[go: up one dir, main page]

SG10201701541SA - Device and method for reinforcing control flow integrity of software application - Google Patents

Device and method for reinforcing control flow integrity of software application

Info

Publication number
SG10201701541SA
SG10201701541SA SG10201701541SA SG10201701541SA SG10201701541SA SG 10201701541S A SG10201701541S A SG 10201701541SA SG 10201701541S A SG10201701541S A SG 10201701541SA SG 10201701541S A SG10201701541S A SG 10201701541SA SG 10201701541S A SG10201701541S A SG 10201701541SA
Authority
SG
Singapore
Prior art keywords
control flow
software application
flow integrity
reinforcing control
reinforcing
Prior art date
Application number
SG10201701541SA
Inventor
Ting Dai
Yongzheng Wu
Original Assignee
Huawei Int Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Int Pte Ltd filed Critical Huawei Int Pte Ltd
Priority to SG10201701541SA priority Critical patent/SG10201701541SA/en
Priority to PCT/SG2018/050086 priority patent/WO2018156085A1/en
Priority to BR112019017714A priority patent/BR112019017714A2/en
Priority to EP18709410.7A priority patent/EP3580680B1/en
Priority to CN201880013935.XA priority patent/CN110325994B/en
Publication of SG10201701541SA publication Critical patent/SG10201701541SA/en
Priority to US16/552,534 priority patent/US11429511B2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Prevention of errors by analysis, debugging or testing of software
    • G06F11/3604Analysis of software for verifying properties of programs
    • G06F11/3612Analysis of software for verifying properties of programs by runtime analysis
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Prevention of errors by analysis, debugging or testing of software
    • G06F11/362Debugging of software
    • G06F11/3636Debugging of software by tracing the execution of the program
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Prevention of errors by analysis, debugging or testing of software
    • G06F11/362Debugging of software
    • G06F11/3644Debugging of software by instrumenting at runtime
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Debugging And Monitoring (AREA)
  • Stored Programmes (AREA)
  • Devices For Executing Special Programs (AREA)
  • Document Processing Apparatus (AREA)
  • Programmable Controllers (AREA)

Abstract

DEVICE AND METHOD FOR REINFORCING CONTROL FLOW INTEGRITY OF SOFTWARE APPLICATION This document describes a device and method for a device to reinforce the control flow integrity of a software application as the application is being executed on the device. FIGURE 3
SG10201701541SA 2017-02-27 2017-02-27 Device and method for reinforcing control flow integrity of software application SG10201701541SA (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
SG10201701541SA SG10201701541SA (en) 2017-02-27 2017-02-27 Device and method for reinforcing control flow integrity of software application
PCT/SG2018/050086 WO2018156085A1 (en) 2017-02-27 2018-02-26 Device and method for reinforcing control flow integrity of software application
BR112019017714A BR112019017714A2 (en) 2017-02-27 2018-02-26 Device and method for enforcing software application control flow integrity
EP18709410.7A EP3580680B1 (en) 2017-02-27 2018-02-26 Device and method for reinforcing control flow integrity of software application
CN201880013935.XA CN110325994B (en) 2017-02-27 2018-02-26 Apparatus and method for enhancing control flow integrity of software applications
US16/552,534 US11429511B2 (en) 2017-02-27 2019-08-27 Device and method for reinforcing control flow integrity of software application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SG10201701541SA SG10201701541SA (en) 2017-02-27 2017-02-27 Device and method for reinforcing control flow integrity of software application

Publications (1)

Publication Number Publication Date
SG10201701541SA true SG10201701541SA (en) 2018-09-27

Family

ID=61581698

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201701541SA SG10201701541SA (en) 2017-02-27 2017-02-27 Device and method for reinforcing control flow integrity of software application

Country Status (6)

Country Link
US (1) US11429511B2 (en)
EP (1) EP3580680B1 (en)
CN (1) CN110325994B (en)
BR (1) BR112019017714A2 (en)
SG (1) SG10201701541SA (en)
WO (1) WO2018156085A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11687646B2 (en) * 2019-08-15 2023-06-27 Dellfer, Inc. Forensic data collection and analysis utilizing function call stacks
CN112668004B (en) * 2019-10-16 2022-06-21 武汉斗鱼网络科技有限公司 LLVM-based function verification method and related device
CN111898130B (en) * 2020-06-28 2024-01-19 中国科学院信息工程研究所 Method and system for realizing integrity protection of fine-grained control flow
CN112799725B (en) * 2020-10-30 2024-03-26 航天东方红卫星有限公司 A design method for command control data block function suitable for satellite models
US12008149B2 (en) * 2020-12-16 2024-06-11 International Business Machines Corporation Method and system for on demand control of hardware support for software pointer authentification in a computing system
CN118339552A (en) * 2021-12-08 2024-07-12 高通股份有限公司 Method for improving security of computing device implementing control flow integrity
US20250013605A1 (en) * 2023-07-05 2025-01-09 American Express Travel Related Services Company, Inc. Automated conversion of big data queries and scripts

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7577992B2 (en) 2005-01-14 2009-08-18 Microsoft Corporation Software security based on control flow integrity
EP1870829B1 (en) * 2006-06-23 2014-12-03 Microsoft Corporation Securing software by enforcing data flow integrity
US8341613B2 (en) * 2007-12-04 2012-12-25 International Business Machines Corporation Reducing stack space consumption via head-call optimization
US8117660B2 (en) 2008-06-19 2012-02-14 Microsoft Corporation Secure control flows by monitoring control transfers
US8504839B2 (en) * 2008-10-27 2013-08-06 Advanced Micro Devices, Inc. Method, apparatus, and device for protecting against programming attacks and/or data corruption
US20100192026A1 (en) * 2009-01-27 2010-07-29 Microsoft Corporation Implementations of program runtime checks
KR20140053754A (en) * 2010-03-25 2014-05-08 어데토 캐나다 코포레이션 System and method for dynamic, variably-timed operation paths as a resistance to side channel and repeated invocation attacks
US9798873B2 (en) * 2011-08-04 2017-10-24 Elwha Llc Processor operable to ensure code integrity
US20130024676A1 (en) * 2011-07-19 2013-01-24 Glew Andrew F Control flow integrity
US8930714B2 (en) * 2011-07-19 2015-01-06 Elwha Llc Encrypted memory
US11003464B2 (en) * 2012-04-19 2021-05-11 Microsoft Technology Licensing, Llc Control flow integrity enforcement at scale
CN103345445A (en) * 2013-07-02 2013-10-09 华中科技大学 Security chip design method based on control flow detection and resistant to error injection attack
AU2014348812B2 (en) * 2013-11-12 2019-09-26 RunSafe Security, Inc. Improved control flow integrity system and method
US9361102B2 (en) * 2014-06-09 2016-06-07 Lehigh University Methods for enforcing control flow of a computer program
US9390260B2 (en) 2014-06-09 2016-07-12 Lehigh University Methods for enforcing control flow of a computer program
US9767004B2 (en) * 2014-06-16 2017-09-19 Symantec Corporation Dynamic call tracking method based on CPU interrupt instructions to improve disassembly quality of indirect calls
US9569613B2 (en) * 2014-12-23 2017-02-14 Intel Corporation Techniques for enforcing control flow integrity using binary translation
US9767292B2 (en) * 2015-10-11 2017-09-19 Unexploitable Holdings Llc Systems and methods to identify security exploits by generating a type based self-assembling indirect control flow graph
CN105868626B (en) * 2016-03-25 2018-10-02 中国人民解放军信息工程大学 The method of monitoring software business conduct based on control stream coarseness integrality
CN106021110B (en) * 2016-05-24 2019-03-26 南京大学 Code huge profit attack detection method based on virtual table inheritance
CN106295258B (en) * 2016-08-04 2019-03-26 南京大学 For the shadow stack implementation method of integrity protection to be flowed after multithreading to control
US10372902B2 (en) * 2017-03-06 2019-08-06 Intel Corporation Control flow integrity

Also Published As

Publication number Publication date
CN110325994A (en) 2019-10-11
CN110325994B (en) 2023-09-22
BR112019017714A2 (en) 2022-03-22
EP3580680A1 (en) 2019-12-18
US11429511B2 (en) 2022-08-30
US20190384693A1 (en) 2019-12-19
WO2018156085A1 (en) 2018-08-30
EP3580680B1 (en) 2023-10-25

Similar Documents

Publication Publication Date Title
SG10201701541SA (en) Device and method for reinforcing control flow integrity of software application
MX2022013057A (en) System and method for controlling a vehicle.
MX2017012830A (en) Vehicle assistance.
GB2559895A (en) Field equipment model driven system
EP3399376A4 (en) METHOD AND COMPUTER PROGRAM FOR CONTROLLING INSTALLATION ANOMALIES FOR THE CONTROL OF INSTALLATION ANOMALIES
EP3243137A4 (en) Generating and executing a control flow
SA516380234B1 (en) Methods and Apparatus to Partial Stroke Test Valves Using Pressure Control
MX2017002559A (en) Autonomous vehicle control transitioning.
GB2543900A (en) Distributed big data in a process control system
EP3154749A4 (en) System and method for reinforcing programming education through robotic feedback
DE112018003927A5 (en) METHOD FOR REGULATING THE OUTPUT PRESSURE OF A HYDRAULIC DRIVE SYSTEM, USE OF THE METHOD AND HYDRAULIC DRIVE SYSTEM
EP3494262A4 (en) PIPELINE CONTROL SYSTEM, METHOD AND DEVICE FOR PREVENTING REPEATED USE OF A DEVICE WITH FEEDBACK
NZ729814A (en) Water management system and method
EP3445602A4 (en) THROTTLE VALVE CONTROL SYSTEM AND METHOD
AR105335A1 (en) ANTI-SORTILINE MONOCLONAL ANTIBODIES
EP3657304A4 (en) Input device, input device control method, and control program
EP3695060C0 (en) Drinking water supply system with pressure control function, method for controlling same, and computer program
WO2019053273A8 (en) Vibro-tactile feedback method and device
MX2020004448A (en) Threaded joint for pipes and method for producing threaded joint for pipes.
PL3420632T3 (en) System and method for an integrated control system for a diesel generating set
GB2583391B (en) Control method and computer program
EP3406879A4 (en) Waste gate valve control method and control device
GB202109559D0 (en) Well annular back pressure control system having one or more adjustable choke valves and method thereof
WO2014138650A3 (en) Extended length packer with timed setting
PT3887112T (en) Method to control a mixer and corresponding mixer