Guarantees the detection of control flow attacks and attacks that dynamically change the program executables. Can be easily retrofitted to an existing microprocessor.

About

This technology provides a mechanism for validating the legal execution path and instructions along the legal execution path that works in parallel with normal program execution and imposes a very small performance penalty. The reference information for the validation is stored in an encrypted form in memory. The mechanism is capable of detecting various control flow attacks and dynamic changes to program executables that are done at run-time. Thus, the mechanism provides the basis for building truly trusted computing platforms.

ADVANTAGES: 


Performs real-time authentication of programs, libraries and operating system code as the program executes with negligible impact on performance in most cases. 
Guarantees the detection of control flow attacks and attacks that dynamically change the program executables. 
Can be easily retrofitted to an existing microprocessor. 


PATENTING: 

US 8,285,999 & US 8,930,705 

 

Purchase a license for full unlimited access to all innovation profiles on LEO

  • Direct connection to thousands of more innovations
  • Access to market Experts and Universities
  • Filter relevant solutions into your own dedicated Network