发明名称 System and method for limiting exploitable or potentially exploitable sub-components in software components
摘要 Approaches for limiting exploitable or potentially exploitable sub-components in software components are disclosed. In certain implementations, a first software component in the component creation environment may be identified. The first software component may include a first sub-component that provides a function that is exploitable or potentially exploitable to compromise the first software component. The first sub-component may be disabled such that the function provided by the first sub-component is not available via the first software component when the first software component is executed. The first software component may be placed in the component repository after the first sub-component is disabled such that the first software component is placed in the component repository without availability of the function provided by the first sub-component. In some implementations, disabling the first sub-component may comprise removing the first sub-component from the first software component.
申请公布号 US9461823(B2) 申请公布日期 2016.10.04
申请号 US201514679831 申请日期 2015.04.06
申请人 FUGUE, INC. 发明人 Stella Josha;Zippilli Dominic;Brinkman Matthew
分类号 G06F11/00;H04L9/14;H04L29/06;G06F21/57 主分类号 G06F11/00
代理机构 Morrison & Foerster LLP 代理人 Morrison & Foerster LLP
主权项 1. A computer-implemented method of limiting exploitable applications in an operating system instance, the method being implemented by a computer system that includes one or more physical processors executing computer program instructions which, when executed, perform the method, the method comprising: obtaining, by the computer system, at least a first operating system instance, the first operating system instance including a first application that provides a function that is exploitable to compromise the first operating system instance; disabling, by the computer system, prior to the first operating system instance ever being available for use in a runtime environment in which the first operating system instance is to be executed, the first application such that the function provided by the first application will not be available via the first operating system instance when the first operating system is executed in the runtime environment, wherein disabling the first application comprises associating, prior to the first operating system instance ever being available for use in the runtime environment, the first operating system instance with disabling instructions such that the disabling instructions causes availability of the function provided by the first application to be removed from the first operating system instance during a boot-up of the first operating system instance, and wherein associating the first operating system with the disabling instructions comprises inserting, prior to the first operating system instance ever being available for use in the runtime environment, the disabling instructions into the first operating system instance; and causing, by the computer system, the first operating system instance to be executed in the runtime environment after the first application is disabled such that the function provided by the first application is not available for use and is not exploitable to compromise the first operating system instance.
地址 Frederick MD US