Unlock instant, AI-driven research and patent intelligence for your innovation.

Stack protection method and device

A stack protection area and stack technology, applied in the field of communication, can solve problems such as low probability of finding problems, inability to protect the stack when the stack is attacked, and limited range of detection problems, and achieve the effect of preventing device restarts

Active Publication Date: 2020-08-18
MAIPU COMM TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because it is based on static detection, the probability of finding problems is low, and the scope of detection problems is limited
Moreover, this mechanism can only detect stack overflows, and cannot protect against stack attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stack protection method and device
  • Stack protection method and device
  • Stack protection method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0027] Please refer to figure 1 , figure 1 It is one of the flow charts of the steps of the stack protection method provided by the first embodiment of the present invention. The method is applied to network equipment. The specific flow of the stack protection method will be described in detail below.

[0028] Step S140, execute the user thread function corresponding to the thread, and obtain the data information generated during the execution of the user thread function.

[0029] Step S150, dynamically write the data information into the user thread stack area in the stack corresponding to the thread.

[0030] In this embodiment, the stack includes the user thread stack area and a stack protection area for limiting the overflow range of the stack and the damage impact range after the stack is attacked.

[0031] Please refer to figure 2 , figure 2 It is the second flowchart of the steps of the stack protection method provided by the first embodiment of the present inve...

no. 2 example

[0067] Please refer to Figure 7 , Figure 7 A functional block diagram of the stack protection device 200 provided by the second embodiment of the present invention. The device is applied to network equipment. The stack protection device 200 includes: a data processing module 230 .

[0068] The data processing module 230 is configured to execute the user thread function corresponding to the thread, and obtain data information generated during the execution of the user thread function.

[0069] The data processing module 230 is further configured to dynamically write the data information into a user thread stack area in a stack corresponding to a thread, wherein the stack includes a stack protection area and the user thread stack area.

[0070] In this embodiment, the data processing module 230 is used to execute figure 1 In step S140 and step S150, the specific description about the data processing module 230 can refer to figure 1 The description of step S140 and step S1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a stack protection method and apparatus. The method is applied to a network device. The method comprises the steps of executing a user thread function corresponding to a thread,thereby obtaining data information generated in the process of executing the user thread function; and dynamically writing the data information in a user thread stack region in a stack correspondingto the thread, wherein the stack comprises stack protection regions and the user thread stack region. By arranging the stack protection regions at two ends of the user thread stack region, the overflow range of the stack and the destructive influence range after the stack is attacked are limited, so that basic information of the thread is prevented from being destroyed, and equipment restart caused by process hooking and exiting is prevented. Moreover, after it is detected that the stack is attacked, an abnormal signal is triggered, and the basic information of the thread and abnormal information that the stack is attacked are collected, so that the status of the thread can be known and the source of an abnormal problem can be located and traced.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a stack protection method and device. Background technique [0002] In the prior art, the stack protection mechanism mainly adopts a static detection and prevention mechanism. By running some static stack detection tools in the network device for detection, the problem of stack overflow can be prevented. However, because it is based on static detection, the probability of finding problems is low, and the scope of detecting problems is limited. Moreover, this mechanism can only detect stack overflow, and cannot protect the stack from being attacked. Contents of the invention [0003] In order to overcome the above-mentioned deficiencies in the prior art, the present invention provides a stack protection method and device, which can limit the stack overflow range and the damage impact range after the stack is attacked, avoid destroying the basic information of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
Inventor 宁茂钦
Owner MAIPU COMM TECH CO LTD