section for an assignment to a program variable, a value of which is known only at runtime. The method can also include modifying the program code at the identified location of the dynamic repair target code section to assign an immediate value different from a correct runtime value to the program variable. The method can further include inserting, into the program code in the computer memory, a dynamic repair probe code section that is executed before the dynamic repair target code and, at runtime, modifies the immediate value in the code to contain the correct runtime value when an attack has not occurred.
    Type: Application
    Filed: May 31, 2017
    Publication date: November 23, 2017
    Inventors: Neil William STEWART, Graeme Kerr HARKNESS, Douglas McPherson LITTLE
  • Patent number: 9690914
    Abstract: Program code is modified to execute correctly only when code and data memory accesses/fetches are synchronised, i.e. data and code accesses/fetches are routed to identical physical addresses in computer memory. This indirectly defeats the MMU attack, in which code and data memory accesses/fetches to the same logical address are routed to different physical addresses. The program code is modified such that one or more sections of the code (“repair targets”) are deliberately broken so that the program code will not execute correctly, the repair targets being replaced at run time with correct code before the repair targets are executed.
    Type: Grant
    Filed: June 12, 2009
    Date of Patent: June 27, 2017
    Assignee: Metaforic Limited
    Inventors: Neil William Stewart, Graeme Kerr Harkness, Douglas McPherson Little
  • Publication number: 20110154503
    Abstract: Program code is modified to execute correctly only when code and data memory accesses/fetches are synchronised, i.e. data and code accesses/fetches are routed to identical physical addresses in computer memory. This indirectly defeats the MMU attack, in which code and data memory accesses/fetches to the same logical address are routed to different physical addresses. The program code is modified such that one or more sections of the code (“repair targets”) are deliberately broken so that the program code will not execute correctly, the repair targets being replaced at run time with correct code before the repair targets are executed.
    Type: Application
    Filed: June 12, 2009
    Publication date: June 23, 2011
    Applicant: Metaforic Limited
    Inventors: Neil William Stewart, Graeme Kerr Harkness, Douglas McPherson Little
  • Publication number: 20110088095
    Abstract: A computer implemented anti-tamper system employing runtime profiling of software in order to decide where to inject integrity checks into the software, to enable verification of whether or not the software has been tampered with. Runtime profiling and analysis is used to record information about the application, in order to establish the locations and targets of runtime integrity checks in order to optimise protection security, while minimising the performance penalty and the need for hand configuration.
    Type: Application
    Filed: April 7, 2009
    Publication date: April 14, 2011
    Applicant: METAFORIC LIMITED
    Inventors: Neil William Stewart, Graeme Kerr Harkness, Douglas McPherson Little