18349450. APPARATUS AND METHOD FOR INJECTING CONTROL FLOW INTEGRITY SECURITY CODE BASED ON LOCATION simplified abstract (ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE)

From WikiPatents
Jump to navigation Jump to search

APPARATUS AND METHOD FOR INJECTING CONTROL FLOW INTEGRITY SECURITY CODE BASED ON LOCATION

Organization Name

ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE

Inventor(s)

GAE-IL An of Daejeon (KR)

Dong-Wook Kang of Daejeon (KR)

HONG-IL Ju of Daejeon (KR)

APPARATUS AND METHOD FOR INJECTING CONTROL FLOW INTEGRITY SECURITY CODE BASED ON LOCATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18349450 titled 'APPARATUS AND METHOD FOR INJECTING CONTROL FLOW INTEGRITY SECURITY CODE BASED ON LOCATION

Simplified Explanation

The patent application describes an apparatus and method for injecting control flow integrity security code based on a location in a program code. The apparatus identifies indirect function calls, generates location information for these calls, and injects security code into the program using this information.

  • Indirect function calls are identified in the input program code.
  • Location information for these calls is generated through analysis.
  • Control flow integrity security code is injected into the program code using the generated location information.

Potential Applications

The technology described in the patent application could be applied in the following areas:

  • Cybersecurity
  • Software development
  • Code optimization

Problems Solved

The technology addresses the following issues:

  • Vulnerabilities in software due to control flow attacks
  • Ensuring the integrity of program execution
  • Enhancing security measures in software development

Benefits

The technology offers the following benefits:

  • Improved security in software applications
  • Prevention of control flow attacks
  • Enhanced control over program execution

Potential Commercial Applications

The technology could be commercially applied in:

  • Security software products
  • Development tools for programmers
  • Cybersecurity consulting services

Possible Prior Art

One possible prior art in this field is the use of static analysis tools to identify vulnerabilities in software code and suggest security enhancements.

Unanswered Questions

How does the apparatus handle complex program structures?

The patent application does not provide details on how the apparatus deals with intricate program structures that may affect the injection of security code.

What impact does the injection of security code have on program performance?

The application does not discuss the potential performance implications of injecting control flow integrity security code into the program.


Original Abstract Submitted

Disclosed herein are an apparatus and method for injecting control flow integrity security code based on a location. The apparatus identifies an indirect function call in input program code, generates indirect function call location information by analyzing the identified indirect function call, and injects control flow integrity security code into the program code using the generated indirect function call location information.