摘要 |
A method and computing device for protecting against code-injection attacks by fetching transformed instructions stored in memory and restoring the transformed instructions prior to their execution by a processor or interpreter is presented. An exemplary computing device is configured to execute a method as described in the following steps, as part of fetching a value from memory, restoring the value according to a context and a restore function if the fetch is for an instruction. Thereafter, the restored information is passed on to the next stage of the processor for execution.
|