Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control flow integrity protection method, system and device and readable storage medium

A technology of integrity protection and control flow, applied in the field of cyberspace security, to achieve the effects of high security performance, improved analysis accuracy, and improved accuracy

Active Publication Date: 2021-06-15
XIDIAN UNIV
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problems existing in the prior art, the present invention provides a control flow integrity protection method, system, device and readable storage medium to solve the existing When the source point information is used as the context information in the existing tech

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control flow integrity protection method, system and device and readable storage medium
  • Control flow integrity protection method, system and device and readable storage medium
  • Control flow integrity protection method, system and device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0077] This embodiment belongs to the field of cyberspace security and relates to the protection of malicious attacks. Specifically, it is a context-sensitive control flow integrity protection method based on an LLVM compiler, which can be used to protect the security of system software.

[0078] as attached Figure 1-3 As shown, this embodiment provides a control flow integrity protection method and system, based on the LLVM compiler, using an open source SVF tool to statically analyze the intermediate code of the program to be protected, and obtain the control flow graph of the program to be protected; wherein, The position information of the function pointer in the global variable and the source point information of the function pointer are recorded in the control flow graph of the program to be protected; the program to be protected is modified by modifying the LLVM compiler, and the function of Intel MPX (MemoryProtection eXtensions) is used to record the information to be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a control flow integrity protection method, system and device and a readable storage medium, and the method comprises the steps of obtaining a control flow diagram of a to-be-protected program, and recording the position information and source point information of a function pointer; importing the control flow diagram into a to-be-protected program; obtaining context information during program operation by using store instruction instrumentation, and storing the context information in an MPX table; inquiring the MPX table through indirect calling instruction instrumentation, obtaining context information, and verifying legality of a jump target of actual operation of the program. The invention comprises recording position information and source point information of a function pointer by using a control flow diagram; verifying the legality of a control flow jump target through store instruction instrumentation; performing the operation in an intermediate code layer of the program without modifying a program source code. The analysis precision is effectively improved through store instruction instrumentation, the source point information of the function pointer in the composite type can be processed, the instruction for indirect jumping through the function pointer in the global variable is processed, the safety parameter is small, and the safety performance is high.

Description

technical field [0001] The invention belongs to the technical field of network space security, relates to the protection of malicious attacks, and in particular to a control flow integrity protection method, system, device and readable storage medium. Background technique [0002] Control-Flow Integrity Protection (CFI, Control-Flow Integrity) is a technology to defend against control-flow hijacking attacks. It generates control flow graphs by analyzing program source code or intermediate code, so that each indirect control flow transfer instruction or jump instruction (indirect call / indirect jmp / ret) corresponds to a valid target set, and the target legitimacy of each indirect jump instruction is guaranteed when the program is running; therefore, the more accurate the control flow graph, the better the protection effect of CFI; and the use of context information , which can effectively improve the accuracy of control flow integrity protection. [0003] At present, industry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/52
CPCG06F21/52
Inventor 李金库李睿向昊姚青松马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products