Dynamic stack memory management method

A memory management and stack technology, applied in the direction of platform integrity maintenance, can solve problems such as buffer overflow attacks, and achieve the effect of preventing stack buffer overflow

Pending Publication Date: 2016-04-06
XIAN HUIZE INTPROP OPERATIONS MANAGEMENT CO LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If when the function returns, the value of this is found to be changed, it proves that someone may be trying to perform a buffer overflow attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic stack memory management method
  • Dynamic stack memory management method
  • Dynamic stack memory management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to further illustrate the present invention, further describe below in conjunction with accompanying drawing:

[0016] The above is the basic principle of the present invention, which can be implemented in multiple ways. For example, special memory devices (including software devices and hardware devices) can be used to implement. It can also be implemented using special computer systems. It is also possible to rewrite the compiler to generate an object program with the above functions. In short, various implementations within the spirit of the principles should be included. An example is given below to specifically illustrate the execution process of the program using this method.

[0017] Ⅰ. Execution process of normal program:

[0018] we take figure 2 As an example to illustrate the normal program execution flow. We use the example of the function foo being called by the function bar to illustrate. Assume that the stack frame grows from high address...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic stack memory management method. The method is characterized in that when a computer program is executed, a sub-process is called each time and a stack space of a current process is allocated, a calling parameter is stored like a normal condition and an address is returned; but when a frame pointer is stored and a local variable is allocated, an extra memory space is allocated between the frame pointer and a starting address of the local variable or an extra memory space is allocated between a return address and the frame pointer, and the size of the extra space is randomly determined when the program is executed, so that the relative position of the return address and the local variable in a stack memory cannot be obtained by analyzing a source program or a compiled target program. According to the method, whether a currently executed program is being attacked or not can be detected and the program can be prevented from being attacked, so that an attacker is effectively prevented from using stack buffer overflow to perform attack.

Description

technical field [0001] The invention relates to a dynamic stack memory management method. Background technique [0002] A buffer is a place where data is stored in computer memory when a program is running. When a program tries to write a piece of data into a certain memory buffer, if the length of the data exceeds the length of the buffer, a buffer overflow occurs. An attacker can exploit this weakness to attack the computer. The attacker writes a string that exceeds the length of the buffer into the buffer. Because the super-long character string written covers the adjacent storage unit, it often leads to two kinds of results. One is to cause the program to fail to run, which can lead to a serious system crash; the other is to use this vulnerability to execute malicious instructions. If the program being attacked is executed with superuser privileges, the attacker can also gain system superuser privileges. The result is that an anonymous Internet attacker often has th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/52
Inventor 何阳米奇
Owner XIAN HUIZE INTPROP OPERATIONS MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products