Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control flow integrity checking method and device, and computer storage medium

A technology of integrity verification and control flow, applied in the direction of platform integrity maintenance, computer security devices, computing, etc., can solve problems such as high cost

Active Publication Date: 2018-11-23
CHINA MOBILE COMM LTD RES INST +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to ensure the normal operation of the program, the binary file needs to be rewritten, and not every binary file is expensive, and some cannot even be rewritten successfully.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control flow integrity checking method and device, and computer storage medium
  • Control flow integrity checking method and device, and computer storage medium
  • Control flow integrity checking method and device, and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0044] An embodiment of the present invention provides a control flow integrity verification method. figure 1 It is a schematic flow diagram of a control flow integrity verification method according to an embodiment of the present invention; figure 1 As shown, the method includes:

[0045] Step 101: Identify a first indirect jump instruction in a program, and obtain feature information of the first indirect jump instruction.

[0046] Step 102: Encode the first indirect jump instruction based on the feature information to generate a second indirect jump instruction represented by two bytes, and modify the first indirect jump instruction in the program to the The second indirect jump instruction.

[0047] Step 103: Based on the supplementary program inserted into the program, when the program executes the second indirect jump instructi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a control flow integrity checking method and device, and a computer storage medium. The method comprises the following steps that: identifying a first indirect jump instruction in a program to obtain the characteristic information of the first indirect jump instruction; on the basis of the characteristic information, coding the first indirect jump instruction to generate a second indirect jump instruction shown by two bytes, and revising the first indirect jump instruction in the program into the second indirect jump instruction; and on the basis of asupplementary program inserted into the program, when the second indirect jump instruction is executed by the program, through the supplementary program, carrying out control flow integrity checking on the second indirect jump instruction.

Description

technical field [0001] The invention relates to the field of intelligent terminal security, in particular to a control flow integrity verification method, device and computer storage medium. Background technique [0002] At present, there are various mitigation mechanisms for exploiting vulnerabilities in the Android system, such as stack protection, stack non-executability, privileged execution never (PXN, Privileged eXecute-Never), address randomization, and the like. Under the protection of these security mechanisms, the traditional vulnerability attack techniques on the Android system have also failed one by one, but the offensive and defensive confrontation is constantly escalating. Under the defense mechanisms of Android, there are attacks that bypass these exploit mitigations. In recent years, for control flow hijacking attacks, a lot of work has been done on how to resist control flow hijacking attacks, and good results have been achieved. [0003] The control flow...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/563G06F21/565G06F21/577
Inventor 辛军王奥辉陈凯梁瑞刚彭华熹刘颖卿
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products