Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Return-oriented programming protection

A technology oriented to the return and protection system, applied in the direction of platform integrity maintenance, instrumentation, transportation and packaging, etc., can solve the problem that binary files are not available for modification, etc.

Pending Publication Date: 2021-10-22
C2A SEC LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, in some cases the binaries are not available for modification due to safety or warranty issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Return-oriented programming protection
  • Return-oriented programming protection
  • Return-oriented programming protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Before describing at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in application to the details of construction and arrangement of components set forth in the following description or illustrated in the drawings. The invention is applicable to other embodiments of being practiced or carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.

[0024] Figure 1A A high level schematic diagram of an automotive communication network 10 including a ROP attack protection system 20 is illustrated. Figure 1B illustrates a high-level schematic diagram of a ROP attack protection system 20, and Figure 1C A high level schematic diagram of an embodiment of the processor 30 of the ROP attack protection system 20 is illustrated. The vehicle communication network 10 includes: a ROP attack protect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An ROP attack protection method for a plurality of ECUs comprises the steps: receiving data destined for one of the plurality of ECUs; determining which of the plurality of ECUs the received data is destined for; responsive to a unique model associated with the determined ECU, analyzing the received data to identify control flow instructions addressed to one or more predetermined addresses; responsive to the analyzation, generating a statistical analysis of the identified control flow instructions; and responsive to the generated statistical analysis, outputting a signal indicating a possibility of an attack.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to U.S. Provisional Patent Application S / N 62 / 814,009, filed March 5, 2019, entitled "RETURN-ORIENTED PROGRAMMING PROTECTION," the entire contents of which U.S. Provisional Patent Application Incorporated herein by reference. technical field [0003] The present invention relates generally to the field of security appliances, and more particularly to systems and methods for protecting against Return Oriented Programming (ROP) attacks. Background technique [0004] ROP is a computer security exploitation technique that allows an attacker to execute malicious code even in the presence of security defenses such as executable space protection and code signing. With ROP, an attacker gains control of the control flow instruction stack and hijacks program control flow. An attacker is then able to execute a carefully chosen sequence of machine instructions already present in the device's memo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56H04L29/06H04W4/44H04W12/121
CPCG06F21/562G06F2221/033H04W4/44H04L63/0245H04L63/1466H04W12/121G06F21/54G06F21/554G06F2221/034
Inventor Y·达维多维克Y·福克斯N·布拉克哈
Owner C2A SEC LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products