Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack detection device, system and method

An attack detection and security detection technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as program operation interference, low system efficiency, and performance loss

Active Publication Date: 2018-03-13
LOONGSON TECH CORP
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the CFI algorithm needs to add an identification number to the target address of each indirect transfer, which causes greater interference and performance loss to the program operation, making the system less efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection device, system and method
  • Attack detection device, system and method
  • Attack detection device, system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] The present invention is mainly used for detecting whether the computer system is subjected to an attack of changing program control flow based on a memory error, for example: a buffer overflow attack, an attack returning to a system library function (Return-to-libc, also called Ret2libc), Return-oriented programming attacks (Return Or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attack detection device, system and method. The attack detection device comprises an execution information monitoring unit and a safety detection unit, wherein the executioninformation monitoring unit is used for obtaining execution information corresponding to each transfer instruction operated by a processor, wherein the execution information comprises a destination address of the transfer instruction; and the safety detection unit is used for obtaining a safe destination address set at a recording execution stage, and determining whether the processor is attackedor not according to the destination addresses of the transfer instruction and the safe destination address set in a detection execution stage. The attack detection device provided by the invention iscapable of enhancing the system efficiency.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to an attack detection device, system and method. Background technique [0002] With the development of computer technology, computer security issues are getting more and more attention. The computer system is a complex hardware and software system, and the existence of loopholes is almost inevitable. Attackers often find various loopholes to attack, resulting in the vulnerability of the computer system. Among them, software-level attacks are currently the most mainstream attack type, for example: software-level attacks based on memory errors. The so-called memory error-based attack means that the attacker uses the memory error vulnerability to construct malicious input, which causes an error when the input data is processed, and writes the input data to some specific sensitive locations in the memory, thereby changing the program control flow, executing Attack code, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/033
Inventor 章隆兵肖俊华吴瑞阳王剑
Owner LOONGSON TECH CORP