Stack entry overwrite protection
First Claim
Patent Images
1. A method for protecting against stack overflow events, the method comprising:
- receiving, at a computer processor, a plurality of execution items corresponding to the computer process; and
allocating a plurality of memory portions, wherein the plurality of memory portions includes;
(i) a first memory portion corresponding to a first stack, the first stack corresponding to a first class of execution items, and the first stack being associated with a first access key; and
(ii) a second memory portion corresponding to a second stack, the second stack corresponding to a second class of execution items, and the second stack being associated with a second access key,wherein the first class corresponds to extendable data types and the second class corresponds to non-extendable data types.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer processor receives a plurality of execution items corresponding to a computer process. The computer processor allocates a first memory portion corresponding to a first stack, wherein the first stack corresponds to a first class of execution items. The computer processor allocates a second memory portion corresponding to a second stack, wherein the second stack corresponds to a second class of execution items. The computer processor identifies a first execution item of the plurality of execution items and determining a class corresponding to the first execution item.
19 Citations
7 Claims
-
1. A method for protecting against stack overflow events, the method comprising:
-
receiving, at a computer processor, a plurality of execution items corresponding to the computer process; and allocating a plurality of memory portions, wherein the plurality of memory portions includes;
(i) a first memory portion corresponding to a first stack, the first stack corresponding to a first class of execution items, and the first stack being associated with a first access key; and(ii) a second memory portion corresponding to a second stack, the second stack corresponding to a second class of execution items, and the second stack being associated with a second access key, wherein the first class corresponds to extendable data types and the second class corresponds to non-extendable data types. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification