Supercharge Your Innovation With Domain-Expert AI Agents!

System and method of obfuscation through binary and memory diversity

A binary file, binary code technology, applied in the field of systems and methods for obfuscation through binary and memory diversity, can solve problems such as increasing manufacturing costs

Active Publication Date: 2018-05-11
RUNSAFE SECURITY INC
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Operational security controls (guards, checks, etc.) increase manufacturing costs which may be avoided in order to maintain price competitiveness
The same cost considerations can affect electronic designs by penalizing security circuitry such as Trusted Platform Modules

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method of obfuscation through binary and memory diversity
  • System and method of obfuscation through binary and memory diversity
  • System and method of obfuscation through binary and memory diversity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The systems and methods of the present disclosure can create a security layer for an OS by randomizing kernel code locations and memory locations. For example, nearly 80% of recent code execution exploits in the Linux kernel are sensitive to pointers and code addresses in the kernel. Unpredictable code locations and pointer changes can seriously hamper the productivity of exploit authors. If an attacker can figure out how to exploit a vulnerability, the usefulness of the OS will be very limited.

[0033] When using the systems or methods of the present disclosure, each successive instance of an OS (next router, cloud virtual machine, etc.) can have a completely different and random organization. Assuming that the Linux kernel has over 37,000 files and 15 million lines of code, there are enough building blocks to create trillions of combinations to create kernel diversity according to this disclosure.

[0034] The systems and methods of the present disclosure may inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for obfuscating binary codes are disclosed. In one embodiment, the system for obfuscating binary codes comprises one or more processors. The one or more processors may be configured to receive a binary file. The one or more processor may further be configured to obfuscate the binary file. The obfuscation may be based on rewriting the binary file and generating a second binary-randomized binary file. The binary file and the second binary-randomized binary file are functionally equivalent. The obfuscation may be based on randomizing the binary file at a load time, without changing functionality of the binary file.

Description

[0001] Cross References to Related Applications [0002] This application claims the benefit of US Provisional Patent Application No. 62 / 144,092, entitled "System and Method for Kernel Security through Binary and Memory Diversity," filed April 7, 2015, which is hereby incorporated by reference in its entirety. technical field [0003] The systems and methods of the present disclosure relate to novel systems and methods for protecting modern operating systems from compromise and abuse by unauthorized users. The systems and methods of the present disclosure can be applied to many different operating systems (eg, Linux, UNIX, Windows). Background technique [0004] general questions [0005] Operating systems can be attacked in different ways. For example: copies of an operating system ("OS") are the same on millions of phones, thousands of cars, etc. One way hackers can create an attack is by acquiring (buying, stealing and / or borrowing) equipment or software that represent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44G06F9/445G06F21/14
CPCG06F21/14G06F2221/2125G06F9/45558G06F2009/45587G06F9/4401
Inventor A·M·维斯B·S·帕克
Owner RUNSAFE SECURITY INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More