Patents by Inventor Laurent DORÉ
Laurent DORÉ has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12113899Abstract: A system and a method for protecting code are provided. Extraction of code to be protected takes place during an object-to-object transformation and that code is replaced with fake binary code. The extracted code to be protected may then be encrypted or otherwise obscured and stored in a separate region of an object file. A prior source-to-source file transformation can be provided to isolate and mark the code to be protected, and to inject additional source code to handle later decryption.Type: GrantFiled: April 19, 2022Date of Patent: October 8, 2024Assignee: Nagravision SàrlInventors: Laurent Dore, Eric Piret, Yasser Belaidi, Brecht Wyseur
-
Patent number: 11899758Abstract: The present disclosure relates to software tampering resistance. In one aspect, a method for generating protected code is provided, comprising identifying a primary function in code to be obscured, the primary function being a function used to verify the integrity of the code run-time. The method then comprises generating a finite state machine from the primary function, wherein a state of the finite state machine at a given instance defines an element of the primary function to be executed. The method then comprises distributing the finite state machine throughout the code to obscure one or more areas of the code.Type: GrantFiled: August 30, 2019Date of Patent: February 13, 2024Assignee: Nagravision SàrlInventors: Laurent Doré, Christian Mönch, Brecht Wyseur
-
Publication number: 20230267067Abstract: In overview, methods, computer programs products and devices for securing software are provided. In accordance with the disclosure, a method may comprise attaching a debugger process to a software process. During execution of the software process, operations relevant to the functionality of the code process are carried out within the debugger process. As a result, the debugger process cannot be replaced or subverted without impinging on the functionality of the software process. The software process can therefore be protected from inspection by modified or malicious debugging techniques.Type: ApplicationFiled: April 26, 2023Publication date: August 24, 2023Inventors: Laurent DORE, Asfandyar ORAKZAI, Brecht WYSEUR, Yihui XU
-
Patent number: 11669433Abstract: In overview, methods, computer programs products and devices for securing software are provided. In accordance with the disclosure, a method may comprise attaching a debugger process to a software process. During execution of the software process, operations relevant to the functionality of the code process are carried out within the debugger process. As a result, the debugger process cannot be replaced or subverted without impinging on the functionality of the software process. The software process can therefore be protected from inspection by modified or malicious debugging techniques.Type: GrantFiled: May 16, 2022Date of Patent: June 6, 2023Assignee: Nagravision SàrlInventors: Laurent Dore, Asfandyar Orakzai, Brecht Wyseur, Yihui Xu
-
Publication number: 20220360442Abstract: A system and a method for protecting code are provided. Extraction of code to be protected takes place during an object-to-object transformation and that code is replaced with fake binary code. The extracted code to be protected may then be encrypted or otherwise obscured and stored in a separate region of an object file. A prior source-to-source file transformation can be provided to isolate and mark the code to be protected, and to inject additional source code to handle later decryption.Type: ApplicationFiled: April 19, 2022Publication date: November 10, 2022Applicant: NAGRAVISION S.A.Inventors: Laurent DORE, Eric PIRET, Yasser BELAIDI, Brecht WYSEUR
-
Publication number: 20220350728Abstract: In overview, methods, computer programs products and devices for securing software are provided. In accordance with the disclosure, a method may comprise attaching a debugger process to a software process. During execution of the software process, operations relevant to the functionality of the code process are carried out within the debugger process. As a result, the debugger process cannot be replaced or subverted without impinging on the functionality of the software process. The software process can therefore be protected from inspection by modified or malicious debugging techniques.Type: ApplicationFiled: May 16, 2022Publication date: November 3, 2022Inventors: Laurent DORE, Asfandyar ORAKZAI, Brecht WYSEUR, Yihui XU
-
Patent number: 11336448Abstract: A system and a method for protecting code are provided. Extraction of code to be protected takes place during an object-to-object transformation and that code is replaced with fake binary code. The extracted code to be protected may then be encrypted or otherwise obscured and stored in a separate region of an object file. A prior source-to-source file transformation can be provided to isolate and mark the code to be protected, and to inject additional source code to handle later decryption.Type: GrantFiled: June 29, 2017Date of Patent: May 17, 2022Assignee: NAGRAVISION S.A.Inventors: Laurent Dore, Eric Piret, Yasser Belaidi, Brecht Wyseur
-
Patent number: 11244075Abstract: A system and a method for monitoring the integrity of code are provided. Dummy code is provided in an on demand decryption area of an object file while runtime code is provided elsewhere (and may be in the same object file or another object file). A compensation area is also provided which is initially blank. During execution, checksums can be calculated based on the result of an exclusive or (XOR) operation between contents of the on demand code decryption area and a compensation area such as a compensation area. As the runtime code populates the on demand code decryption area with the runtime code (potentially with the exception of areas masked to maintain integrity of relocation instructions allowed to remain in the dummy code) the compensation area is populated with the result of an XOR operation between the dummy code and the runtime code. As a result, the checksums will be the same throughout execution as long as integrity of the code has not been compromised.Type: GrantFiled: September 29, 2017Date of Patent: February 8, 2022Assignee: NAGRAVISION S.A.Inventors: Eric Piret, Wyseur Brecht, Laurent Dore
-
Publication number: 20210342420Abstract: The present disclosure relates to software tampering resistance. In one aspect, a method for generating protected code is provided, comprising identifying a primary function in code to be obscured, the primary function being a function used to verify the integrity of the code run-time. The method then comprises generating a finite state machine from the primary function, wherein a state of the finite state machine at a given instance defines an element of the primary function to be executed. The method then comprises distributing the finite state machine throughout the code to obscure one or more areas of the code.Type: ApplicationFiled: August 30, 2019Publication date: November 4, 2021Applicant: NAGRAVISION S.A.Inventors: Laurent DORÉ, Christian MÖNCH, Brecht WYSEUR
-
Publication number: 20210004315Abstract: In overview, methods, computer programs products and devices for securing software are provided. In accordance with the disclosure, a method may comprise attaching a debugger process to a software process. During execution of the software process, operations relevant to the functionality of the code process are carried out within the debugger process. As a result, the debugger process cannot be replaced or subverted without impinging on the functionality of the software process. The software process can therefore be protected from inspection by modified or malicious debugging techniques.Type: ApplicationFiled: November 27, 2017Publication date: January 7, 2021Applicant: NAGRAVISION SAInventors: Laurent DORE, Asfandyar ORAKZAI, Brecht WYSEUR, Yihui XU
-
Publication number: 20200019730Abstract: A system and a method for monitoring the integrity of code are provided. Dummy code is provided in an on demand decryption area of an object file while runtime code is provided elsewhere (and may be in the same object file or another object file). A compensation area is also provided which is initially blank. During execution, checksums can be calculated based on the result of an exclusive or (XOR) operation between contents of the on demand code decryption area and a compensation area such as a compensation area. As the runtime code populates the on demand code decryption area with the runtime code (potentially with the exception of areas masked to maintain integrity of relocation instructions allowed to remain in the dummy code) the compensation area is populated with the result of an XOR operation between the dummy code and the runtime code. As a result, the checksums will be the same throughout execution as long as integrity of the code has not been compromised.Type: ApplicationFiled: September 29, 2017Publication date: January 16, 2020Inventors: Eric PIRET, Wyseur BRECHT, Laurent DORE
-
Publication number: 20190158286Abstract: A system and a method for protecting code are provided. Extraction of code to be protected takes place during an object-to-object transformation and that code is replaced with fake binary code. The extracted code to be protected may then be encrypted or otherwise obscured and stored in a separate region of an object file. A prior source-to-source file transformation can be provided to isolate and mark the code to be protected, and to inject additional source code to handle later decryption.Type: ApplicationFiled: June 29, 2017Publication date: May 23, 2019Applicant: NAGRAVISION S.A.Inventors: Laurent DORE, Eric PIRET, Belaidi YASSER, Brecht WYSEUR