Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and apparatus for preventing overflow attack of buffer area

A buffer overflow and base address technology, applied in the field of network security, can solve problems such as the difficulty of effectively defending against buffer overflow attacks, and achieve the effect of preventing malicious attacks and improving security

Inactive Publication Date: 2008-12-03
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Before checking the return address of the function, there is a case where the return address or page attributes are maliciously modified. This malicious modification can effectively bypass the above scheme and still achieve the purpose of malicious attacks. It is difficult to effectively prevent buffer overflow through the above-mentioned related technologies. attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for preventing overflow attack of buffer area
  • Method and apparatus for preventing overflow attack of buffer area
  • Method and apparatus for preventing overflow attack of buffer area

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] Buffer overflow refers to when the number of data bits filled by a computer program into the buffer exceeds the capacity of the buffer itself, and the overflowed data is overwritten on the legitimate data. Ideally, the program checks the data length and does not allow input of a string that exceeds the length of the buffer. But most programs will assume that the data length always matches the allocated storage space, which brings the possibility of buff...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and a device for defending buffer overflow attack, and an environment block establishing device. The method for defending the buffer overflow attack comprises the steps that when a new process or thread is created, a base address of the environment block of the process or the thread is obtained; the base address of the environment block of the process or the thread is randomized. The embodiment of the invention causes the data of the environment block of the process or the thread to be changed by randomizing the pointer of the base address of the process or the thread, therefore, jump address thereof is changed into invalid data so as to achieve the aim of preventing hostile attack when the process or the thread can not carry out jump, thus improving the safety of the system further.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and device for defending against buffer overflow attacks. Background technique [0002] The increasing access to the Internet has brought opportunities for remote attacks of malicious codes, and the attacks in the network are also increasing exponentially. Attacks based on buffer overflows have become one of the most common and most threatening attack methods in network attacks. Buffer overflow refers to the overflow caused by the number of data bits input by a computer program in the buffer beyond the boundary of the buffer. Buffer overflow attacks include various types, including: heap-based overflow attacks, stack-based overflow attacks, etc. Because the overflowed data may overwrite the legal data in the adjacent memory of the buffer, destroying data integrity, the overflowed data may also overwrite the function pointer or the function return address in the stack, d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/55
Inventor 白皓文崔巍
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More