Search

David Kleidermacher Phones & Addresses

  • Palo Alto, CA
  • 199 Pasa Robles Ave, Los Altos, CA 94022
  • 6819 Shadowbrook Dr, Goleta, CA 93117
  • Santa Barbara, CA
  • Royal Palm Beach, FL
  • Hawi, HI
  • 1127 Camino Manadero, Santa Barbara, CA 93111

Publications

Amazon

Chapter 006, Emerging Applications

Chapter 006, Emerging Applications

View page

NOTE: This is a single chapter excerpted from the book Embedded Systems Security, made available for individual purchase. Additional chapters, as well as the entire book, may be purchased separately. The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Securi...

Author

David Kleidermacher

Binding

Kindle Edition

Pages

57

Publisher

Newnes

ISBN #

8

Chapter 005, Data Protection Protocols For Embedded Systems

Chapter 005, Data Protection Protocols for Embedded Systems

View page

NOTE: This is a single chapter excerpted from the book Embedded Systems Security, made available for individual purchase. Additional chapters, as well as the entire book, may be purchased separately. The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Securi...

Author

David Kleidermacher

Binding

Kindle Edition

Pages

84

Publisher

Newnes

ISBN #

7

Chapter 004, Embedded Cryptography

Chapter 004, Embedded Cryptography

View page

NOTE: This is a single chapter excerpted from the book Embedded Systems Security, made available for individual purchase. Additional chapters, as well as the entire book, may be purchased separately. The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Securi...

Author

David Kleidermacher

Binding

Kindle Edition

Publisher

Newnes

ISBN #

6

Chapter 002, Systems Software Considerations

Chapter 002, Systems Software Considerations

View page

NOTE: This is a single chapter excerpted from the book Embedded Systems Security, made available for individual purchase. Additional chapters, as well as the entire book, may be purchased separately. The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Securi...

Author

David Kleidermacher

Binding

Kindle Edition

Pages

93

Publisher

Newnes

ISBN #

5

Chapter 003, Secure Embedded Software Development

Chapter 003, Secure Embedded Software Development

View page

NOTE: This is a single chapter excerpted from the book Embedded Systems Security, made available for individual purchase. Additional chapters, as well as the entire book, may be purchased separately. The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Securi...

Author

David Kleidermacher

Binding

Kindle Edition

Pages

162

Publisher

Newnes

ISBN #

4

Chapter 001, Introduction To Embedded Systems Security

Chapter 001, Introduction to Embedded Systems Security

View page

NOTE: This is a single chapter excerpted from the book Embedded Systems Security, made available for individual purchase. Additional chapters, as well as the entire book, may be purchased separately. The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Securi...

Author

David Kleidermacher

Binding

Kindle Edition

Pages

37

Publisher

Newnes

ISBN #

3

Embedded Systems Security: Practical Methods For Safe And Secure Software And Systems Development

Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development

View page

The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software A study of the system archit...

Author

David Kleidermacher, Mike Kleidermacher

Binding

Paperback

Pages

416

Publisher

Newnes

ISBN #

0123868866

EAN Code

9780123868862

ISBN #

1

Embedded Systems Security: Practical Methods For Safe And Secure Software And Systems Development Paperback March 30, 2012

Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development Paperback March 30, 2012

View page
Author

David Kleidermacher

Binding

Paperback

Publisher

newnes; 1 edition (march 30, 2012)

ISBN #

11

Us Patents

Post-Compile Instrumentation Of Object Code For Generating Execution Trace Data

View page
US Patent:
8266608, Sep 11, 2012
Filed:
Aug 10, 2006
Appl. No.:
11/463854
Inventors:
Daniel Michael Hecht - Los Altos CA, US
Michael Lindahl - Santa Barbara CA, US
David Kleidermacher - Goleta CA, US
Assignee:
Green Hills Software, Inc. - Santa Barbara CA
International Classification:
G06F 9/44
G06F 9/45
G06F 11/00
US Classification:
717158, 717128, 717130, 717135, 717140, 717151, 714 35
Abstract:
The invention is directed to instrumenting object code of an application and/or an operating system on a target machine so that execution trace data can be generated, collected, and subsequently analyzed for various purposes, such as debugging and performance. Automatic instrumentation may be performed on an application's object code before, during or after linking. A target machine's operating system's object code can be manually or automatically instrumented. By identifying address space switches and thread switches in the operating system's object code, instrumented code can be inserted at locations that enable the execution trace data to be generated. The instrumentation of the operating system and application can enable visibility of total system behavior by enabling generation of trace information sufficient to reconstruct address space switches and context switches.

Post-Compile Instrumentation Of Object Code For Generating Execution Trace Data

View page
US Patent:
20060190930, Aug 24, 2006
Filed:
Feb 18, 2005
Appl. No.:
11/061086
Inventors:
Daniel Hecht - Santa Barbara CA, US
Michael Lindahl - Santa Barbara CA, US
David Kleidermacher - Goleta CA, US
Gregory Davis - Santa Barbara CA, US
Neil Puthuff - Ladera Ranch CA, US
International Classification:
G06F 9/44
US Classification:
717128000
Abstract:
The invention is directed to instrumenting object code of an application and/or an operating system on a target machine so that execution trace data can be generated, collected, and subsequently analyzed for various purposes, such as debugging and performance. Automatic instrumentation may be performed on an application's object code before, during or after linking. A target machine's operating system's object code can be manually or automatically instrumented. By identifying address space switches and thread switches in the operating system's object code, instrumented code can be inserted at locations that enable the execution trace data to be generated. The instrumentation of the operating system and application can enable visibility of total system behavior by enabling generation of trace information sufficient to reconstruct address space switches and context switches.

Transactional File System With Client Partitioning

View page
US Patent:
20060277221, Dec 7, 2006
Filed:
Jun 1, 2005
Appl. No.:
11/142582
Inventors:
Tom Zavisca - Santa Barbara CA, US
David Kleidermacher - Goleta CA, US
Assignee:
Green Hills Software, Inc. - Santa Barbara CA
International Classification:
G06F 17/30
US Classification:
707201000
Abstract:
A file system provides access to data on a storage device so that, for a given volume on the device, read-only client partitions and a read-write client partition are presented with separate but related views of the file system state. Moreover, the read-only partitions do not interfere with each other and do not interfere with the read-write partition, while the read-write partition may delay the read-only partitions. Access to file system blocks is provided by way of separate virtualization trees for the read-only partitions and for the read-write partition. A reader tree represents a consistent (but older) file system state. A writer tree, which has a different root pointer from the reader tree and is partially stored in main memory, represents the state of in-progress file system transactions. When a set of file system transactions is committed, the writer tree root pointer is copied to the reader tree root pointer.

Post-Compile Instrumentation Of Object Code For Generating Execution Trace Data

View page
US Patent:
20120317551, Dec 13, 2012
Filed:
Aug 20, 2012
Appl. No.:
13/590035
Inventors:
Daniel Michael Hecht - Los Altos CA, US
Michael Lindahl - Santa Barbara CA, US
David Kleidermacher - Goleta CA, US
Assignee:
GREEN HILLS SOFTWARE, INC. - Santa Barbara CA
International Classification:
G06F 9/44
US Classification:
717128
Abstract:
The invention is directed to instrumenting object code of an application and/or an operating system on a target machine so that execution trace data can be generated, collected, and subsequently analyzed for various purposes, such as debugging and performance. Automatic instrumentation may be performed on an application's object code before, during or after linking. A target machine's operating system's object code can be manually or automatically instrumented. By identifying address space switches and thread switches in the operating system's object code, instrumented code can be inserted at locations that enable the execution trace data to be generated. The instrumentation of the operating system and application can enable visibility of total system behavior by enabling generation of trace information sufficient to reconstruct address space switches and context switches.

Method And Apparatus For Optimizing Time And Testing Of Higher Level Language Program

View page
US Patent:
58599630, Jan 12, 1999
Filed:
Oct 18, 1995
Appl. No.:
8/544917
Inventors:
Daniel D. O'Dowd - Santa Barbara CA
David N. Kleidermacher - Santa Barbara CA
Assignee:
Green Hills Software, Inc. - Santa Barbara CA
International Classification:
G06F 1100
US Classification:
39518314
Abstract:
A method for time use analysis of a higher level language program is performed by displaying source code lines in descending order according to the amount of time spent by the program to execute machine code into which the source code lines have been compiled. Source code lines are displayed arranged in order according to the percentages of the amounts of time spent in execution during runs of the program, and the higher percentages identified for optimizing actions. A digital processing apparatus for performing the analysis includes a display for showing the source code lines that require the most time of execution, a selection apparatus for selecting those source code lines having the greater opportunity for significant corrective action, and displaying the various selected source code lines in the order in which the lines are kept in the program along with the corresponding time spent by the program to execute machine code into which the source code lines have been compiled. An improved method and apparatus identifies source code lines which a testing program does not test in its test procedure. A digital processing apparatus displays in different orders those source code lines identified as not having been used.

Out-Of-Band Spy Detection And Prevention For Portable Wireless Systems

View page
US Patent:
20150363613, Dec 17, 2015
Filed:
Jun 16, 2014
Appl. No.:
14/305829
Inventors:
- Santa Barbara CA, US
David Kleidermacher - Santa Barbara CA, US
Thomas Cantrell - Oxnard CA, US
Dennis Kou - Goleta CA, US
Daniel Hettena - Princeton NJ, US
International Classification:
G06F 21/82
G06F 21/55
G06F 21/53
Abstract:
Certain embodiments employ an “out-of-band” mechanism to remove the physical controls for activating input peripherals from a portable device operating system and instead controlled by a separate peripheral control domain, isolated from the operating system domain by a machine virtualization/isolation technology. No additional hardware may be required. An adjunct I/O virtualization mechanism may also be included to abstract the guarded input peripheral interfaces, such that all attempts to turn them on from within the operating system are automatically redirected by the I/O virtualization mechanism to the peripheral control domain. The peripheral control domain may then conduct a policy-driven decision process to either allow, disallow, or request manual/explicit authorization of an access attempts. Physical access may be performed within the peripheral control domain. Because the access control and physical activation of input peripherals occur out-of-band from the operating system, these security-critical operations may be immune to vulnerabilities in the portable operating system.

Hybrid Mobile Device And Radio System

View page
US Patent:
20150365233, Dec 17, 2015
Filed:
Jun 16, 2014
Appl. No.:
14/305725
Inventors:
- Santa Barbara CA, US
David Noah Kleidermacher - Santa Barbara CA, US
International Classification:
H04L 9/14
H04W 12/08
Abstract:
Certain embodiments disclose an integrated dual-device architecture for marrying modern computing devices (e.g. laptops, smartphones and tablets) with standalone tactical radios (e.g. military or first-responder push-to-talk radios) with the goal of leveraging modern mobile devices for improved interfaces and usability (compared to a tactical radio) while reducing the footprint (size, weight, battery power/capacity, and cost) of the tactical radio. Certain embodiments encompass offloading various traditional radio workloads (e.g. voice processing, control/management processing, and cryptographic processing) from the radio onto the mobile device, dramatically simplifying the tactical radio design and cost (e.g. making the radio a “dumb” transceiver only), and physically conjoining the mobile device with the reduced tactical radio into a single, conveniently operated and transported system.

System And Method For Out-Of-Band Exploitation Of Portable Wireless Systems

View page
US Patent:
20150365432, Dec 17, 2015
Filed:
Jun 16, 2014
Appl. No.:
14/305913
Inventors:
- Santa Barbara CA, US
David Kleidermacher - Santa Barbara CA, US
Thomas Cantrell - Oxnard CA, US
Dennis Kou - Goleta CA, US
Daniel Hettena - Princeton NJ, US
International Classification:
H04L 29/06
G06F 9/455
G06F 13/10
Abstract:
In certain embodiments, virtualization mechanisms used to defend against spying can also be used by attackers as a means to execute spying attacks more effectively. In certain embodiments, attack methods may use the virtualization mechanisms to surreptitiously activate input peripherals without the user's knowledge or authorization. In certain embodiments, a virtualized network interface may be employed in which all network traffic transiting a portable wireless system is routed through a remote control component within a peripheral control domain. The remote control component may be used by an attacker to communicate remotely with the portable device to send it peripheral activation commands. The remote control component can then activate peripherals via the peripheral access module without the user's or general-purpose operating system's knowledge or authorization. All other network traffic may be passed through as normal and expected to the general-purpose operating system.
David Noah Kleidermacher from Palo Alto, CA, age ~56 Get Report