System, method and computer program product for verifying...

Data processing: software development – installation – and managem – Software program development tool – Testing or debugging

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C717S127000, C717S141000, C726S022000, C726S023000, C726S026000, C726S027000

Reexamination Certificate

active

07987451

ABSTRACT:
A verification system, method and computer program product are provided. In one embodiment, one of a plurality of call instruction formats is selected. In addition, it is verified whether an invocation of an interface was attempted by code utilizing the selected call instruction format. Further, the selection and the verification are repeated for each of the plurality of call instruction formats. In another embodiment, a return target address is identified. Still yet, it is determined whether return of contra to the return target address would result in invocation a one of a plurality of interfaces.

REFERENCES:
patent: 5313616 (1994-05-01), Cline et al.
patent: 5963739 (1999-10-01), Homeier
patent: 6412071 (2002-06-01), Hollander et al.
patent: 6529985 (2003-03-01), Deianov et al.
patent: 6601114 (2003-07-01), Bracha et al.
patent: 6618769 (2003-09-01), Bracha et al.
patent: 6959441 (2005-10-01), Moore
patent: 7120572 (2006-10-01), Liang
patent: 7287243 (2007-10-01), Dollin et al.
patent: 7434210 (2008-10-01), Tucker
patent: 7530076 (2009-05-01), Underseth et al.
patent: 7664924 (2010-02-01), Safa
patent: 2005/0010804 (2005-01-01), Bruening et al.
patent: 2005/0108562 (2005-05-01), Khazan et al.
patent: 2005/0257191 (2005-11-01), Underseth et al.
patent: 2006/0075386 (2006-04-01), Loh et al.
patent: 2006/0092846 (2006-05-01), Loh et al.
Rabek et al. “Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code” © 2003 Association for Computing Machinery.
Park et al. “Repairing Return Address Stack For Buffer Overflow Protection” © ACM Frontiers of Computing, Ischia, Italy Apr. 2004.
Kc. et al. “e-NeXSh: Achieving An Effectively Non-Executable Stack and Heap via System-Call Policing,” In Proceedings of the Annual Computer Security Conference, 2005.
Xu et al. “Architecture Support for Defending Against Buffer Overflow Attacks,” Center for Reliable and High-Performance Computing Coordinated Science Laboratory, University of Illinois, 2002.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System, method and computer program product for verifying... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System, method and computer program product for verifying..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System, method and computer program product for verifying... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2646426

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.