The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 25, 2017

Filed:

Jun. 16, 2014
Applicant:

Green Hills Software, Inc., Santa Barbara, CA (US);

Inventors:

Daniel O'Dowd, Santa Barbara, CA (US);

David Kleidermacher, Santa Barbara, CA (US);

Thomas Cantrell, Oxnard, CA (US);

Dennis Kou, Goleta, CA (US);

Daniel Hettena, Princeton, NJ (US);

Assignee:

Green Hills Software, Inc., Santa Barbara, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 13/10 (2006.01); G06F 9/455 (2006.01); G06F 21/53 (2013.01);
U.S. Cl.
CPC ...
H04L 63/1466 (2013.01); G06F 9/45558 (2013.01); G06F 13/10 (2013.01); G06F 21/53 (2013.01); H04L 63/10 (2013.01); G06F 2009/45587 (2013.01);
Abstract

In certain embodiments, virtualization mechanisms used to defend against spying can also be used by attackers as a means to execute spying attacks more effectively. In certain embodiments, attack methods may use the virtualization mechanisms to surreptitiously activate input peripherals without the user's knowledge or authorization. In certain embodiments, a virtualized network interface may be employed in which all network traffic transiting a portable wireless system is routed through a remote control component within a peripheral control domain. The remote control component may be used by an attacker to communicate remotely with the portable device to send it peripheral activation commands. The remote control component can then activate peripherals via the peripheral access module without the user's or general-purpose operating system's knowledge or authorization. All other network traffic may be passed through as normal and expected to the general-purpose operating system.


Find Patent Forward Citations

Loading…