Memory vulnerability detection method based on processor chip and electronic device
A processor and memory technology, applied in the field of processor chip-based memory vulnerability detection methods and electronic devices, can solve the problems of undeployment of permission checking mechanism, inability to do fine-grained permission checking, performance loss, etc., and achieve improved sequence performance , improve detection accuracy, and protect memory security
Pending Publication Date: 2021-01-05
INST OF INFORMATION ENG CAS
View PDF0 Cites 0 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
The permission check based on the page table has two disadvantages: First, the granularity of the permission check based on the page table is the page, and fine-grained permission check cannot be performed between objects in the same physical page
Second, when the permission of one of the pages changes, the entire TLB in the memory management unit needs to be refreshed, which brings a very high performance loss, making the permission checking mechanism based on the page table impossible in practical applications. to deploy
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
specific example
[0060] Such as Figure 4 As shown, the attacker uses the buffer overflow technique to sequentially read the memory content downwards and beyond the boundary until sensitive data such as user passwords, digital certificates, etc. are read.
[0061] Such as Figure 5 As shown, a memory access trap is set at the end of the cache. When an attacker illegally reads memory through buffer overflow technology, it will inevitably read the location of the memory access trap, thus triggering an exception.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More Abstract
The invention provides a memory vulnerability detection method based on a processor chip and an electronic device. The method comprises the steps of enabling a program to be decoded through a decodingunit in a central processing unit, and obtaining a virtual address in an execution instruction; calculating an ID of the virtual address, and if the ID is in a memory access trap index table of a memory management unit, sending the virtual address to an operating system; obtaining a corresponding memory access trap table according to the corresponding relationship between the ID in the memory access trap index table of the operating system and the memory access trap table, and synchronously updating the memory access trap index table of the memory management unit and the ID in the memory access trap index table of the operating system; and if the virtual address is in the corresponding memory access trap table, judging that the program is a malicious program. According to the method, thememory security can be protected in a fine-grained manner, the detection precision of malicious tampering behaviors is improved, and the sequence performance of the program is improved by proposing asecondary search strategy.
Description
technical field [0001] The invention belongs to the field of computer information security, and relates to a memory leak detection method based on a processor chip and an electronic device. Background technique [0002] Malicious tampering of memory is a prerequisite for constructing covert attack methods such as code injection attacks, code reuse attacks, and data stream hijacking attacks. Establishing a detection mechanism for memory safety can prevent such attacks with Turing completeness. [0003] Currently, the permission checking mechanism based on the page table is the most widely deployed measure to protect memory security. In this mechanism, the permission check on the memory access address occurs when the memory management unit performs virtual and real address translation through the transfer look-aside buffer (TLB), and performs permission check on the relevant page table entries. The permission check based on the page table has two disadvantages: First, the gr...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 侯锐孟丹张超超
Owner INST OF INFORMATION ENG CAS



