Unlock instant, AI-driven research and patent intelligence for your innovation.

Sensor for detecting and eliminating inter-process memory breaches in multitasking operating systems

a multi-tasking operating system and inter-process memory technology, applied in multi-programming arrangements, specific access rights, instruments, etc., can solve problems such as the inability of users to know specific scrs, the inability of offenders to abuse the inherent mechanisms of the operating system, and the vulnerability of the user-mode multi-layer extension mechanism to memory-space breaches. to achieve the effect of increasing the efficiency of the system

Inactive Publication Date: 2012-08-28
CALLAHAN CELLULAR L L C
View PDF23 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This solution enhances security by effectively detecting and eliminating unauthorized SCR breach operations within multitasking systems, improving the separation of memory spaces and aiding in accountability by alerting users to illegal actions.

Problems solved by technology

In particular, user-mode multi-layer extension mechanisms are quite vulnerable to memory-space breaches.
Normally, whenever a service from a specific SCR is requested by a user application, the request travels along the whole relevant stack, however, the user application has no clue about the specific SCRs that actually serve it along the way.
Unfortunately, there is more than one way to share memory between the SCR's ‘instances’.
Combining the aforementioned factors that compromise the requirement for separation between memory spaces of different processes, there is an opportunity for offenders to abuse the inherent mechanisms of the operating system.
Amongst other threats, the offender may read or manipulate I / O, it might change the behavior of the invaded application, or it may send information from one process to another process.
One of the most serious aspects of memory-space breaches is the ability of the offender to take the identity of the invaded process.
This makes life harder for auditing tools and intrusion-detection systems, and makes the search for accountability more difficult.
The art has not yet provided satisfactory protection means for detecting and / or preventing such inter-process memory breaches in multitasking OS.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensor for detecting and eliminating inter-process memory breaches in multitasking operating systems
  • Sensor for detecting and eliminating inter-process memory breaches in multitasking operating systems
  • Sensor for detecting and eliminating inter-process memory breaches in multitasking operating systems

Examples

Experimental program
Comparison scheme
Effect test

examples

[0158]The following are some examples for possible implementations of some of the concepts that are described herein. The implementations should run on 32 bit Windows™ operated machines. More particularly, the two offender mechanisms that are described here can run on both Win9x and NT, while the defender mechanism can run as is on Win9x, and a slight modification enables it to run on NT as well.

[0159]The concepts and mechanisms described here may of course be adapted to other Operating Systems. Furthermore, even on the OSs referenced herein, namely Windows™, there are many SCR chains, beyond the Windows Message Hook mechanism, that may be exploited using the principles and concepts that are described herein above.

[0160]The description herein is not meant to be fully detailed or comprehensive: it is given here just for providing an intuitive understanding of the mechanism. Many details are omitted for the sake of brevity while keeping the essence clear.

[0161]Following are the descri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for detecting and eliminating SCR breach operations by a second party within the memory space allocated to a first party, in a multi-tasking system, which comprises: (a) pre-recording by the first party within a knowledge base the structure and / or behavior of an SCR stack; (b) implanting within the SCR stack a dedicated SCR for reporting on the structure and / or behavior of said SCR stack when the SCR stack is activated; (c) when the SCR stack is activated, comparing the data reported by the dedicated SCR with the pre-recorded stack structure and / or behavior; (d) whenever non-matching in the structure and / or behavior is found, ceasing the activity of the activated stack, and alerting.

Description

CROSS-REFERENCE TO RELATED APPLICATION[0001]This application claims the benefit of U.S. Provisional Application No. 60 / 260,203, filed Jan. 9, 2001, the disclosure of which is incorporated herein by reference.FIELD OF THE INVENTION[0002]The present invention relates to the field of protecting and securing data in computerized systems. More particularly, the invention provides a method and system for detecting inter-process memory breaches in multitasking operating systems.BACKGROUND OF THE INVENTION[0003]Modern operating systems are actually a modular collection of building blocks rather than one monolithic object. This form of architecture enables an Operation System (OS) manufacturer to build and distribute new facilities (or new versions for existing facilities) with relative ease. It also enables third party programmers to add new capabilities to a basic operating system without accessing its source code, by means of well-defined extension interfaces.[0004]In particular, the Inpu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F7/04G06F12/14H04L29/06G06F17/00H04L9/32G06F11/30G06F7/00G06F15/173G06F9/46
CPCG06F9/468
Inventor KEDMA, GABRIELHAVAZELET, DORON
Owner CALLAHAN CELLULAR L L C