Stack buffer overflow attack defense method and system based on dynamic shadow stack
A buffer overflow and shadow stack technology, applied in transmission systems, digital transmission systems, and the input/output process of data processing, etc., can solve problems such as tampering, and achieve the effect of improving security and increasing attack difficulty.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0040] In order to facilitate understanding of the present invention, at first following three nouns are explained as follows:
[0041] 1. LFSR: A linear feedback shift register (LFSR) refers to a shift register that, given the output of the previous state, reuses the linear function of the output as an input. The XOR operation is the most common single-bit linear function: some bits of the register are XORed as input, and then the bits in the register are shi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com