首页>
外国专利>
APPLYING SECURITY MITIGATION MEASURES FOR STACK CORRUPTION EXPLOITATION IN INTERMEDIATE CODE FILES
APPLYING SECURITY MITIGATION MEASURES FOR STACK CORRUPTION EXPLOITATION IN INTERMEDIATE CODE FILES
展开▼
机译:在中间代码文件中应用安全缓解措施进行堆栈破坏开发
展开▼
页面导航
摘要
著录项
相似文献
摘要
Presented herein are methods and systems for generating intermediate code files adjusted to prevent return oriented programming exploitation, comprising receiving compiled intermediate code file(s) comprise a plurality of routines and adjusting them prior to generation of a respective executable file for execution by one or more processor. The adjusting comprising analyzing a symbol table of the intermediate code file(s) to identify a beginning address of each of the routines, analyzing each of the routines to identify indirect branch instructions in the routines, and replacing each detected indirect branch instruction with invocation of a verification code segment configured to verify that the respective indirect branch instruction points to the beginning address of one of the routines. In runtime, the verification code segment causes the processor(s) to initiate one or more predefined actions in case the indirect branch instruction isn't pointing to the beginning address of one of the plurality of routines.
展开▼