Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack detection device, system and method

An attack detection and security detection technology, applied in computer security devices, instruments, computing, etc., can solve problems such as low system efficiency, performance loss, and program running interference.

Active Publication Date: 2020-01-31
LOONGSON TECH CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the CFI algorithm needs to add an identification number to the target address of each indirect transfer, which causes greater interference and performance loss to the program operation, making the system less efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection device, system and method
  • Attack detection device, system and method
  • Attack detection device, system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0021] The present invention is mainly used to detect whether the computer system is attacked by the change of program control flow caused by memory error, such as: buffer overflow attack, return to system library function attack (Return-to-libc, also called Ret2libc), Return-oriented programming attacks (Return Oriented Programming...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attack detection device, system and method. The attack detection device comprises an execution information monitoring unit and a safety detection unit, wherein the executioninformation monitoring unit is used for obtaining execution information corresponding to each transfer instruction operated by a processor, wherein the execution information comprises a destination address of the transfer instruction; and the safety detection unit is used for obtaining a safe destination address set at a recording execution stage, and determining whether the processor is attackedor not according to the destination addresses of the transfer instruction and the safe destination address set in a detection execution stage. The attack detection device provided by the invention iscapable of enhancing the system efficiency.

Description

technical field [0001] The present invention relates to the technical field of computer security, and in particular, to an attack detection device, system and method. Background technique [0002] With the development of computer technology, more and more attention has been paid to the security of computer. Computer systems are complex software and hardware systems, and the existence of loopholes is almost inevitable. Attackers often find various loopholes to attack, resulting in the vulnerability of computer systems. Among them, software-level attacks are currently the most mainstream type of attacks, such as software-level attacks based on memory errors. The so-called memory error-based attack means that the attacker uses the memory error vulnerability to construct malicious input, causing errors when the input data is processed, and writing the input data to some specific sensitive locations in the memory, thereby changing the program control flow and execution. Attack ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/033
Inventor 章隆兵肖俊华吴瑞阳王剑
Owner LOONGSON TECH CORP