Check patentability & draft patents in minutes with Patsnap Eureka AI!

Code pointer authentication for hardware flow control

A flow control and code technology, which is applied in the fields of instrumentation, computing, electrical and digital data processing, etc., and can solve problems such as difficulty in utilization.

Active Publication Date: 2017-05-31
QUALCOMM INC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This approach makes exploitation difficult as the attacker needs to predict where the code / data / pointers they need to target / manipulate for a successful attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code pointer authentication for hardware flow control
  • Code pointer authentication for hardware flow control
  • Code pointer authentication for hardware flow control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021]Techniques are provided for implementing code pointer verification in hardware to prevent malicious or maliciously written decoding from modifying code pointers in software code to be executed by a processor of a computer system. The techniques disclosed herein can be used to tag code pointers in software code. The flag may be used to verify the code pointer as a valid pointer to executable code before the processor executes a jump or branch instruction to an address associated with the code pointer. If verification of a marked code pointer fails, the processor may be configured to execute an error handling routine that may be used to stop execution of the program code, thus preventing execution of any malicious code that may be pointed to by a code pointer that has been modified or corrupted .

[0022] Code pointers may be marked in a manner that makes it difficult for an attacker to forge a valid mark. Verification tokens can be created that represent the only locati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Techniques for enforcing flow control of a software program in a processor are provided. An example method according to these techniques includes analyzing program code of the software program to identify a code pointer in the program code, generating an authentication tag based on the code pointer, and modifying the code pointer in the program code with the authentication tag to generate a tagged code pointer.

Description

Background technique [0001] Software implementation errors, such as missing or incorrect input validation, can lead to out-of-bounds buffer accesses and memory corruption. These implementation errors can cause the software to become unstable or eventually fail under normal conditions. However, when the input is manipulated by a malicious party intent on attacking the computer system, the attacker can exploit these memory corruption and overflow errors to alter the expected behavior of the software code and execute code or functionality determined by the attacker. [0002] Attackers typically gain control of execution by overwriting data structures in memory such as return addresses, function pointers, or virtual table pointers. It is not always possible to find and fix all exploitable memory corruption bugs in large and legacy code bases. Accordingly, many computer systems contain a general defense feature known as an "exploitation mitigation mechanism" that is effective aga...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52
CPCG06F21/52G06F21/554G06F21/56
Inventor 詹·阿恰尔阿尔温德·克里希纳斯瓦米罗伯特·图尔纳
Owner QUALCOMM INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More