System and method for thwarting buffer overflow attacks...

Electrical computers and digital processing systems: support – Data processing protection using cryptography – Computer instruction/address encryption

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S176000, C713S187000, C726S023000

Reexamination Certificate

active

07853803

ABSTRACT:
A method (200) and program (100) for inhibiting attack upon a computer (120) is provided. The address (104) of a process (106) is produced (612), and encrypted (616) to produce an encrypted address (518), which is then stored in memory (128). When needed, the encrypted address (518) is retrieved (702) from memory (128) and decrypted (704) to reproduce the original process address (104). The reproduced process address (104) is then verified (708). If the process address (104) is determined (708) to be valid, i.e., there was no attack, then the process address (104) is placed (712) in the program counter (318), and a valid process (106) is executed. If the process address (104) is determined (708) to be invalid, i.e., there was an attack, then the address (108) of a crash and terminate process (110) is placed (716) in the program counter (318) and the computer (120) crashes. A nonce value (512) may be generated (602) and encrypted (616) and decrypted (704) in conjunction with the process address (104). The nonce value (512) may then be verified (710) independently, thereby increasing security.

REFERENCES:
patent: 4168396 (1979-09-01), Best
patent: 4278837 (1981-07-01), Best
patent: 4465901 (1984-08-01), Best
patent: 4525599 (1985-06-01), Curran et al.
patent: 4558176 (1985-12-01), Arnold et al.
patent: 5675645 (1997-10-01), Schwartz et al.
patent: 5915266 (1999-06-01), Falik et al.
patent: 5949973 (1999-09-01), Yarom
patent: 6006328 (1999-12-01), Drake
patent: 6044157 (2000-03-01), Uesaka et al.
patent: 6202176 (2001-03-01), Baldischweiler et al.
patent: 6301699 (2001-10-01), Hollander et al.
patent: 6308256 (2001-10-01), Folmsbee
patent: 6412071 (2002-06-01), Hollander et al.
patent: 6519702 (2003-02-01), Williams
patent: 6578094 (2003-06-01), Moudgill
patent: 6832302 (2004-12-01), Fetzer et al.
patent: 7185205 (2007-02-01), Launchbury et al.
patent: 2001/0013094 (2001-08-01), Etoh et al.
patent: 2003/0033542 (2003-02-01), Goseva-Popstojanova et al.
patent: 2003/0097581 (2003-05-01), Zimmer
patent: 2003/0182572 (2003-09-01), Cowan et al.
patent: 2003/0217277 (2003-11-01), Narayanan
Frantzen et al. “StackGhost; Hardware Facilitated Stack Protection”, May 2001. Published in USENIX Security Symposium '01.
Cowan et al. “Pointguard: Protecting Pointers from Buffer Overflow Vulnerabilities” , Aug. 2003, In Proceedings of the 12th USENIX Security Symposium, pp. 91-104.
Cowan et al. “Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade”, Jan. 2000, In Proceedings DARPA Information Survivability Conference and Exposition, pp. 119-129.
Schneier, Bruce “Applied Cryptography, Second Edition” 1996, John Wiley and Sons, pp. 10-11, 183-184, 223-225.
Silberschatz et al. “Operating System Concepts” 1999, 5thEdition, John Wiley and Sons, pp. 402-406.
Daemen et al. “AES Proposal: Rijndael” Document Version 2, 1999, pp. 1-45.
IEEE Standard Computer Dictionary, 1990, The Institute of Electrical and Electronics Engineers, pp. 45.
Menezes et al., “Handbook of Applied Cryptography”, 1997, CRC Press LLC, Section 1.8.
The SPARC Architecture Manual, Version 9, 1994, PTR Prentice Hall, pp. 1-399.
Vendicator, “Stack Shield: A ‘stack smashing’ technique protection tool for Linux,” http: //www.angelfire.com/sk/stackshield/, 5 pages, Aug. 1, 2000.
M. Kuhn, “The TrustNo 1 Cryptoprocessor Concept,” Technial Report, Purdue University, pp. 1-6, Apr. 30, 1997.
Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 51 Pages, Nov. 26, 2001.
A. Snarskii, “Increasing Overall Security,” email posting to freebsd-hackers mailing list, http://docs.freebsd.org/mail/archive/1997/freebsd-hackers/19970209.freebsd-hackers.html, 5 pages, Feb. 9, 1997.
Computer Emergency Response Team, “CERT/CC Advisories 1998-2001,” http: //www.cert.org/advisories, 51 Pages, 1998-2001.
A. Baratloo et al., Libsafe: Protecting Critical Elements of Stacks, White Paper, 11 Pages, Dec. 25, 1999.
Bypassing Stackguard and Stackshield, Bulba and Kil3r lam3rz@hert.org, Phrack Magazine, vol. 0xa, Issue 0x38, 14 Pages, May 1, 2000.
Smashing the Stack for fun and Profit, aleph1@underground.org, Phrack 49, vol. 7, Issue 49, File 14 of 16, 34 pages. Nov. 8, 1996.
A. Baratloo et al.,Transparent Run-Time Defense Against Stack Smashing Attacks, USENIX Technical Program, USENIX Annual Conference, General Session, Jun. 2000, 19 Pages.
T. Tsai et al., Libsafe 2.0: Detection of Format String Vulnerability Exploits, White Paper, Feb. 6, 2001 (Version 3-21-01), 5 Pages.
DilDog@LOPHT.COM, The Tao of windows buffer Overflow, http: //www.cultdeadcow.com/cDc—files/cDc-351/essence.html, Apr. 16, 1998, 20 Pages.
H. Etoh et al., Protecting from Stack-Smashing Attacks, http: //www.trl.ibm.com/projects/security/ssp/main.html, Jun. 19, 2000, 17 Pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for thwarting buffer overflow attacks... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for thwarting buffer overflow attacks..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for thwarting buffer overflow attacks... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4234046

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.