Method and apparatus to detect and recover from a stack...

Error detection/correction and fault detection/recovery – Data processing system error or fault handling – Reliability and availability

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C712S233000, C712S244000, C714S015000, C714S042000

Reexamination Certificate

active

10803848

ABSTRACT:
A prologue and an epilogue of a function are hooked. Completion of the prologue is stalled in a first state of a stack frame, and a copy of the first state of the stack frame is saved. Completion of the prologue is initiated, permitting execution of the function. Completion of the epilogue is stalled in a second state of the stack frame. The saved copy of the first state of the stack frame is located and compared with the second state of the stack frame. A determination is made whether the stack frame is corrupted based on the comparison. Upon a determination that the stack frame is corrupted, the second state of the stack frame is replaced with the copy of the first state of the stack frame, and completion of the epilogue is initiated, allowing the function to complete.

REFERENCES:
patent: 5530802 (1996-06-01), Fuchs et al.
patent: 5630066 (1997-05-01), Gosling
patent: 5668999 (1997-09-01), Gosling
patent: 5805470 (1998-09-01), Averill
patent: 5887007 (1999-03-01), Iwata et al.
patent: 5958003 (1999-09-01), Preining et al.
patent: 6052732 (2000-04-01), Gosling
patent: 6075940 (2000-06-01), Gosling
patent: 6119206 (2000-09-01), Tatkar et al.
patent: 6269436 (2001-07-01), Tran et al.
patent: 6453278 (2002-09-01), Favor et al.
patent: 6704923 (2004-03-01), Gosling
patent: 6829719 (2004-12-01), Anvin et al.
patent: 6851073 (2005-02-01), Cabrera et al.
patent: 6954922 (2005-10-01), Liang
patent: 7162662 (2007-01-01), Svarcas et al.
patent: 7197665 (2007-03-01), Goldstein et al.
patent: 2002/0129226 (2002-09-01), Eisen et al.
patent: 2004/0049660 (2004-03-01), Jeppesen et al.
Chien, E. and Szor, P., “Blended Attacks Exploits, Vulnerabilities and Buffer-overflow Techniques in Computer Viruses”, Virus Bulletin Conference, Sep. 2002, pp. 1-36.
Huang, Yinrong, “Protection Against Exploitation of Stack and Heap Overflows”, Exurity, Inc., Canada, Apr. 11, 2003, pp. 1-10 [online] . Retrieved on Jun. 9, 2004. Retrieved from the Internet: <URL:http://www.cgisecurity.com/lib/AntiOverflows.pdf>.
No author, “Immunix Canary Patch to GCC 2.7.2.2—A Buffer Overflow Exploit Detector”, pp. 1-4 [online]. Retrieved on Feb. 10, 2004. Retrieved from the Internet: <URL:http://www.ussrback.com/UNIX/utilities/stackguard/stackguard-gcc.README>.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus to detect and recover from a stack... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus to detect and recover from a stack..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus to detect and recover from a stack... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3744689

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.