Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Control flow hiding method for remote computing

A remote computing and control flow technology, applied in the computer field, can solve problems such as high overhead, reduce operating overhead, avoid cross-cloud or cross-host function calls, and achieve real hidden effects

Active Publication Date: 2017-06-13
XIDIAN UNIV
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has high overhead due to cross-cloud function calls

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control flow hiding method for remote computing
  • Control flow hiding method for remote computing
  • Control flow hiding method for remote computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further described below by means of the accompanying drawings and examples.

[0048] Step 1, obtain the user program, and convert the user program into a three-address code program;

[0049] Described three address code program comprises 1 statement, wherein any one statement is s i , i=1, 2, ... I, I are natural numbers greater than or equal to 1, statement s i by J branch statements x j and M non-branching statements y m Composition, j=1,2,...J, m=1,2,...M, Jj It is: if (a OP b) goto L; a, b are branch statements x j variable, OP is a comparison operation, which is one of the six operations (>, =, i |i=1,2,...I};

[0050] branch statement x j The unique number is l j ; non-branch statement y m The number is l j ;

[0051] The statement s in this embodiment i Refers to: any statement in the program, such as figure 2 int size; int low=0 in (a).

[0052] The branch statement x in this embodiment j Refers to: the selection state...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a control flow hiding method for remote computing. The method includes the following steps that original programs are divided into the open programs, the confidence programs and condition list group set files, the SGX function of the safe execution environment of a sixth-generation Intel processor is used for performing program branching statement condition judging in a confidence region with the hardware protection function, and therefore real hiding of program branching statement conditions is achieved.

Description

technical field [0001] The invention belongs to the technical field of computer technology and relates to a method for program control flow hiding. Background technique [0002] At present, public cloud services are widely used. Users can upload programs to the public cloud, and the public cloud will complete the calculation. However, due to the opacity of the public cloud, the security of program operation is difficult to be guaranteed. Algorithmic confidentiality of outsourced programs is an important issue in cloud security. When the user uploads the program to the public cloud, the attacker can reverse-analyze the source code of the program through static analysis and dynamic analysis, thereby restoring the program algorithm. If the user program is innovative, this attack will violate the user's program copyright. Even if the user program is not innovative, the reverse analysis program will leak the program logic, and the hacker will use the leaked program logic to fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14G06F9/44H04L29/06
CPCG06F8/22G06F21/14H04L63/0435
Inventor 王永智
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products