Method for defending control flow attacks based on XOR gates

The disclosure discloses a method for defending control flow attacks. When a data processor gives a response to an interrupt routine, a return address and a binary key are input to an encryption circuit to be encrypted to obtain an encrypted return address, and the obtained encrypted return address...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Zhang, Huihong, Yu, Haizhen, Wang, Pengjun, Yu, Yunfei, Zhang, Yuejun
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Zhang, Huihong
Yu, Haizhen
Wang, Pengjun
Yu, Yunfei
Zhang, Yuejun
description The disclosure discloses a method for defending control flow attacks. When a data processor gives a response to an interrupt routine, a return address and a binary key are input to an encryption circuit to be encrypted to obtain an encrypted return address, and the obtained encrypted return address is synchronously written into a stack of the data processor and an built-in register bank; when the response given to the interrupt routine by the data processor is finished, the encrypted return address is read from the tack of the data processor and the built-in register bank; afterwards, the two encrypted return addresses are decrypted by first and second decryption circuits respectively to obtain two decrypted return addresses; and the two decrypted return addresses are compared to draw a conclusion whether the data process suffers from a control flow attack, and data processor determines to continue or terminate the routine accordingly.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US11188654B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US11188654B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US11188654B23</originalsourceid><addsrcrecordid>eNrjZLDxTS3JyE9RSMsvUkhJTUvNS8nMS1dIzs8rKcrPUUjLyS9XSCwpSUzOLlZISixOTVHIz1OI8A9SSE8sSS3mYWBNS8wpTuWF0twMim6uIc4euqkF-fGpxQWJyal5qSXxocGGhoYWFmamJk5GxsSoAQCn_y9U</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Method for defending control flow attacks based on XOR gates</title><source>esp@cenet</source><creator>Zhang, Huihong ; Yu, Haizhen ; Wang, Pengjun ; Yu, Yunfei ; Zhang, Yuejun</creator><creatorcontrib>Zhang, Huihong ; Yu, Haizhen ; Wang, Pengjun ; Yu, Yunfei ; Zhang, Yuejun</creatorcontrib><description>The disclosure discloses a method for defending control flow attacks. When a data processor gives a response to an interrupt routine, a return address and a binary key are input to an encryption circuit to be encrypted to obtain an encrypted return address, and the obtained encrypted return address is synchronously written into a stack of the data processor and an built-in register bank; when the response given to the interrupt routine by the data processor is finished, the encrypted return address is read from the tack of the data processor and the built-in register bank; afterwards, the two encrypted return addresses are decrypted by first and second decryption circuits respectively to obtain two decrypted return addresses; and the two decrypted return addresses are compared to draw a conclusion whether the data process suffers from a control flow attack, and data processor determines to continue or terminate the routine accordingly.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2021</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20211130&amp;DB=EPODOC&amp;CC=US&amp;NR=11188654B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20211130&amp;DB=EPODOC&amp;CC=US&amp;NR=11188654B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Zhang, Huihong</creatorcontrib><creatorcontrib>Yu, Haizhen</creatorcontrib><creatorcontrib>Wang, Pengjun</creatorcontrib><creatorcontrib>Yu, Yunfei</creatorcontrib><creatorcontrib>Zhang, Yuejun</creatorcontrib><title>Method for defending control flow attacks based on XOR gates</title><description>The disclosure discloses a method for defending control flow attacks. When a data processor gives a response to an interrupt routine, a return address and a binary key are input to an encryption circuit to be encrypted to obtain an encrypted return address, and the obtained encrypted return address is synchronously written into a stack of the data processor and an built-in register bank; when the response given to the interrupt routine by the data processor is finished, the encrypted return address is read from the tack of the data processor and the built-in register bank; afterwards, the two encrypted return addresses are decrypted by first and second decryption circuits respectively to obtain two decrypted return addresses; and the two decrypted return addresses are compared to draw a conclusion whether the data process suffers from a control flow attack, and data processor determines to continue or terminate the routine accordingly.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2021</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLDxTS3JyE9RSMsvUkhJTUvNS8nMS1dIzs8rKcrPUUjLyS9XSCwpSUzOLlZISixOTVHIz1OI8A9SSE8sSS3mYWBNS8wpTuWF0twMim6uIc4euqkF-fGpxQWJyal5qSXxocGGhoYWFmamJk5GxsSoAQCn_y9U</recordid><startdate>20211130</startdate><enddate>20211130</enddate><creator>Zhang, Huihong</creator><creator>Yu, Haizhen</creator><creator>Wang, Pengjun</creator><creator>Yu, Yunfei</creator><creator>Zhang, Yuejun</creator><scope>EVB</scope></search><sort><creationdate>20211130</creationdate><title>Method for defending control flow attacks based on XOR gates</title><author>Zhang, Huihong ; Yu, Haizhen ; Wang, Pengjun ; Yu, Yunfei ; Zhang, Yuejun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US11188654B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2021</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Huihong</creatorcontrib><creatorcontrib>Yu, Haizhen</creatorcontrib><creatorcontrib>Wang, Pengjun</creatorcontrib><creatorcontrib>Yu, Yunfei</creatorcontrib><creatorcontrib>Zhang, Yuejun</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhang, Huihong</au><au>Yu, Haizhen</au><au>Wang, Pengjun</au><au>Yu, Yunfei</au><au>Zhang, Yuejun</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Method for defending control flow attacks based on XOR gates</title><date>2021-11-30</date><risdate>2021</risdate><abstract>The disclosure discloses a method for defending control flow attacks. When a data processor gives a response to an interrupt routine, a return address and a binary key are input to an encryption circuit to be encrypted to obtain an encrypted return address, and the obtained encrypted return address is synchronously written into a stack of the data processor and an built-in register bank; when the response given to the interrupt routine by the data processor is finished, the encrypted return address is read from the tack of the data processor and the built-in register bank; afterwards, the two encrypted return addresses are decrypted by first and second decryption circuits respectively to obtain two decrypted return addresses; and the two decrypted return addresses are compared to draw a conclusion whether the data process suffers from a control flow attack, and data processor determines to continue or terminate the routine accordingly.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US11188654B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Method for defending control flow attacks based on XOR gates
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T06%3A07%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Zhang,%20Huihong&rft.date=2021-11-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS11188654B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true