Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting overflow of buffer zone

A buffer overflow and buffer technology, which is used in program/content distribution protection, instruments, electrical digital data processing, etc., can solve problems such as time-consuming writing process, inability to completely solve buffer overflow, and system reduction.

Inactive Publication Date: 2009-01-21
SHANGHAI MINHANG HIGH SCHOOL +1
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a buffer overflow protection method, which mainly solves the existing method of writing correct codes. Not only is the writing process very time-consuming, but it still cannot completely solve the technical problem of buffer overflow. Probability of system being attacked due to buffer overflow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The invention provides a buffer overflow protection method, which is mainly realized through a non-executable buffer. By making the data segment address space of the attacked program non-executable, it is impossible for the attacker to execute the code implanted in the input buffer of the attacked program. This technique is called non-executable buffer technology.

[0014] In fact, many old Unix systems are designed in this way, but recent Unix and MSWindows systems often dynamically put executable code in the data segment in order to achieve better performance and functions. Therefore, in order to maintain the compatibility of the program, it is impossible to make the data segment of all programs non-executable. But we can set the stack data segment to be non-executable, so that the compatibility of the program can be guaranteed to the greatest extent. Both Linux and Solaris have released kernel patches for this. Because almost no suitable program will store code on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for protecting the readin and the readout of computer information, in particular to a method for protecting buffer overflow. The method is mainly realized through a non-executive buffer area, and attackers can not execute a code of an input baffle area which is implanted with an attacked program through enabling the data segment address space of the attacked program to be non-executive. The method of the invention mainly solves the technical problems of a method which is realized through compiling a correct code that not only the compiling procedure wastes time, but also the buffer overflow can not be completely solved, and the probability that a system is attacked due to the buffer overflow is lowered.

Description

technical field [0001] The invention relates to a protection method for reading in and out of computer information, in particular to a protection method for buffer overflow. Background technique [0002] A buffer is where data is stored in memory. A buffer overflow occurs when a program tries to put data somewhere in the computer's memory, but there is not enough room. [0003] A buffer is a contiguous block of computer memory that holds data of a given type while the program is running. The problem arises with dynamically allocating variables. In order not to use too much memory, a program with dynamically allocated variables decides how much memory to allocate to them when the program is running. What happens if the program puts too much data in the dynamically allocated buffer? It overflowed and leaked elsewhere. A buffer overflow application uses this overflowed data to place assembly language code in the computer's memory, usually where root privileges are generate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/12
Inventor 项敏沈杰
Owner SHANGHAI MINHANG HIGH SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products