Supercharge Your Innovation With Domain-Expert AI Agents!

A device and method for performing saturated addressing load and store operations

A storage operation and addressing technology, applied in the field of processing methods and devices for saturated storage access operations, can solve the problems of large performance loss, large performance loss, user private data theft, etc., and achieve the effect of eliminating software attacks and small performance losses

Active Publication Date: 2021-09-24
PEKING UNIV
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Software attacks based on buffer overflow can basically pass through the CFI (Control Flow Integrity) and DFI (Data Flow Integrity) inspection mechanisms, and report in the form of exceptions or errors, but the unsupervised feature makes exceptions or errors impossible Being processed also makes the inspection meaningless. Secondly, this type of inspection mechanism mostly finds buffer overflow problems in the form of software, which often has a relatively large additional performance loss. The way to check buffer overflow has a small performance loss, but because BIMA indicates that the buffer base address and boundary are relatively complicated, the judgment of buffer overflow still has a relatively high cost and needs to be further improved; mainstream computing equipment is safe The defense methods are all detection technologies. Generally, once the attack is attacked, the program will be terminated and the abnormal information will be reported, or only the abnormal information will be reported, but the attack has not terminated.
Of the above two methods, the former will cause the service to be unavailable, and the latter will cause the user’s private data to be stolen as well.
Buffer overflow attacks cannot be reasonably eliminated, and the problems of service availability and user data security cannot be considered at the same time
[0004] To sum up, for this type of critical computing equipment, the existing buffer overflow detection mechanism has the problems of large additional performance loss, overflow exception cannot be processed in time, and user data is highly dangerous

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A device and method for performing saturated addressing load and store operations
  • A device and method for performing saturated addressing load and store operations
  • A device and method for performing saturated addressing load and store operations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be explained in detail below in conjunction with the accompanying drawings and examples, so as to clearly understand the purpose, technical solutions and advantages of the present invention. It should be noted that the drawings and examples herein are only for explaining the present invention, not for limiting the present invention. The following describes how the present invention works according to buffer limit information through a fat pointer storage format, then provides a hardware operating mode and hardware design prototype, and finally provides a command system based on the present invention.

[0045] At present, the code based on C language is full of buffers, and in C language, whether it is a buffer allocated on the stack, a buffer dynamically allocated on the heap, or a buffer initialized by global variables, the size of all buffers It is defined according to the writer's functional design based on the program, so the buffer size c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to apparatus and methods for performing saturated addressing load and store operations, providing logic for receiving and executing saturated addressing data move instructions to compute upper and lower bound locations of an array from array pointers and array pointer metadata. If the source position of the load operation is higher than the upper bound position or lower than the lower bound position, the data is transferred from the upper bound position or the lower bound position to the destination position, otherwise, it is transferred from the source position to the destination position. If the destination location of the store operation is higher than the upper bound location or lower than the lower bound location, the data is transferred from the source location to the upper bound location or the lower bound location, otherwise, it is transferred from the source location to the destination location.

Description

technical field [0001] The invention belongs to the field of memory security, and in particular relates to a processing method and device for saturated memory access operations. Background technique [0002] Computing equipment is currently widely used in medical care, transportation, infrastructure and manufacturing industries, and is responsible for such as: collection and processing of data information in the physical world, network data exchange, data processing analysis calculation and service provision. Computing devices usually have the characteristics of exchanging data through the network, providing real-time services for people's daily life, and carrying important private data; they are also gathering points for illegal personnel to obtain private data and destroy various services. At present, attacks against computing devices emerge in endlessly, and the damage is huge. The more famous ones are bleeding attacks, worms, and so on. At present, the attacks on comput...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/06G06F12/0875G06F12/0893
CPCG06F12/0646G06F12/0875G06F12/0893
Inventor 佟冬徐大亮程旭
Owner PEKING UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More