首页>
外国专利>
DETECTION METHOD OF CONTROL FLOW ATTACKS BASED ON RETURN ADDRESS SIGNATURES
DETECTION METHOD OF CONTROL FLOW ATTACKS BASED ON RETURN ADDRESS SIGNATURES
展开▼
机译:基于返回地址签名的控制流攻击检测方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
A control flow attacks based on return address signatures comprises: using a return address as a push return address when a response is given to an interrupt service routine; generating an encrypted push return address by an XOR encryption circuit by means of an n-bit binary key generated by a pseudo random number generator; then, generating a push_address signature value by an MD algorithm signature circuit; when the response to the interrupt service routine is over, reading an n-bit binary address out of a stack to serve as a pop return address; generating an encrypted pop return address by the XOR encryption circuit; generating a pop address signature value by the MD algorithm signature circuit; comparing the push_address signature value with the pop address signature value; and determining whether or not a data processor is under a control flow attack according to a comparison result.
展开▼