Stack overflow attack defense method
A stack overflow and function technology, which is applied in the field of computer system security, can solve the problems of stack return address integrity damage and stack overflow protection method failure.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The present invention will be described in more detail below through specific embodiments in conjunction with the drawings.
[0031] This embodiment provides a stack overflow attack defense method according to the present invention.
[0032] This embodiment implements a function-level stack overflow protection mechanism, and overcomes the defect that the protection method in the prior art may be bypassed by an attacker when the memory content of the program leaks. The implementation and action process of the protection are as follows figure 1 As shown, first locate the function of the potential stack overflow attack in the program as the protection object, and then insert a replacement table into the memory space of the program during the compilation process, and add the encryption return address operation to the target code prefix of the protection object function. The operation to verify the integrity of the return address is added to the suffix.
[0033] In order to reduce...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com