Data protection method and computing device

A data protection, data technology, applied in the field of information

Active Publication Date: 2019-12-20
杨力祥
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem in the prior art that an attacker can modify the return address stored in the stack to trigger an execution sequence that is conducive to the attack, and then obtain beyond authorization, the present invention discloses a method for preventing the generation of a new execution sequence, preventing the generation of Techniques that perform sequences other than those intended by design

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and computing device
  • Data protection method and computing device
  • Data protection method and computing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0077] Further detailed description will be given below in conjunction with specific embodiments.

[0078] In order to solve the defects in the prior art and improve the security of software including the operating system, the present invention proposes a method for protecting specific data accessed by the CPU, especially a method for preventing call instructions from returning address data and / or interrupting Methods that return information and / or process switch c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting specific data accessed by a central processing unit (CPU), relates to an information technology, in particular to the field of information security, andparticularly relates to a method for protecting a transfer instruction return address, which adopts a field information stack to store data generated by operations needing field protection, such as calling, interrupting and the like; an ass register and an aesp register are added and are respectively used for storing a segment selector of the field information stack and a stack top pointer of thefield information stack; a pushadr and a pushadr instruction are added, the pushadr instruction is used for pressing an address into the field information stack, and the aesp automatically points toa new stack top; the popadr instruction is used for popping up an address from the field information stack, and the aesp automatically points to a new stack top. By applying the scheme provided by theinvention, the condition that a new execution sequence can be generated in a program to further generate an attack due to the fact that a return value of function calling or an address value returnedby interruption is covered is avoided.

Description

technical field [0001] This application relates to the field of information technology, in particular to a data protection technology, especially to a specific data accessed by the CPU or to a technology for automatically saving data in memory by the CPU to prevent data from being tampered with, especially a protection technology involving return addresses . Background technique [0002] In the prior art, the function call instruction will push the address to be returned after the call is completed onto the stack, so that the function call can return to the original execution sequence. One attack method is to overwrite the address of the function pushed into the stack by means of stack overflow and write it into another address, so that the code will jump to the address written by the attack program when it returns, and the attack program will reach The purpose of changing the program execution order. [0003] In addition to function calls, information including the return...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/60G06F21/62G06F9/448
CPCG06F21/563G06F21/566G06F9/4486G06F21/604G06F21/6218G06F2221/034G06F21/56G06F9/448G06F21/62G06F21/60
Inventor 杨力祥
Owner 杨力祥
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products