CA2418935A1 - Systeme et methode d'empecher le depassement de capacite de memoire tampon et les attaques par code etranger - Google Patents

Systeme et methode d'empecher le depassement de capacite de memoire tampon et les attaques par code etranger Download PDF

Info

Publication number
CA2418935A1
CA2418935A1 CA002418935A CA2418935A CA2418935A1 CA 2418935 A1 CA2418935 A1 CA 2418935A1 CA 002418935 A CA002418935 A CA 002418935A CA 2418935 A CA2418935 A CA 2418935A CA 2418935 A1 CA2418935 A1 CA 2418935A1
Authority
CA
Canada
Prior art keywords
encoding
data
encodings
memory
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002418935A
Other languages
English (en)
Inventor
Harold J. Johnson
Stanley T. Chow
Alexander Main
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cloakware Corp
Original Assignee
Cloakware Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CA002372034A external-priority patent/CA2372034A1/fr
Application filed by Cloakware Corp filed Critical Cloakware Corp
Priority to CA002418935A priority Critical patent/CA2418935A1/fr
Publication of CA2418935A1 publication Critical patent/CA2418935A1/fr
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
CA002418935A 2002-02-14 2003-02-14 Systeme et methode d'empecher le depassement de capacite de memoire tampon et les attaques par code etranger Abandoned CA2418935A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA002418935A CA2418935A1 (fr) 2002-02-14 2003-02-14 Systeme et methode d'empecher le depassement de capacite de memoire tampon et les attaques par code etranger

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CA2,372,034 2002-02-14
CA002372034A CA2372034A1 (fr) 2002-02-14 2002-02-14 Systeme de protection permettant de contrecarrer les attaques par surcharge des memoires tampons et par codes etrangers au moyen du codage
CA002418935A CA2418935A1 (fr) 2002-02-14 2003-02-14 Systeme et methode d'empecher le depassement de capacite de memoire tampon et les attaques par code etranger

Publications (1)

Publication Number Publication Date
CA2418935A1 true CA2418935A1 (fr) 2003-08-14

Family

ID=27789585

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002418935A Abandoned CA2418935A1 (fr) 2002-02-14 2003-02-14 Systeme et methode d'empecher le depassement de capacite de memoire tampon et les attaques par code etranger

Country Status (1)

Country Link
CA (1) CA2418935A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959860A (zh) * 2018-07-20 2018-12-07 厦门市美亚柏科信息股份有限公司 一种检测Android系统是否被破解和破解记录获取方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959860A (zh) * 2018-07-20 2018-12-07 厦门市美亚柏科信息股份有限公司 一种检测Android系统是否被破解和破解记录获取方法

Similar Documents

Publication Publication Date Title
US7730322B2 (en) System and method of foiling buffer-overflow and alien-code attacks
Bhatkar et al. Address obfuscation: An efficient approach to combat a broad range of memory error exploits
Chen et al. Defeating memory corruption attacks via pointer taintedness detection
Xu et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks.
Kiriansky et al. Secure execution via program shepherding
CA2543572C (fr) Machine virtuelle securisee inviolable
Barrantes et al. Randomized instruction set emulation
EP1410150B1 (fr) Protection d'applications logicielles contre le piratage de logiciels
Younan et al. Runtime countermeasures for code injection attacks against C and C++ programs
EP1376310A2 (fr) Bibliothèque de types sécurisée et opaque permettant la protection sécurisée des données variables
US6862683B1 (en) Method and system for protecting native libraries
US8225290B2 (en) Systems and methods for regulating execution of computer software
Cavallaro et al. Anti-taint-analysis: Practical evasion techniques against information flow based malware defense
Shi et al. InfoShield: A security architecture for protecting information usage in memory
US11361070B1 (en) Protecting devices from remote code execution attacks
WO2023031679A1 (fr) Systèmes et procédés d'inhibition d'exploitation dans des environnements d'exécution
Zonouz et al. Dynamic memory protection via Intel SGX-supported heap allocation
CA2418935A1 (fr) Systeme et methode d'empecher le depassement de capacite de memoire tampon et les attaques par code etranger
Xu et al. Toward a secure android software protection system
Xu et al. A unified approach for preventing attacks exploiting a range of software vulnerabilities
Aga Thwarting Advanced Code-reuse Attacks
Kisore et al. FFRR: a software diversity technique for defending against buffer overflow attacks
Oyama et al. Prevention of code-injection attacks by encrypting system call arguments
Bhuse et al. Support for Secure Code Execution in Unix-Like Operating Systems
EP1637959A2 (fr) Systèmes et procédés pour empêcher lýutilisation non autorisée de contenus numériques

Legal Events

Date Code Title Description
FZDE Dead