Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A system and method for resisting memory leakage based on llvm

A memory leak and honeypot technology, applied in the field of computer software security, can solve the problems of high cost, inconvenient use and deployment, etc., and achieve the effect of low cost, strong compatibility and increased difficulty

Active Publication Date: 2022-07-19
WUHAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These two methods can mitigate execution-based memory leak attacks to a certain extent, but most of them cannot be used in actual industrialized scenarios due to problems such as high overhead and inconvenient deployment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for resisting memory leakage based on llvm
  • A system and method for resisting memory leakage based on llvm
  • A system and method for resisting memory leakage based on llvm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to facilitate the understanding and implementation of the present invention by those of ordinary skill in the art, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the embodiments described herein are only used to illustrate and explain the present invention, but not to limit the present invention.

[0038] The technical scheme of the present invention proposes that the memory leak attack is mitigated through the LLVM-based code honeypot method and the LLVM-based data honeypot method. Defends against memory leak attacks based on code and data pointers by performing code and data honeypot insertion at compile time. LLVM is a framework system for building compilers. The present invention can be implemented in a computer.

[0039] An embodiment of the present invention provides a method for resisting memory leaks based on LLVM, including:

[0040] Code honey...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a system and method for resisting memory leakage based on LLVM. The system includes a code honeypot device and a data honeypot device. The code honeypot device is used to resist memory leakage attacks based on code pointers, including compiling an LLVM source file as After the IR layer code, identify the cross-function transfer instruction in the code, insert the condition judgment instruction, the real end points to the jump instruction, and then create a copy of the function or code fragment pointed to by the jump instruction, and create a copy of the function or code fragment pointed to by the condition judgment false end. The honeypot jump instruction of the copy, and finally transfer the copy to the monitored or non-executable honeypot area; the data honeypot device is used to identify instructions that are likely to cause code location leakage, including program return address instructions, functions Pointer generation instructions, virtual function pointer generation instructions and exception handling pointer generation instructions are inserted into corresponding honeypot functions or code generation instructions. The invention can resist the memory leak attack based on code and data pointer leak.

Description

technical field [0001] The invention belongs to the field of computer software security, and relates to a LLVM-based technical solution for resisting memory leakage. Background technique [0002] The attack and defense of code reuse attack is one of the important research directions of software security. Code reuse attacks are accomplished by reusing code that already exists in the program, by hijacking the control flow to the target reuse code. The current randomization method increases the entropy of the target program, and the attacker cannot directly construct an attack based on the target fragment position obtained by offline analysis. Therefore, the attacker uses the memory leak to get the real code location after randomization, so as to correct the location of the fragment or directly search for the fragment in the memory. [0003] Some classical methods assist code reuse attacks by locating gadgets through memory leaks. JIT-ROP locates the code page by finding inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/554
Inventor 傅建明金睿
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products