Memory overflow defense method based on pointer encryption mechanism and RISC-V coprocessor

A RISC-V and coprocessor technology, applied in the protection of internal/peripheral computer components, platform integrity maintenance, etc., can solve problems such as the inability to defend against overflow attacks, the impact of program operation efficiency, etc., to reduce impact and improve security performance Effect

Active Publication Date: 2021-11-19
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the current defense mechanisms all have the following problems, including being able to bypass attacks, being unable to defend

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory overflow defense method based on pointer encryption mechanism and RISC-V coprocessor
  • Memory overflow defense method based on pointer encryption mechanism and RISC-V coprocessor
  • Memory overflow defense method based on pointer encryption mechanism and RISC-V coprocessor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples and accompanying drawings. As a limitation of the present invention.

[0048] This embodiment uses the ROCC interface of RocketChip to access the coprocessor written in Chisel hardware language, realizes the memory overflow defense method based on the pointer encryption mechanism and the RISC-V coprocessor, and uses the C++cycle-accurate implemented by RocketChip The emulator conducts safety and efficiency tests. The concrete flowchart of embodiment is as figure 1 As shown, it mainly includes the following steps:

[0049] 1) Analyze the source code of the program, locate the code that assigns a value to the return address (ra), insert the RISC-V extension instruction that encrypts ra before the code—instruction 4, locate the code that uses ra, and insert the RISC-V that decry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a memory overflow defense method based on a pointer encryption mechanism and an RISC-V coprocessor, relates to the technical field of computer system security, and aims to achieve the purpose of preventing data from jumping to a destination address through buffer overflow modification by encrypting a return address and a function pointer so as to realize security protection of an RISC-V architecture. And the safety of the RISC-V system is improved, and meanwhile, a program is not obviously influenced.

Description

technical field [0001] The invention relates to the technical field of computer system security, in particular to a memory overflow defense method based on a pointer encryption mechanism and a RISC-V coprocessor. Background technique [0002] Buffer overflow is a very common security hole in computer systems. Due to the negligence of the software developer when writing the code, etc., the memory buffer is not bounded. Attackers use this injected data to overwrite important data after overflow, so as to master the control flow of the program and even obtain the root authority of the entire system. According to data from the CommonVulnerabilities and Exposures website, more than 1,600 buffer overflow vulnerabilities were disclosed in 2020 alone. Therefore, how to defend against attacks that exploit such vulnerabilities is a problem worth studying. [0003] At present, the main defense mechanisms include: 1. Data is not executable, that is, data pages in the program are prev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/73G06F21/52
CPCG06F21/73G06F21/52Y02D10/00
Inventor 张雨昕芮志清吴敬征罗天悦武延军
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products