System attack protection method supported by CPU hardware

A technology supported by hardware and operating system, applied in the direction of preventing unauthorized use of memory, protecting storage content from loss, etc., can solve problems such as inflexibility and effectiveness

Inactive Publication Date: 2004-06-02
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to provide an effective attack prevention m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System attack protection method supported by CPU hardware
  • System attack protection method supported by CPU hardware
  • System attack protection method supported by CPU hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention is specifically implemented for MIPS R4000 compatible CPU (referring to (1) SGI / MIPS.MIPS R4000 Microprocessor User's Manual, 1996. (2) Dominic Sweetman.See MIPSRun.Morgan Kaufmann Publishers Inc.1999.) and Linux operating system , which will be described in detail below.

[0020] To execute a certain instruction, the CPU must first fetch the instruction from the memory. Therefore, the executable permission to control a certain address can be realized through the MMU component when fetching the instruction. In order to provide maximum flexibility, the present invention provides two types of CPU hardware supporting executable permission control.

[0021] One is a segmented control hardware. Two control registers, ProtMask and ProtAddr, are added to the control register group of the MIPS CPU to allow the system to control the range of virtual addresses that can be fetched. ProtMask specifies the address bit to check when fetching instructions: the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method supported by CPU hardware for preventing system attack includes providing hardware support in memory manager by CPU to control if some address can be executed, providing a system call interface with a limited executable address range by operating system for controlling the executable address range of application, and providing a system program by operating system for limiting the executable addresses by binary program and preventing the modification and recompilation of source codes.

Description

technical field [0001] The invention relates to microprocessor architecture and computer system security, in particular to a system attack prevention method supported by CPU hardware. Background technique [0002] With the popularization of computers and the rapid development of networks, the number of illegal attacks or system intrusions has increased rapidly in recent years, causing more and more losses. The common form of these attacks is to use the loopholes of the system service program to bypass the protection mechanism of the system for illegal access. [0003] A common and dangerous loophole is buffer overflow, which exists widely in various operating systems and application software. Using buffer overflow attacks can cause program failure, execute unauthorized instructions, and even obtain system privileges to perform various illegal operations. The principle of buffer overflow is to write the content exceeding its length to the buffer of the program, causing the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14G06F12/16
Inventor 胡伟武张福新李丙辰唐志敏
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products