All malicious code operations do not go beyond engaging file or other system resources. The translator should generate a Secure Engaged System Resources (SESR, pronounced Say-Zar)
report. The details of this report and how it should be generated by a translator will be provided later. We will also explain how malicious engagement of system resources can be
distinguished. The report would state all reading, writing, creation and updates related to system resource engagements. A software interface (like APSCCS)
should encrypt this report to produce a SESR signature and security key. These pieces of data would be unique to each report. The report should also include features that can protect it from piracy.
Therefore, safe code begins with including a SESR report. We will later elaborate on how this condition can be established.
The creation of a SESR report can be seemlesly coherent with default operations of a code translator. This goal can be achieved in two stages that culminate in a report. The first
stage involves saving data related to a normal translation process. This stage reflects the primary goal of a translator to generate instructions. The saved elements would be separated
as system calls, memory locations (or references) and devices. The translator would retrieve such data specific to an operating system and CPU. These three elements would be retireved
at the instance they can be correctly identified. The translator may also create a header that contains information specific to a programming language (such as entry points and function
access levels). The three elements would be linked to this header. This saved information provides raw material for the next stage. The software that hosts a code translator should cater
to stage two.
|