摘要 |
Generating pseudo computer architectures for security, so that malicious software written to run on existing computer architectures is unable to run on the pseudo computer architectures, is disclosed. A method generates an pseudo computer architecture, and emulates this pseudo computer architecture. An existing computer architecture may be altered to generate the pseudo computer architecture. The pseudo computer architecture may be emnulated by software running on an existing computer architecture, via hardware, or by programming a programmable processor based on the pseudo computer architecture. The method performs a process to allow computer programs to run on the pseudo computer architecture. Executable binary code files for the computer programs may be generated, based on the pseudo computer architecture, from source code files for the computer programs. The binary code files for the computer programs that are runnable on existing computer architectures may also be modified to run on the pseudo computer architecture.
|