WO2004008294A3 - Distributed computing using syscall proxying - Google Patents

Distributed computing using syscall proxying Download PDF

Info

Publication number
WO2004008294A3
WO2004008294A3 PCT/US2003/022549 US0322549W WO2004008294A3 WO 2004008294 A3 WO2004008294 A3 WO 2004008294A3 US 0322549 W US0322549 W US 0322549W WO 2004008294 A3 WO2004008294 A3 WO 2004008294A3
Authority
WO
WIPO (PCT)
Prior art keywords
syscall
remote computer
request
network
local computer
Prior art date
Application number
PCT/US2003/022549
Other languages
French (fr)
Other versions
WO2004008294A2 (en
Inventor
Maximilian Gabriel Caceres
Gustavo Ajzenman
Ricardo Quesada
Gerardo Gabriel Richarte
Luciano Notarfrancesco
Bruce Robert Leidl
Javier Burroni
Friedman Agustin Azubel
Ruiz Gabriel Martin Becedillas
Original Assignee
Core Sdi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Core Sdi Inc filed Critical Core Sdi Inc
Priority to AU2003252049A priority Critical patent/AU2003252049A1/en
Publication of WO2004008294A2 publication Critical patent/WO2004008294A2/en
Publication of WO2004008294A3 publication Critical patent/WO2004008294A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Abstract

A system is provided for executing a system call originating in a local computer on a first remote computer connected to the local computer via a network. Communication is established between the local computer and the first remote computer via the network. A syscall server is installed in the first remote computer. A reference address is sent from the first remote computer to the local computer via the network through executing of code by the syscall server. A syscall request is built in the local computer with arguments determined using the reference address received from the first remote computer. The syscall request is sent from the local computer to the first remote computer via the network. The syscall request is copied into a stack of the first remote computer through execution of code by the syscall server. Registers are propped from the syscall request in the stack. Execution of a syscall request is initiated on the first remote computer. The result of the syscall request is pushed onto the stack. At least a portion of the result of the syscall request is sent to the local computer via the network through execution of code by the syscall server.
PCT/US2003/022549 2002-07-17 2003-07-17 Distributed computing using syscall proxying WO2004008294A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003252049A AU2003252049A1 (en) 2002-07-17 2003-07-17 Distributed computing using syscall proxying

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US39681302P 2002-07-17 2002-07-17
US60/396,813 2002-07-17

Publications (2)

Publication Number Publication Date
WO2004008294A2 WO2004008294A2 (en) 2004-01-22
WO2004008294A3 true WO2004008294A3 (en) 2004-04-01

Family

ID=30116057

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/022549 WO2004008294A2 (en) 2002-07-17 2003-07-17 Distributed computing using syscall proxying

Country Status (3)

Country Link
US (1) US7277937B2 (en)
AU (1) AU2003252049A1 (en)
WO (1) WO2004008294A2 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050278723A1 (en) * 2004-06-14 2005-12-15 Feinleib David A System and method for remote administration from a windows client of computer systems running the Linux operating system
US7831995B2 (en) * 2004-10-29 2010-11-09 CORE, SDI, Inc. Establishing and enforcing security and privacy policies in web-based applications
US8281401B2 (en) * 2005-01-25 2012-10-02 Whitehat Security, Inc. System for detecting vulnerabilities in web applications using client-side application interfaces
CA2679967C (en) * 2007-03-06 2017-07-25 Core Sdi Incorporated System and method for providing application penetration testing
US8356353B2 (en) 2007-06-26 2013-01-15 Core Sdi, Incorporated System and method for simulating computer network attacks
EP2462716B1 (en) * 2009-08-05 2019-10-09 Help/Systems, LLC System and method for extending automated penetration testing to develop an intelligent and cost efficient security strategy
US9207928B2 (en) 2011-01-17 2015-12-08 Bladelogic, Inc. Computer-readable medium, apparatus, and methods of automatic capability installation
US9384071B2 (en) 2011-03-31 2016-07-05 Solarflare Communications, Inc. Epoll optimisations
US10069674B2 (en) * 2013-12-12 2018-09-04 International Business Machines Corporation Monitoring file system operations between a client computer and a file server
US11120106B2 (en) * 2016-07-30 2021-09-14 Endgame, Inc. Hardware—assisted system and method for detecting and analyzing system calls made to an operating system kernel

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5600790A (en) * 1995-02-10 1997-02-04 Research In Motion Limited Method and system for loading and confirming correct operation of an application program in a target system
US6108715A (en) * 1994-12-13 2000-08-22 Microsoft Corporation Method and system for invoking remote procedure calls
US20030014669A1 (en) * 2001-07-10 2003-01-16 Caceres Maximiliano Gerardo Automated computer system security compromise
US20030149741A1 (en) * 2002-02-05 2003-08-07 Krooss Kevin William Methods for implementing remote operating system procedure calls

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US698445A (en) * 1901-04-26 1902-04-29 Valentin Charles Burel Apparatus for torrefying coffee.
WO1995027249A1 (en) * 1994-04-05 1995-10-12 Intel Corporation Method and appartus for monitoring and controlling programs in a network
US5892903A (en) * 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US5812529A (en) * 1996-11-12 1998-09-22 Lanquest Group Method and apparatus for network assessment
US6009456A (en) * 1997-07-30 1999-12-28 Lockheed Martin Corp. Information exchange by intelligent mobile agents in a network
US6202199B1 (en) * 1997-07-31 2001-03-13 Mutek Solutions, Ltd. System and method for remotely analyzing the execution of computer programs
US5961644A (en) * 1997-09-19 1999-10-05 International Business Machines Corporation Method and apparatus for testing the integrity of computer security alarm systems
US6249886B1 (en) * 1997-10-17 2001-06-19 Ramsesh S. Kalkunte Computer system and computer implemented process for performing user-defined tests of a client-server system with run time compilation of test results
US6070244A (en) * 1997-11-10 2000-05-30 The Chase Manhattan Bank Computer network security management system
US6081665A (en) * 1997-12-19 2000-06-27 Newmonics Inc. Method for efficient soft real-time execution of portable byte code computer programs
US6205551B1 (en) * 1998-01-29 2001-03-20 Lucent Technologies Inc. Computer security using virus probing
US6298445B1 (en) 1998-04-30 2001-10-02 Netect, Ltd. Computer security
US6408391B1 (en) * 1998-05-06 2002-06-18 Prc Inc. Dynamic system defense for information warfare
WO1999066383A2 (en) 1998-06-15 1999-12-23 Dmw Worldwide, Inc. Method and apparatus for assessing the security of a computer system
US6185689B1 (en) * 1998-06-24 2001-02-06 Richard S. Carson & Assoc., Inc. Method for network self security assessment
US6205122B1 (en) * 1998-07-21 2001-03-20 Mercury Interactive Corporation Automatic network topology analysis
US6286047B1 (en) * 1998-09-10 2001-09-04 Hewlett-Packard Company Method and system for automatic discovery of network services
US6301668B1 (en) * 1998-12-29 2001-10-09 Cisco Technology, Inc. Method and system for adaptive network security using network vulnerability assessment
US6205552B1 (en) * 1998-12-31 2001-03-20 Mci Worldcom, Inc. Method and apparatus for checking security vulnerability of networked devices
US6636898B1 (en) * 1999-01-29 2003-10-21 International Business Machines Corporation System and method for central management of connections in a virtual private network
JP2003514275A (en) 1999-11-03 2003-04-15 ビギランテ アクティーゼルスカブ Computer access security test method on data communication network
EP1107108A1 (en) * 1999-12-09 2001-06-13 Hewlett-Packard Company, A Delaware Corporation System and method for managing the configuration of hierarchically networked data processing devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6108715A (en) * 1994-12-13 2000-08-22 Microsoft Corporation Method and system for invoking remote procedure calls
US5600790A (en) * 1995-02-10 1997-02-04 Research In Motion Limited Method and system for loading and confirming correct operation of an application program in a target system
US20030014669A1 (en) * 2001-07-10 2003-01-16 Caceres Maximiliano Gerardo Automated computer system security compromise
US20030149741A1 (en) * 2002-02-05 2003-08-07 Krooss Kevin William Methods for implementing remote operating system procedure calls

Also Published As

Publication number Publication date
WO2004008294A2 (en) 2004-01-22
US7277937B2 (en) 2007-10-02
AU2003252049A8 (en) 2004-02-02
US20040128667A1 (en) 2004-07-01
AU2003252049A1 (en) 2004-02-02

Similar Documents

Publication Publication Date Title
WO2001082075A3 (en) System and method for scheduling execution of cross-platform computer processes
WO2001014961A3 (en) System and method for the establishment and utilization of networked idle computational processing power
WO2001091033A3 (en) Security architecture for integration of enterprise information system with j2ee platform
WO2001025919A3 (en) Architectures for netcentric computing systems
WO2004102438A3 (en) Business process management for a message-based exchange infrastructure
CN106445705A (en) Platform cascading method and system based on Rabbit MQ and Socket.io
WO2007023391A3 (en) System and method for providing a remote user interface for an application executing on a computing device
WO2004008294A3 (en) Distributed computing using syscall proxying
GB2398203A (en) Dynamic RDF groups
JP2007512617A5 (en)
WO2003102745A3 (en) Trusted client utilizing security kernel under secure execution mode
WO2000051031A8 (en) Proxy server augmenting a client request with user profile data
HK1100250A1 (en) Mobile access to lightweight directory access protocol (ldap) server
WO2001096977A3 (en) Network service system and method
CN102591726A (en) Multiprocess communication method
CN101729562A (en) Reliable data transmission method under unreliable network connection
KR100365910B1 (en) System for transmitting/receiving file
US20020129122A1 (en) Storage operating data control system
WO2003105419A3 (en) Managing a communication device via gprs and gsm connection
WO2004114143A3 (en) Cluster arrangement
JP2002358273A5 (en)
CN202798801U (en) Universal communication system for achieving distributed data interaction
WO2001079999A3 (en) Method and system for accepting precompiled information
US20050060529A1 (en) Remote reboot method and system for network-linked computer platform
CN110032455A (en) Efficient communication overlapping is carried out by runing time cooperation

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP