A method and device for locating buffer overflow vulnerabilities
A technology of buffer overflow and positioning method, which is applied in the field of information security, can solve the problems of function call relationship loss, dependence, false positives, etc., and achieve the effect of fast positioning, fast overflow function and overflow address
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.
[0053] The idea of the present invention is to use the expired data on the stack to reconstruct the function call relationship to locate the overflow function, which is essentially different from the conventional stack backtracking method and the prior mapping method of the function call flow chart. Since the change of the expired data on the stack itself is chaotic, some conventional methods are not aware of the effect of the expired data on the stack. The present invention proposes a A new way to quickly locate overflowing functions.
[0054] In the present invention, the function call that causes buffer overflow is called "overflow function".
[0055] In the present invention, for the situation that the stack grows from a high address to a low address in the memory, "expired data" refers to the data stored in those memory units whose address is ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com