Timely randomized memory protection
First Claim
Patent Images
1. In a system executing a program, a method of protecting the program against information leakage attacks, the method comprising:
- detecting at runtime one or more input/output calls associated with the program; and
re-randomizing memory associated with the program in response to the one or more input/output calls, wherein re-randomizing the memory comprises generating random stack cookies.
1 Assignment
0 Petitions
Accused Products
Abstract
In a system executing a program, a method comprises detecting one or more input/output calls associated with the program and re-randomizing memory associated with the program in response to the one or more input/output calls. A related system is also described.
-
Citations
14 Claims
-
1. In a system executing a program, a method of protecting the program against information leakage attacks, the method comprising:
-
detecting at runtime one or more input/output calls associated with the program; and re-randomizing memory associated with the program in response to the one or more input/output calls, wherein re-randomizing the memory comprises generating random stack cookies. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. In a system executing a program, a method of protecting the program against information leakage attacks, the method comprising:
-
detecting at runtime one or more input/output calls associated with the program; and re-randomizing memory associated with the program in response to the one or more input/output calls, wherein re-randomizing memory associated with the program comprises re-randomizing heap integrity data by; generating a random secret key; storing the random secret key in the memory; determining a memory location for one or more heap allocations stored in the memory; for each of the heap allocations, encrypting header information associated with the heap allocation using the secret key; and for each of the heap allocations, storing the encrypted header information in the memory. - View Dependent Claims (8, 9, 10)
-
-
11. In a system executing a program, a method of protecting the program against information leakage attacks, the method comprising:
-
detecting at runtime one or more input/output calls associated with the program; and re-randomizing memory associated with the program in response to the one or more input/output calls, wherein re-randomizing memory associated with the program comprises re-randomizing an encrypted function lookup table (FLT). - View Dependent Claims (12, 13, 14)
-
Specification