A Dynamic Discovery Method of Memory Variable Distribution
A discovery method and memory technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of low coverage, low degree of automation, complex analysis methods, etc., and achieve the effect of high degree of automation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] First, we analyze an example to illustrate the memory variable distribution identification.
[0016] Example 1: We have the following binary code, we analyze it.
[0017]
[0018] Through the analysis, it can be seen that the program will exit because sizein is greater than 0x100, but when sizein is equal to 0x100, b[0x100] in the loop will get user input. figure 2 To give an example of the distribution of the corresponding code in Microsoft Visual Studio 2005 runtime memory in 1, and the actual space of b is from b[0] to b[0x99], at this time, the buffer overflows, if the adjacent memory is an important field, For example, size, and then the 13th line in the example 1 below, according to the size to apply for memory again, you can allocate a buffer of any size, and malicious users can implant code, which brings great security threats to users.
[0019] Therefore, if figure 1 A method for dynamically discovering memory distribution for vulnerability detection is s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


