METHOD AND APPARATUS FOR PATCHING BINARY HAVING VULNERABILITY
First Claim
Patent Images
1. A method of patching a binary having vulnerability, the method comprising:
- loading a first binary to be patched, into a memory;
generating a second binary by patching to call a stack frame initialization function from a vulnerable function of the first binary; and
executing the stack frame initialization function by calling the vulnerable function when the second binary is executed and initializing a stack frame area of the vulnerable function so as to automatically initialize a variable declared in the vulnerable function.
1 Assignment
0 Petitions
Accused Products
Abstract
There is provided a method of patching a binary having vulnerability which is performed by a computing device. The method comprises loading a first binary to be patched, into a memory, generating a second binary by patching to call a stack frame initialization function from a vulnerable function of the first binary, executing the stack frame initialization function by calling the vulnerable function when the second binary is executed and initializing a stack frame area of the vulnerable function so as to automatically initialize a variable declared in the vulnerable function.
1 Citation
14 Claims
-
1. A method of patching a binary having vulnerability, the method comprising:
-
loading a first binary to be patched, into a memory; generating a second binary by patching to call a stack frame initialization function from a vulnerable function of the first binary; and executing the stack frame initialization function by calling the vulnerable function when the second binary is executed and initializing a stack frame area of the vulnerable function so as to automatically initialize a variable declared in the vulnerable function. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of patching a binary having vulnerability, the method comprising:
-
loading a first binary to be patched, into a memory; generating a second binary by patching so as to call a buffer size verification function instead of calling a vulnerable function of the first binary; and executing the buffer size verification function in advance of executing the vulnerable function when the second binary is executed and executing the vulnerable function after a buffer size of the vulnerable function is verified so as to automatically prevent a buffer overflow from occurring in the vulnerable function. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification