会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Mitigation of function pointer overwrite attacks
    • 减轻功能指针覆盖攻击
    • US09165138B2
    • 2015-10-20
    • US13546905
    • 2012-07-11
    • Mlkhail Davidov
    • Mlkhail Davidov
    • G06F21/00G06F21/54
    • G06F21/54
    • Methods are disclosed for improving security of computer software and preventing potential attackers from gaining control of computer software via function pointer overwrite attacks. One or more additional layers of complexity may be imposed that would have to be circumvented in order to gain execution control over portions of software. One or more function pointers can be encoded using a value that may be generated on program initialization and decoded before any dynamic function call occurs. In the event of memory corruption that affects an encoded function pointer, the value will cause the destination of the function pointer to decode to an invalid and random address and will induce an error. An application may be prevented from calling an attacker corrupted function pointer by introducing various checks around the call point at compile time that check the validity of the destination to which the function pointer points.
    • 公开了用于提高计算机软件的安全性并防止潜在攻击者通过功能指针覆盖攻击来获得对计算机软件的控制的方法。 可以施加一个或多个附加的复杂层,这些层必须被绕过以获得对软件的一部分的执行控制。 可以使用可以在程序初始化时生成的值来编码一个或多个函数指针,并且在任何动态函数调用发生之前进行解码。 在影响编码函数指针的内存损坏的情况下,该值将导致函数指针的目的地解码为无效和随机的地址,并将引发错误。 可以通过在编译时通过在调用点周围引入各种检查来检查应用程序来调用攻击者损坏的函数指针,从而检查函数指针指向的目的地的有效性。
    • 5. 发明申请
    • Mitigation of function pointer overwrite attacks
    • 减轻功能指针覆盖攻击
    • US20140020092A1
    • 2014-01-16
    • US13546905
    • 2012-07-11
    • MIkhail Davidov
    • MIkhail Davidov
    • G06F21/22
    • G06F21/54
    • Methods are disclosed for improving security of computer software and preventing potential attackers from gaining control of computer software via function pointer overwrite attacks. One or more additional layers of complexity may be imposed that would have to be circumvented in order to gain execution control over portions of software. One or more function pointers can be encoded using a value that may be generated on program initialization and decoded before any dynamic function call occurs. In the event of memory corruption that affects an encoded function pointer, the value will cause the destination of the function pointer to decode to an invalid and random address and will induce an error. An application may be prevented from calling an attacker corrupted function pointer by introducing various checks around the call point at compile time that check the validity of the destination to which the function pointer points.
    • 公开了用于提高计算机软件的安全性并防止潜在攻击者通过功能指针覆盖攻击来获得对计算机软件的控制的方法。 可以施加一个或多个附加的复杂层,这些层必须被绕过以获得对软件的一部分的执行控制。 可以使用可以在程序初始化时生成的值来编码一个或多个函数指针,并且在任何动态函数调用发生之前进行解码。 在影响编码函数指针的内存损坏的情况下,该值将导致函数指针的目的地解码为无效和随机的地址,并将引发错误。 可以通过在编译时通过在调用点周围引入各种检查来检查应用程序来调用攻击者损坏的函数指针,从而检查函数指针指向的目的地的有效性。