Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

54 results about "Memory safety" patented technology

Memory safety is the state of being protected from various software bugs and security vulnerabilities when dealing with memory access, such as buffer overflows and dangling pointers. For example, Java is said to be memory-safe because its runtime error detection checks array bounds and pointer dereferences. In contrast, C and C++ allow arbitrary pointer arithmetic with pointers implemented as direct memory addresses with no provision for bounds checking, and thus are termed memory-unsafe.

Object-based programming method and object-based programming system in C language programming

Certain currently popular programming languages (such as C++) are highly efficient but can easily bring about memory errors, and certain currently popular programming languages (such as Java) are safe in memories but lower in efficiency. The invention discloses an object-based programming method and an object-based programming system in C language programming, and the system is a convenient, safe and high-efficiency programming framework. The system utilizes the stack technique to efficiently judge the attribute of an 'object' (i.e. a non-generic type variable), also standardizes assignment and other operations on the object, and can release object resources and optimize the efficiency of object usage (or the efficiency of parameter transfer) simultaneously. The system provides defining templates for objects and object-operating functions, so that programmers can conveniently define the objects and the object-operating functions, the objects and functions defined by the defining templates can be conveniently subjected to recursionrecur and can be conveniently nested, invoked and operated in any other complex ways like generic type variables and functions, and the problems of memory safety and efficiency are automatically processed by the templates.
Owner:INST OF FLUID PHYSICS CHINA ACAD OF ENG PHYSICS

XEN cloud platform virtual machine isolation method based on memory isolation

The invention discloses an XEN cloud platform virtual machine isolation method based on memory isolation, and belongs to the field of information safety. The XEN cloud platform virtual machine isolation method based on memory isolation comprises the following steps of S1, carrying out interception on an authorization list operation, S2, extending the ACM mechanism, achieving validity verification of the authorization list operation, letting the authorization list operation pass when the validity verification of the authorization list operation gets through, and S3, carrying out control execution on the passed authorization list operation. The XEN cloud platform virtual machine isolation method based on memory isolation has the advantages that the authorization list operation of an XEN memory is intercepted to carry out analysis on the memory mapping relation between virtual machines, the validity verification of the authorization list operation is accomplished through an extended ACM, the authorization list operation is let pass after the validity verification of the authorization list operation gets through, memory safety isolation between the virtual machines is accomplished through control over an authorization list, and the XEN cloud platform virtual machine isolation method based on memory isolation belongs to the field of Hypervisor safety research, can achieve safe isolation of a memory resource, and improves safety of the XEN cloud environment.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Memory security detection method and system on chip

The invention provides a memory security detection method and a system on chip, the system on chip comprises a security policy controller and a memory to be detected, and the security policy controller comprises a detection module. The security policy controller receives a detection signal which carries a to-be-detected fault and/or an attack identifier of the to-be-detected memory, and obtains a detection algorithm corresponding to the to-be-detected fault and/or the attack identifier from the off-chip memory according to the to-be-detected fault and/or the attack identifier; and the off-chip memory stores detection algorithms corresponding to various fault and/or attack identifiers, the detection module is configured according to the obtained detection algorithms to obtain a detection circuit, and the detection circuit is utilized to judge whether the to-be-detected memory has a to-be-detected fault and/or attack. Security detection of corresponding faults and/or attacks of the to-be-detected memory is achieved, multiple complex detection circuits do not need to be deployed in the system at the same time, corresponding detection algorithms are called according to different detection signals to configure the corresponding detection circuits, power consumption is reduced, and efficiency is improved.
Owner:INST OF MICROELECTRONICS CHINESE ACAD OF SCI

Interrupt verification system based on interrupt control flow graph

The invention discloses an interrupt verification system based on an interrupt control flow graph. The system comprises a code conversion module, an interrupt information statistical module, a controlflow graph generation module, an interrupt control flow graph generation module, a processing module and an analysis module, wherein the code conversion module is used for obtaining an assembly codeaccording to an interrupt driving program; the interrupt information statistical module carries out statistics of interrupt information according to the assembly code; the control flow graph generation module generates the control flow graph according to the assembly code; the interrupt control flow graph generation module generates the interrupt control flow graph according to the control flow graph and the interrupt information; the processing module is used for carrying out slicing processing on the interrupt control flow graph; and the analysis module verifies the time safety and the memory safety of the interrupt driving program according to an interrupt control flow graph slice. The invention puts forward a new a model-interrupt control flow graph used for showing the control flow structure of the interrupt driving program and gives a method for cutting off the scale (slice) of the interrupt control flow graph, two categories of problems which appear most often in the interrupt driving program are verified in the same model, and the verification reliability and safety of the interrupt driving program is improved.
Owner:EAST CHINA NORMAL UNIV +1

Memory security detection system and method for cloud platform

PendingCN111399988AIntuitive Memory Safety StatusIntuitive display of memory safety statusSoftware simulation/interpretation/emulationTerm memoryMemory safety
The invention discloses a memory security detection system and method for a cloud platform, and relates to the field of network security, wherein a plurality of virtual machines are deployed on the cloud platform and respectively run on the same host machine, and the host machine respectively provides memory for each virtual machine; the security detection system performs memory security detectionin a mode of writing a characteristic value into the virtual machine; the memory isolation detection subsystem comprises a first write-in module, a second write-in module, a third write-in module, afourth write-in module, a fifth write-in module, a sixth write-in module and a sixth write-in module, and the first searching module is used for searching whether the virtual machines except the virtual machines written in contain the characteristic values or not in sequence, outputting a detection result representing that the memory is not completely isolated when the characteristic values are searched in any virtual machine, and outputting a detection result representing that the memory is completely isolated when all the virtual machines are not searched. The invention has the beneficial effect of accurately and visually displaying the memory security state of the cloud platform.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products