WO2005024630A1 - 不正コード実行の防止方法および防止プログラム - Google Patents
不正コード実行の防止方法および防止プログラム Download PDFInfo
- Publication number
- WO2005024630A1 WO2005024630A1 PCT/JP2004/012858 JP2004012858W WO2005024630A1 WO 2005024630 A1 WO2005024630 A1 WO 2005024630A1 JP 2004012858 W JP2004012858 W JP 2004012858W WO 2005024630 A1 WO2005024630 A1 WO 2005024630A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- program
- return address
- address
- execution
- stack
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1405—Saving, restoring, recovering or retrying at machine instruction level
- G06F11/141—Saving, restoring, recovering or retrying at machine instruction level for bus or memory accesses
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/3648—Software debugging using additional hardware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Debugging And Monitoring (AREA)
- Executing Machine-Instructions (AREA)
- Storage Device Security (AREA)
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04772807A EP1662379A4 (en) | 2003-09-04 | 2004-09-03 | FALSE COORDINATE PROCEDURE AND PREVENTION PROGRAM |
JP2005513686A JP4518564B2 (ja) | 2003-09-04 | 2004-09-03 | 不正コード実行の防止方法、不正コード実行の防止用プログラム、及び不正コード実行の防止用プログラムの記録媒体 |
US10/570,502 US8042179B2 (en) | 2003-09-04 | 2004-09-03 | False code execution prevention method, program for the method, and recording medium for recording the program |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2003312517 | 2003-09-04 | ||
JP2003-312517 | 2003-09-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005024630A1 true WO2005024630A1 (ja) | 2005-03-17 |
Family
ID=34269739
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/012858 WO2005024630A1 (ja) | 2003-09-04 | 2004-09-03 | 不正コード実行の防止方法および防止プログラム |
Country Status (6)
Country | Link |
---|---|
US (1) | US8042179B2 (ja) |
EP (1) | EP1662379A4 (ja) |
JP (1) | JP4518564B2 (ja) |
KR (1) | KR100777938B1 (ja) |
CN (1) | CN1886728A (ja) |
WO (1) | WO2005024630A1 (ja) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008083382A1 (en) * | 2006-12-29 | 2008-07-10 | Microsoft Corporation | Automatic vulnerability detection and response |
JP2010224908A (ja) * | 2009-03-24 | 2010-10-07 | Fujitsu Semiconductor Ltd | 情報処理装置およびデータ修復方法 |
JP4572259B1 (ja) * | 2009-04-27 | 2010-11-04 | 株式会社フォティーンフォティ技術研究所 | 情報機器、プログラム及び不正なプログラムコードの実行防止方法 |
US8141163B2 (en) * | 2007-07-31 | 2012-03-20 | Vmware, Inc. | Malicious code detection |
WO2015044993A1 (ja) * | 2013-09-24 | 2015-04-02 | 株式会社 エーティーティーコンサルティング | プロセッサ、処理装置、プログラム作成方法 |
JP2017123119A (ja) * | 2016-01-08 | 2017-07-13 | 株式会社デンソー | 電子制御装置 |
WO2021059478A1 (ja) * | 2019-09-27 | 2021-04-01 | 日本電気株式会社 | 情報処理装置、情報処理方法、及び、プログラムが記録された非一時的なコンピュータ可読媒体 |
Families Citing this family (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7971255B1 (en) * | 2004-07-15 | 2011-06-28 | The Trustees Of Columbia University In The City Of New York | Detecting and preventing malcode execution |
JP3768516B1 (ja) * | 2004-12-03 | 2006-04-19 | 株式会社ソニー・コンピュータエンタテインメント | マルチプロセッサシステムとそのシステムにおけるプログラム実行方法 |
US7849444B2 (en) * | 2004-12-21 | 2010-12-07 | National Instruments Corporation | Test executive with buffer overwrite detection for parameters of user-supplied code modules |
US7607122B2 (en) * | 2005-06-17 | 2009-10-20 | Microsoft Corporation | Post build process to record stack and call tree information |
US7930733B1 (en) * | 2006-04-10 | 2011-04-19 | At&T Intellectual Property Ii, L.P. | Method and system for execution monitor-based trusted computing |
US20080148399A1 (en) * | 2006-10-18 | 2008-06-19 | Microsoft Corporation | Protection against stack buffer overrun exploitation |
FR2910144A1 (fr) * | 2006-12-18 | 2008-06-20 | St Microelectronics Sa | Procede et dispositif de detection errones au cours de l'execution d'un programme. |
CN101241464B (zh) * | 2007-02-05 | 2010-08-18 | 中兴通讯股份有限公司 | 一种检测堆栈帧破坏的方法 |
CN101295278B (zh) * | 2007-04-23 | 2010-08-11 | 大唐移动通信设备有限公司 | 定位被改写代码段所在进程的方法及装置 |
CN101414340B (zh) * | 2007-10-15 | 2015-12-02 | 北京瑞星信息技术有限公司 | 一种防止远程线程启动的方法 |
US8352921B2 (en) * | 2007-11-02 | 2013-01-08 | Klocwork Corp. | Static analysis defect detection in the presence of virtual function calls |
US8099636B2 (en) * | 2008-07-15 | 2012-01-17 | Caterpillar Inc. | System and method for protecting memory stacks using a debug unit |
TW201128383A (en) * | 2009-07-29 | 2011-08-16 | Reversinglabs Corp | Portable executable file analysis |
US20120227033A1 (en) * | 2011-03-02 | 2012-09-06 | Lei Yu | Method and apparatus for evaluating software performance |
US8935674B2 (en) * | 2012-08-15 | 2015-01-13 | International Business Machines Corporation | Determining correctness conditions for use in static analysis |
US20140283060A1 (en) * | 2013-03-15 | 2014-09-18 | Oracle International Corporation | Mitigating vulnerabilities associated with return-oriented programming |
CN103514405B (zh) * | 2013-07-08 | 2016-08-10 | 北京深思数盾科技股份有限公司 | 一种缓冲区溢出的检测方法及系统 |
CN103559439A (zh) * | 2013-11-19 | 2014-02-05 | 浪潮(北京)电子信息产业有限公司 | 一种缓冲区溢出检测方法及系统 |
US9245110B2 (en) | 2013-12-17 | 2016-01-26 | International Business Machines Corporation | Stack entry overwrite protection |
US9703948B2 (en) * | 2014-03-28 | 2017-07-11 | Intel Corporation | Return-target restrictive return from procedure instructions, processors, methods, and systems |
CN105426752A (zh) * | 2015-11-24 | 2016-03-23 | 无锡江南计算技术研究所 | 缓冲区溢出保护方法 |
CN106203069B (zh) * | 2016-06-27 | 2019-10-15 | 珠海豹趣科技有限公司 | 一种动态链接库文件的拦截方法、装置及终端设备 |
US10540498B2 (en) * | 2016-08-12 | 2020-01-21 | Intel Corporation | Technologies for hardware assisted native malware detection |
US10481999B2 (en) | 2016-12-05 | 2019-11-19 | Microsoft Technology Licensing, Llc | Partial process recording |
US10467407B2 (en) * | 2017-03-30 | 2019-11-05 | Check Point Advanced Threat Prevention Ltd. | Method and system for detecting kernel corruption exploits |
US10613864B2 (en) * | 2018-03-16 | 2020-04-07 | Texas Instruments Incorporated | Processor with hardware supported memory buffer overflow detection |
CN109033821A (zh) * | 2018-07-12 | 2018-12-18 | 郑州云海信息技术有限公司 | 一种栈溢出攻击防护系统及方法 |
JP2022502723A (ja) * | 2018-10-18 | 2022-01-11 | スターナム リミテッドSternum Ltd. | スタック破損のエクスプロイトに対する中間コードファイルにおけるセキュリティ緩和手段の適用 |
US11182472B2 (en) * | 2019-09-30 | 2021-11-23 | Vmware, Inc. | Security in a computing environment by monitoring expected operation of processes within the computing environment |
CN112784261B (zh) * | 2021-01-04 | 2023-10-27 | 北京蓝军网安科技发展有限责任公司 | 用于程序运行的方法及相应的系统、计算机设备和介质 |
US11900154B2 (en) * | 2021-03-08 | 2024-02-13 | Dell Products L.P. | Enabling modern standby for unsupported applications |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH02304635A (ja) * | 1989-05-19 | 1990-12-18 | Pfu Ltd | プログラム暴走検知方法 |
JPH09128267A (ja) * | 1995-10-31 | 1997-05-16 | Nec Corp | データ処理装置およびデータ処理方法 |
JP2001511271A (ja) * | 1997-01-15 | 2001-08-07 | シーメンス アクチエンゲゼルシヤフト | ソフトウェアプログラムの規定通りの実行を監視するための方法 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH03175537A (ja) * | 1989-12-04 | 1991-07-30 | Nec Corp | デバッグ用マイクロプロセッサのエラー制御装置 |
JPH05216717A (ja) * | 1992-01-31 | 1993-08-27 | Nec Corp | デバッガのトレース機能 |
JPH09128277A (ja) * | 1995-10-27 | 1997-05-16 | Nec Software Ltd | 複数os搭載システムにおけるファイル管理方式 |
JPH11120028A (ja) * | 1997-10-13 | 1999-04-30 | Nec Corp | プログラム移植サポート方式 |
JP3339482B2 (ja) * | 1999-12-15 | 2002-10-28 | 日本電気株式会社 | 分散デバッグ装置及びデバッグ方法並びに制御プログラムを記録した記録媒体 |
JP3552627B2 (ja) * | 2000-02-04 | 2004-08-11 | インターナショナル・ビジネス・マシーンズ・コーポレーション | スタック保護システム、コンピュータシステム、コンパイラ、スタック保護方法および記憶媒体 |
US6915416B2 (en) * | 2000-12-28 | 2005-07-05 | Texas Instruments Incorporated | Apparatus and method for microcontroller debugging |
CA2345416C (en) * | 2001-04-27 | 2005-05-03 | Ibm Canada Limited-Ibm Canada Limitee | High performance debugging in a message flow environment |
US6947047B1 (en) * | 2001-09-20 | 2005-09-20 | Nvidia Corporation | Method and system for programmable pipelined graphics processing with branching instructions |
US7853803B2 (en) * | 2001-09-28 | 2010-12-14 | Verizon Corporate Services Group Inc. | System and method for thwarting buffer overflow attacks using encrypted process pointers |
US7243340B2 (en) * | 2001-11-15 | 2007-07-10 | Pace Anti-Piracy | Method and system for obfuscation of computer program execution flow to increase computer program security |
US20030126590A1 (en) * | 2001-12-28 | 2003-07-03 | Michael Burrows | System and method for dynamic data-type checking |
US6996677B2 (en) * | 2002-11-25 | 2006-02-07 | Nortel Networks Limited | Method and apparatus for protecting memory stacks |
-
2004
- 2004-09-03 JP JP2005513686A patent/JP4518564B2/ja active Active
- 2004-09-03 US US10/570,502 patent/US8042179B2/en active Active
- 2004-09-03 EP EP04772807A patent/EP1662379A4/en not_active Withdrawn
- 2004-09-03 CN CNA2004800289891A patent/CN1886728A/zh active Pending
- 2004-09-03 KR KR1020067003788A patent/KR100777938B1/ko active IP Right Grant
- 2004-09-03 WO PCT/JP2004/012858 patent/WO2005024630A1/ja active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH02304635A (ja) * | 1989-05-19 | 1990-12-18 | Pfu Ltd | プログラム暴走検知方法 |
JPH09128267A (ja) * | 1995-10-31 | 1997-05-16 | Nec Corp | データ処理装置およびデータ処理方法 |
JP2001511271A (ja) * | 1997-01-15 | 2001-08-07 | シーメンス アクチエンゲゼルシヤフト | ソフトウェアプログラムの規定通りの実行を監視するための方法 |
Non-Patent Citations (4)
Title |
---|
COWAN C.: "Darpa Information Survivability Conference and Exposition, 2000, DISCE X '00, Proceedings Hilton Head, SC, USA 25-27 Jan. 2000, Las Alamitos, CA, USA, IEEE Comput. SOC", vol. 2, 25 January 2000, article "Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade", pages: 119 - 129 |
JUN XU ET AL.: "Architecture Support for Defending against Buffer-Overflow Attacks", CRHC TECHNICAL REPORT, July 2002 (2002-07-01), pages 1 - 18 |
See also references of EP1662379A4 |
SKADRON, E. ET AL.: "Improving Prediction for Procedure Returns with Re turn-Address-Stack Repair Mechanisms", MICRO-31. PROCEEDINGS OF THE 31ST. ANNUAL ACM/IEEE INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, 30 November 1998 (1998-11-30) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008083382A1 (en) * | 2006-12-29 | 2008-07-10 | Microsoft Corporation | Automatic vulnerability detection and response |
US8453245B2 (en) | 2006-12-29 | 2013-05-28 | Microsoft Corporation | Automatic vulnerability detection and response |
US8141163B2 (en) * | 2007-07-31 | 2012-03-20 | Vmware, Inc. | Malicious code detection |
JP2010224908A (ja) * | 2009-03-24 | 2010-10-07 | Fujitsu Semiconductor Ltd | 情報処理装置およびデータ修復方法 |
JP4572259B1 (ja) * | 2009-04-27 | 2010-11-04 | 株式会社フォティーンフォティ技術研究所 | 情報機器、プログラム及び不正なプログラムコードの実行防止方法 |
JP2010257275A (ja) * | 2009-04-27 | 2010-11-11 | Fourteenforty Research Institute Inc | 情報機器、プログラム及び不正なプログラムコードの実行防止方法 |
WO2015044993A1 (ja) * | 2013-09-24 | 2015-04-02 | 株式会社 エーティーティーコンサルティング | プロセッサ、処理装置、プログラム作成方法 |
JP2017123119A (ja) * | 2016-01-08 | 2017-07-13 | 株式会社デンソー | 電子制御装置 |
WO2021059478A1 (ja) * | 2019-09-27 | 2021-04-01 | 日本電気株式会社 | 情報処理装置、情報処理方法、及び、プログラムが記録された非一時的なコンピュータ可読媒体 |
JPWO2021059478A1 (ja) * | 2019-09-27 | 2021-04-01 | ||
JP7283552B2 (ja) | 2019-09-27 | 2023-05-30 | 日本電気株式会社 | 情報処理装置、情報処理方法、及び、プログラム |
Also Published As
Publication number | Publication date |
---|---|
KR20060056998A (ko) | 2006-05-25 |
JPWO2005024630A1 (ja) | 2007-11-08 |
KR100777938B1 (ko) | 2007-11-21 |
EP1662379A1 (en) | 2006-05-31 |
JP4518564B2 (ja) | 2010-08-04 |
US20070101317A1 (en) | 2007-05-03 |
CN1886728A (zh) | 2006-12-27 |
US8042179B2 (en) | 2011-10-18 |
EP1662379A4 (en) | 2008-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005024630A1 (ja) | 不正コード実行の防止方法および防止プログラム | |
RU2637997C1 (ru) | Система и способ обнаружения вредоносного кода в файле | |
US7996904B1 (en) | Automated unpacking of executables packed by multiple layers of arbitrary packers | |
Castro et al. | Fast byte-granularity software fault isolation | |
Guo et al. | A study of the packer problem and its solutions | |
US11106792B2 (en) | Methods and systems for performing a dynamic analysis of applications for protecting devices from malwares | |
US9275229B2 (en) | System to bypass a compromised mass storage device driver stack and method thereof | |
Volckaert et al. | Cloning your gadgets: Complete ROP attack immunity with multi-variant execution | |
Wojtczuk | Subverting the Xen hypervisor | |
Lanzi et al. | K-Tracer: A System for Extracting Kernel Malware Behavior. | |
US8510828B1 (en) | Enforcing the execution exception to prevent packers from evading the scanning of dynamically created code | |
RU2472215C1 (ru) | Способ выявления неизвестных программ с использованием эмуляции процесса загрузки | |
US8104089B1 (en) | Tracking memory mapping to prevent packers from evading the scanning of dynamically created code | |
JP2018041438A5 (ja) | ||
US7284276B2 (en) | Return-to-LIBC attack detection using branch trace records system and method | |
Kawakoya et al. | Api chaser: Anti-analysis resistant malware analyzer | |
Böhne | Pandora’s bochs: Automatic unpacking of malware | |
WO2004075060A1 (ja) | コンピュータウィルス検出装置 | |
US8819822B1 (en) | Security method for detecting intrusions that exploit misinterpretation of supplied data | |
Gupta et al. | Dynamic code instrumentation to detect and recover from return address corruption | |
Shields | Anti-debugging–a developers view | |
Singh | Breaking the sandbox | |
Harbour | Stealth secrets of the malware ninjas | |
EP3293660A1 (en) | System and method of detecting malicious code in files | |
Kawakoya et al. | Stealth loader: Trace-free program loading for analysis evasion |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200480028989.1 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005513686 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020067003788 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004772807 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2004772807 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007101317 Country of ref document: US Ref document number: 10570502 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 10570502 Country of ref document: US |