Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

375 results about "Buffer overflow" patented technology

In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.

Method for sensing and recovery against buffer overflow attacks and apparatus thereof

Methods and apparatuses for detecting and recovering from a buffer overflow attack are provided. A method of recovering an operation state of a processor from a buffer overflow attach includes: detecting whether a buffer overflow attack is made on any write operation while storing write operations that are potential targets of buffer overflow attacks in a predetermined location instead of an original destination to store write operations; storing the contents stored in the predetermined location at a predetermined interval in the original destination for storing write operations if no buffer overflow attack is detected and discarding unsafe write operations subsequent to a buffer overflow attack if a buffer overflow attack is detected; and ignoring the unsafe write operations subsequent to the buffer overflow attack if a buffer overflow attack is detected. Therefore, a buffer overflow attack occurring in a computer can be effectively detected, and damage of a system which is attacked can be minimized and the system can be recovered or return to the original state before the attack. A system can be effectively protected while minimizing reduction in performance of the computer system according to a method used to implement the present invention, thereby greatly improving the environments under which the computer and the Internet are used.
Owner:HANBAT NAT UNIV IND ACADEMIC COOPERATION FOUND

Protection against runtime function attacks

Security mechanisms detect and intervene in a malicious attack against a runtime function, even in the presence of a coding flaw such as a buffer overrun or overflow. One such exemplary mechanism uses a predetermined security list of the valid targets for a first runtime function (such as longjmp). For every call to a second runtime function (e.g., setjmp) that prepares for a later invocation of the first runtime function, the dispatcher finds and stores a reference to this list. When a subsequent attack targets the runtime functions by creating an attacker-provided setjmp target address (e.g., the attack overwrites the longjmp target address so that the pointer points somewhere else, such as code provided by the attacker or code that already exists that will eventually pass control to code provided by the attacker), the new (attacker provided) target address is compared to a reference list of the real (valid) target addresses. The list of real target addresses is stored in memory. If the target address that has been provided is found on the reference list, then the runtime function (e.g., longjmp) is allowed to continue to execute by the dispatcher (which may be the actual runtime function). Otherwise, the dispatcher assumes the application is under attack and terminates the process' execution.
Owner:MICROSOFT TECH LICENSING LLC

Method and system for configuring buffer area at streaming media server side based on MPEG (Moving Picture Experts Group)-4

The embodiment of the invention discloses a method and system for configuring a buffer area at a streaming media server side based on an MPEG (Moving Picture Experts Group)-4. The method comprises the following steps of: calculating the cache occupancy rate of cached video streaming in the current buffer area; judging whether the cache occupancy rate is greater than a preset first occupancy rate threshold and is smaller than a second occupancy rate threshold, wherein, the second occupancy rate threshold is greater than the first occupancy rate threshold; if the cache occupancy rate is smaller than the first threshold, adjusting the size of the current buffer area; if the cache occupancy rate exceeds the first threshold and is less than the second occupancy rate threshold, adjusting the video coding rate of the MPEG-4 by controlling the frame rate; and if the cache occupancy rate exceeds the second occupancy rate threshold, releasing frames according to a dynamic frame dropping algorithm. The method and the system have the beneficial effects that on the premise of ensuring no drop frame as far as possible, buffer overflow can be well prevented and effective decoding rate can be improved by dynamically configuring the capacity of the buffer area and adjusting the decoding rate of the frames, thus further improving the video quality.
Owner:江西省南城县网信电子有限公司

Method for detecting web page Trojan horse based on program execution characteristics

The invention belongs to the field of computer security, and relates to a method for detecting web page Trojan horse based on program execution characteristics, which comprises the following steps: using web crawlers to capture source codes of a web page; then obtaining a recognizable script program through multilevel decoding; carrying out disassembling processing on the script program to obtainassembled source codes while reserving the script program; then, judging whether a large number of filled invalid instructions, calling system level functions and obvious URL links exist in the sourcecodes; and finally detecting whether the Trojan horse exists in the web page through the assembled source codes in a deep level. Because most of the prior web pages with the Trojan horse are embeddedwith ShellCode, to execute the ShellCode in the web pages in a local computer, system vulnerability is needed to realize buffer overflow and enable the program to skip onto the ShellCode code segment. Thus, only by analyzing the condition of executing the ShellCode, and analyzing the source codes according to the execution characteristics, whether the web page to be detected is the web page Trojan horse can be quickly detected.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products