Binary-based system for detecting memory modifying attack and positioning bug
A binary and memory technology, applied in the direction of instrumentation, electrical digital data processing, platform integrity maintenance, etc., can solve problems such as low efficiency, inaccuracy, and complex implementation details, and achieve the effect of simple implementation and expanded attack detection range
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] The present invention is built on Valgrind and its plugin Flayer.
[0066] Such as figure 1 As shown, the binary-based memory tampering attack detection and vulnerability location method 10 of the present invention includes: a code conversion unit 20 , a basic block data dependency recording unit 21 , a code insertion unit 22 and a vulnerability location unit 23 .
[0067] The code conversion unit 20 is used to convert binary-level codes into Valgrind intermediate code form VEX, which is a reduced instruction set (RISC). There are 10 types of statements in the VEX instruction set. There are 12 kinds of expressions. Such as image 3 As shown, the VEX instruction set is divided into statements and expressions. The difference between a statement and an expression is: a statement modifies a register / memory / temporary variable, while an expression only uses the value of a register / memory / temporary variable. Data objects in the VEX instruction set are divided into four c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 