Optimizing boundary information access in buffer protection

A boundary information and buffer technology, applied in memory architecture access/allocation, instruments, register devices, etc., can solve problems such as remote code execution or privilege escalation defects, dangers, intrusions, etc.

Pending Publication Date: 2022-07-01
IBM CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Programs such as C and C++, which are already widely used in some operating systems and others, can lead to multiple memory security bugs that attackers can exploit, with dangerous and intrusive consequences such as remote code execution or privilege escalation Defects, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optimizing boundary information access in buffer protection
  • Optimizing boundary information access in buffer protection
  • Optimizing boundary information access in buffer protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will now be described with reference to the drawings, wherein like reference numerals refer to like parts throughout. It is emphasized that, in accordance with common practice, the various features of the drawings are not necessarily drawn to scale. On the contrary, the dimensions of the various features may be arbitrarily expanded or reduced for clarity. The exemplary embodiments are provided below for purposes of illustration and not for limitation of the claims. Furthermore, please note that any of the steps may be performed in a different order, or in combination, or concurrently. Additionally, any of the structures and embodiments shown may be modified or combined.

[0034] Memory references outside of their scope can cause serious security problems. Buffer overflow vulnerability has been a problem for at least 30 years, eg Morris Internet Worm (1988). Buffer overflow vulnerabilities have enabled many forms of attack, including buffer over...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method, system, and apparatus for providing border information access in buffer protection includes providing a one-to-one mapping between border information in a general purpose register and a BI (border information) register, saving loaded border information in the BI register for future use, providing integrity of the border information in the BI register, and providing access to the border information in the BI register. The integrity of the boundary information is maintained as the program executes, and pre-active loading of the boundary information is provided with one-bit additional control of the load instruction of the BI register.

Description

technical field [0001] The present invention relates to embodiments of boundary information access methods, apparatuses and systems, and more particularly, but not by way of limitation, to methods, apparatuses and systems for optimizing boundary information access in buffer protection. Background technique [0002] Memory security vulnerabilities (e.g., buffer overflows, race conditions, page faults, null pointers, stack exhaustion, heap consumption) occur when software accidentally or intentionally accesses system memory in a way that exceeds its allocated size and memory address exhaust / damage, use after release, or double release, etc.). [0003] Programs that are already widely used in some operating systems and other programs such as C and C++ can lead to multiple memory security bugs that attackers can exploit, leading to dangerous and intrusive consequences such as remote code execution or privilege escalation defects, etc. For example, by reading out-of-bounds memo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06
CPCG06F3/0604G06F3/0614G06F3/0656G06F9/3004G06F9/3013G06F12/1441G06F9/30047G06F9/383G06F2212/1052G06F2212/1024G06F8/41G06F8/75G06F9/30101G06F9/30043G06F9/30127G06F9/3836G06F9/44505G06F9/5027
Inventor 陈彤R·H·博威A·布于克托苏诺格卢
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products