This process is experimental and the keywords may be updated as the learning algorithm improves. These keywords were added by machine and not by the authors. Patent US7870399B2 - Software trusted platform module and application security wrapper (US 7870399 B2) Owner: Microsemi Corp. By applying this security wrapper technology, one COTS software component to be wrapped can be replaced by another without significantly modifying the wrapper the wrapper can work with a variety of operating systems and data can be encrypted and stored temporarily or permanently. The technology focuses on interchangeability for COTS software components, portability for the wrapper, and security for communications between applications via the wrapper. This paper describes a security wrapper technology that we have implemented for selected (COTS) software products. The goal was to test our theory that security wrappers for COTS products are feasible. Our initial attempts to accomplish secure data storage and transfer have been directed toward building data encryption tools that interact with various COTS products. Alternatively, they can be used for visual reasons, as is the case with HTML or CSS wrappers. They are often used for ensuring compatibility or interoperability between different software structures. Several different wrapper functions can be distinguished. One of the interesting questions that has arisen is “Can you build secure applications using insecure components?” We have been investigating ways to protect data that is shared between two or more independent, insecure applications. In a software context, the term wrapper refers to programs or codes that literally wrap around other program components. I also discovered an additional vulnerability ( CVE-2021-26274 ) in the NinjaRMM Agent, not nearly as interesting, but a vulnerability, nonetheless. That wrapper code's main function will be to. The use of Commercial Off-The-Shelf (COTS) software products as components of large-scale systems has become more and more pervasive. I have spent additional time identifying and contacting other software vendors using MSI Wrapper to ensure they have awareness and mitigated the vulnerability in their newest deployments. Next, write some wrapper code that you'll interpose between your own software and the thirdparty code.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |