Method of protecting a computer stack

Electrical computers and digital processing systems: processing – Processing control – Branching

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07581089

ABSTRACT:
A method of protecting a return address on a computer stack is disclosed. Two stacks are created, the first a normal stack, and the second, or shadow, having shadow frames containing the return address upon a subroutine call, the address on the first stack where the return address is stored, and a user-definable state variable which is used to identify a shadow frame as a return address. Before returning from a subroutine, the two return addresses are compared, and if they do not match, the second stack is searched down, and then up, for a matching return address. If there is a match, the shadow is re-synchronized with the first stack by comparing the stored values of the first stack pointer with the first stack pointer and adjusting appropriately the shadow stack pointer. The matching shadow frame must also be a return address datatype of return address.

REFERENCES:
patent: 4558176 (1985-12-01), Arnold et al.
patent: 5222220 (1993-06-01), Mehta
patent: 5864707 (1999-01-01), Tran et al.
patent: 5881278 (1999-03-01), Tran et al.
patent: 5949973 (1999-09-01), Yarom
patent: 5968169 (1999-10-01), Pickett
patent: 6070198 (2000-05-01), Krause et al.
patent: 6269436 (2001-07-01), Tran et al.
patent: 6301699 (2001-10-01), Hollander et al.
patent: 6578094 (2003-06-01), Moudgill
patent: 6618797 (2003-09-01), Dery et al.
patent: 6766513 (2004-07-01), Charnell et al.
patent: 6769004 (2004-07-01), Barrett
patent: 6941473 (2005-09-01), Etoh et al.
patent: 6996677 (2006-02-01), Lee et al.
patent: 7165150 (2007-01-01), Alverson et al.
patent: 7178010 (2007-02-01), McDonald
patent: 2003/0217277 (2003-11-01), Narayanan
Etoh, H., etal. Protecting from stack-smashing attacks, Jun. 2000, IBM, 13 pages.
Patil, H., etal., Low-cost Concurrent Checking of Pointer and Array Accesses in C Programs.1997, John Wiley & Sons Ltd., pp. 87-110.
U.S. Appl. No. 10/229,712, filed Apr. 3, 2003, Milliken.
U.S. Appl. No. 10/313,940, filed Sep. 25, 2003, Cowen, et al.
U.S. Appl. No. 10/386,709, filed Sep. 18, 2003, Naganuma, et al.
U.S. Appl. No. 10/726,229, filed Aug. 26, 2004, Brodley, et al.
U.S. Appl. No. 10/835,496, filed Dec. 16, 2004, Asher, et al.
U.S. Appl. No. 10/746,667, filed Jun. 23, 2005, McKeen.
U.S. Appl. No. 10/644,399, filed Feb. 24, 2005, McKeen.
U.S. Appl. No. 10/768,750, White.
U.S. Appl. No. 10/813,599, filed Oct. 6, 2005, Wu, et al.
U.S. Appl. No. 11/014,111, filed Jul. 20, 2006, Gentry, et al.
U.S. Appl. No. 11/095,719, filed Oct. 05, 2006, Cheng, et al.
U.S. Appl. No. 11/165,268, filed Dec. 28, 2006, Stempel, et al.
Dildog, The Tao of Windows Buffer Overflow, posted on the Internet at www.cultdeadcow.com, 1999.
Aleph One, Smashing the Stack for Fun and Profit, posted on the Internet at http://reactor-core.org/stack-smashing.html.
Frantzen and Shuey, StackGhost: Hardware Facilitated Stack Protection, posted on the Internet at www.stackghost.cerias.perdue.edu.
Cowen, Protecting Systems from Stack Smashing Attacks with StackGuard, posted on the Internet at www.cse.ogi.edu/DISC/projects/immunix.
Cowen, MemGuard, posted on the Internet at http://www.usenix.org/publications/library/proceedings/sec98/full—papers/cowan/cowan—html
ode7.html.
Baratloo et al., Transparent Run-Time Defense against Stack Smashing Attacks.
Stackshield, posted on the Internet at http://www.angelfire.com/sk/stackshield/.
Avanzato, Bypassing Stackguard and Stackshield, posted on the Internet at www.wntrmute.com/docs/hack/bypassing stackguard and stackshield.htm.
Hsu, RAD: A Compile-Time Solution to Buffer Overflow Attacks, posted on the Internet at http://www.ecsl.cs.sunysb.edu/tr/TR96.pdf.
Sinnadurai, et al., Transparent Runtime Shadow Stack: Protection against malicious return address modifications, posted on at http://www.comp.nus.edu.sg/˜saravanl/truss.pdf.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of protecting a computer stack does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of protecting a computer stack, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of protecting a computer stack will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4123303

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.