Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method capable of redefining command code of processor

A processor instruction and instruction encoding technology, applied in the direction of platform integrity maintenance, etc., can solve the problem of not being able to distinguish between legal instruction flow and illegal instruction flow, and achieve the effect of preventing buffer overflow attacks

Active Publication Date: 2014-05-28
张鹏
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to overcome the deficiency that existing processors cannot distinguish legal instruction streams from illegal instruction streams, the present invention provides a method for redefining instruction encoding, which can isolate legal instruction streams from illegal instruction streams

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0012] Set the same number of instruction encoding registers as the number of instructions in the system instruction set inside the processor, each instruction encoding register corresponds to an instruction encoding definition, and then all the instruction encoding definitions are defined by the user, and then the user-defined Each instruction encoding definition of the instruction is loaded into the corresponding instruction encoding register respectively, and the instruction encoding definition defined by the user is replaced by the instruction encoding definition defined in advance by the processor, so that the processor uses the user-defined instruction when decoding and executing the instruction. Encoding defines decoding and executing instructions. In this way, the processor runs on the user-defined machine language (instruction encoding); then, the original machine instructions of the computer program are translated into user-defined coded machine instructions, and the ...

Embodiment 2

[0015] Set the same number of instruction code registers as the number of operation codes, address codes, function codes, register codes, and condition codes in the system instruction set inside the processor. Each instruction code register corresponds to an instruction code definition, and then all user-defined Instruction encoding definition, and then the user-defined instruction encoding definitions are loaded into the corresponding instruction encoding registers by the load instruction encoding instruction, and the instruction encoding definition defined by the user-defined instruction replaces the instruction encoding definition defined in advance by the processor, so that the processing When the device decodes and executes instructions, it uses user-defined instruction encoding to define decoding and execution instructions. In this way, the processor runs on the user-defined machine language (instruction encoding); then, the original machine instructions of the computer p...

Embodiment 3

[0018] The operation of instructions inside the processor is interpreted and executed by microinstructions. Several microinstructions constitute a microprogram. When a microprogram corresponds to an instruction code, the user defines all the instruction codes, and then rewrites all the microprograms to use It interprets and executes the user-defined instruction encoding definition, and then updates all rewritten microprograms to replace the processor's pre-defined instruction encoding definition with the user-defined instruction encoding definition. When the processor decodes and executes instructions, it uses user-defined instruction encoding to define decoding and execution instructions. In this way, the processor runs on the user-defined machine language (instruction encoding); then, the original machine instructions of the computer program are translated into user-defined coded machine instructions, and the program translated into user-defined coded machine instructions is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method capable of redefining a command code of a processor. The method comprises the following step of: replacing a command code definition predefined by the processor with a user-defined command code definition to ensure that the processor decodes and executes a command by utilizing the user-defined command code definition when decoding and executing the command. According to the method disclosed by the invention, since the command code definition predefined by the processor is replaced with the user-defined command code definition and user-defined command codes can be combined in many ways, an external command code stream can not execute commonly because an external command code is inconsistent with a command code executed by the processor when a program segment is modified by a malicious code, therefore, overflow attacks and virus and Trojan horse attacks of a buffering region are effectively prevented.

Description

technical field [0001] The invention relates to a method for redefining instruction encoding of a processor. Background technique [0002] At present, the known way for processors to execute instructions is: the processor fetches instructions from the memory address pointed to by the PC (instruction address register), decodes, executes, accesses memory, writes back, and updates the PC (set the address of the next instruction) , and then take out the next instruction, and execute it one by one. The instruction encoding used in decoding and execution is predefined for the processor. If the program segment is modified by a buffer overflow attack or other attacks during execution, the program will perform unpredictable functions, such as malicious programs such as viruses or Trojan horses. Existing processors cannot identify maliciously modified program segments, and thus cannot prevent buffer overflow attacks, virus attacks, and Trojan horse attacks. Contents of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/54
Inventor 张鹏
Owner 张鹏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products