发明名称 Securing software by enforcing data flow integrity
摘要 The majority of such software attacks exploit software vulnerabilities or flaws to write data to unintended locations. For example, control-data attacks exploit buffer overflows or other vulnerabilities to overwrite a return address in the stack, a function pointer, or some other piece of control data. Non-control-data attacks exploit similar vulnerabilities to overwrite security critical data without subverting the intended control flow in the program. We describe a method for securing software against both control-data and non-control-data attacks. A static analysis is carried out to determine data flow information for a software program. Data-flow tracking instructions are formed in order to track data flow during execution or emulation of that software. Also, checking instructions are formed to check the tracked data flow against the static analysis results and thereby identify potential attacks or errors. Optional optimisations are described to reduce the resulting additional overheads.
申请公布号 EP1870829(A1) 申请公布日期 2007.12.26
申请号 EP20060116006 申请日期 2006.06.23
申请人 MICROSOFT CORPORATION 发明人 COSTA, MANUEL;CASTRO, MIGUEL;HARRIS, TIM
分类号 G06F21/52;G06F21/54 主分类号 G06F21/52
代理机构 代理人
主权项
地址