Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

False code prevention method and prevention program and the program recording medium

一种非法代码、程序的技术,应用在使用存储的程序进行程序控制、程序控制设计、仪器等方向,能够解决不能够完全把握非法代码执行等问题,达到抑制执行的效果

Inactive Publication Date: 2006-12-27
SCI PARK CORP
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The execution of such illegal code caused by buffer overflow cannot be fully grasped in the operating system that manages the execution of the program.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • False code prevention method and prevention program and the program recording medium
  • False code prevention method and prevention program and the program recording medium
  • False code prevention method and prevention program and the program recording medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Hereinafter, the best embodiment of the present invention will be specifically explained based on the drawings.

[0072] [Embodiment 1]

[0073] Hereinafter, Embodiment 1 of the present invention will be described.

[0074] The present invention provides a method for detecting the behavior of rewriting or tampering with data stored in the main memory of an electronic computer. In addition, a program is provided for detecting the act of rewriting or tampering with data stored in the main memory of the electronic computer according to this method, and restoring the rewritten or tampered data. Furthermore, the present invention provides a recording medium on which the program is recorded. The outline of the embodiment of the present invention will be described.

[0075] The troubleshooting function of the CPU is a function for detecting errors that occur while executing an application program. For this reason, a plurality of memories called troubleshooting registers are prepar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for preventing a return address from being falsified due to a buffer overflow during the program execution, and for detecting the buffer-overflow beforehand. When the return address is re-written during program execution, the debug function of the central processing unit is used to output an error. The falsification of the return address is detected through the error output. Then the falsified return address is re-written to a value stored in advance to enable the program to return to normal operation. When the falsification of the return address is detected, the executing program is terminated.

Description

Technical field [0001] The present invention relates to a method for preventing illegal code execution, a program for preventing illegal code execution, and a recording medium for a program for preventing illegal code execution, which protect a program running on a computer from incomplete actions caused by illegal code or external attacks. [0002] In more detail, it relates to a recording medium for detecting a buffer overflow, improving a method for preventing illegal code execution with incomplete program action, a program for preventing illegal code execution, and a recording medium for preventing illegal code execution. Background technique [0003] The operating system of the electronic computer is designed in a complicated manner. Thus, in the operating system, there are weaknesses called security holes. The so-called security vulnerabilities are fragile structures caused by defects or errors in software design. Malicious users sometimes use the security loopholes in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/42G06F9/06G06F21/12G06F21/64
CPCG06F11/141G06F21/52G06F11/3648G06F9/06
Inventor 小路幸市郎武藤佳恭野崎隆
Owner SCI PARK CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products