Method for protecting overflow of buffer zone
A buffer overflow and buffer technology, which is used in program/content distribution protection, instruments, electrical digital data processing, etc., can solve problems such as time-consuming writing process, inability to completely solve buffer overflow, and system reduction.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0013] The invention provides a buffer overflow protection method, which is mainly realized through a non-executable buffer. By making the data segment address space of the attacked program non-executable, it is impossible for the attacker to execute the code implanted in the input buffer of the attacked program. This technique is called non-executable buffer technology.
[0014] In fact, many old Unix systems are designed in this way, but recent Unix and MSWindows systems often dynamically put executable code in the data segment in order to achieve better performance and functions. Therefore, in order to maintain the compatibility of the program, it is impossible to make the data segment of all programs non-executable. But we can set the stack data segment to be non-executable, so that the compatibility of the program can be guaranteed to the greatest extent. Both Linux and Solaris have released kernel patches for this. Because almost no suitable program will store code on ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com