Return-Oriented Programming as an Obfuscation Technique
A technology of target operation and instruction set, applied in the direction of program control design, program/content distribution protection, instruments, etc., can solve problems such as hindering interception attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] It should be readily understood that the components of the various embodiments described herein and shown in the accompanying drawings may be designed and configured in various configurations. Therefore, various embodiments described in detail below are not intended to limit the scope of the present invention, but merely represent various embodiments. While the various aspects of the embodiments are presented in drawings, these drawings are not necessarily drawn to scale.
[0017] The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The embodiments described herein are only used to illustrate the present invention and not to limit the present invention. Accordingly, the scope of the invention is defined by the appended claims rather than by the detailed description. Any changes made within the protection scope of the present invention are included in the protection scope of the present invention....
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com