会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Systems and methods for preventing heap-spray attacks
    • 防止堆喷射攻击的系统和方法
    • US08788785B1
    • 2014-07-22
    • US13006705
    • 2011-01-14
    • Uri Mann
    • Uri Mann
    • G06F12/00
    • G06F21/52
    • A computer-implemented method for preventing heap-spray attacks may include identifying an object-oriented program. The computer-implemented method may also include identifying, within the object-oriented program, a request to allocate memory for a polymorphic object. The polymorphic object may include a pointer to a virtual method table that supports dynamic dispatch for at least one method of the polymorphic object. The computer-implemented method may further include identifying an area of memory reserved for polymorphic objects. The computer-implemented method may additionally include allocating memory for the polymorphic object from the reserved area of memory. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于防止堆喷射攻击的计算机实现的方法可以包括识别面向对象的程序。 计算机实现的方法还可以包括在面向对象的程序内识别为多态对象分配存储器的请求。 多态对象可以包括指向虚拟方法表的指针,该指针支持多态对象的至少一个方法的动态分派。 计算机实现的方法还可以包括识别保留用于多态对象的存储器的区域。 计算机实现的方法可以另外包括从存储器的保留区域分配用于多态对象的存储器。 还公开了各种其它方法,系统和计算机可读介质。
    • 2. 发明授权
    • Fake exception handler detection
    • 假异常处理程序检测
    • US08707433B1
    • 2014-04-22
    • US13100001
    • 2011-05-03
    • Uri Mann
    • Uri Mann
    • G06F11/00
    • G06F11/3003G06F11/3093G06F21/54G06F2201/865
    • Fake exception handlers resulting from malicious stack buffer overflows that overwrite an exception handling record on the stack are detected. The operating system exception processing logic is monitored. Responsive to an exception occurring, an exception handler to be called by the monitored operating system exception processing logic is identified. A specific number of the first bytes of the identified exception handler are scanned to determine whether a return instruction is present therein. Instructions of the identified exception handler that are positioned prior to the return instruction are analyzed to determine whether they modify the value of the stack pointer so as to shrink the stack. The identified exception handler is adjudicated as being fake, responsive to determining that a return instruction is present in the first specific number of bytes of the exception handler and/or that the instructions positioned prior to the return instruction shrink the stack.
    • 检测到由覆盖堆栈上的异常处理记录的恶意堆栈缓冲区溢出导致的异常处理程序。 监视操作系统异常处理逻辑。 响应于异常发生,被监视的操作系统异常处理逻辑调用的异常处理程序被识别。 扫描识别的异常处理程序的特定数量的第一个字节以确定是否存在返回指令。 分析位于返回指令之前的识别的异常处理程序的指令,以确定它们是否修改堆栈指针的值以缩小堆栈。 识别的异常处理程序被判定为假的,响应于确定在异常处理程序的第一特定数量的字节中存在返回指令和/或位于返回指令之前的指令收缩堆栈。