首页> 外国专利> SYSTEM AND METHOD FOR EXPLOITING ATTACK DETECTION BY VALIDATING APPLICATION STACK AT RUNTIME

SYSTEM AND METHOD FOR EXPLOITING ATTACK DETECTION BY VALIDATING APPLICATION STACK AT RUNTIME

机译:通过在运行时验证应用程序堆栈来探索攻击检测的系统和方法

摘要

In one aspect, a computer-implemented method for monitoring and validating execution of an executable binary code, includes the step of, prior to beginning execution of the executable binary code, disassembling the executable binary code, listing all of application programming interfaces (API) or function calls in the executable binary code, generating a validation table for a type of each of the APIs or each of the function calls, a location of each of the APIs or each of the function calls, and a return address of each of the APIs or each of the function calls in the executable binary code, and listing in the validation table the type of each of the APIs or each of the function calls
机译:在一个方面,一种用于监视和验证可执行二进制代码的执行的计算机实现的方法包括以下步骤:在开始执行可执行二进制代码之前,分解可执行二进制代码,列出所有应用程序编程接口(API)或可执行二进制代码中的函数调用,针对每个API或每个函数调用的类型,每个API或每个函数调用的位置以及每个API的返回地址生成验证表可执行二进制代码中的API或每个函数调用,并在验证表中列出每个API或每个函数调用的类型

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号