Guarantees the detection of control flow attacks and attacks that dynamically change the program executables. Can be easily retrofitted to an existing microprocessor.

About

This technology provides a mechanism for validating the legal execution path and instructions along the legal execution path that works in parallel with normal program execution and imposes a very small performance penalty. The reference information for the validation is stored in an encrypted form in memory. The mechanism is capable of detecting various control flow attacks and dynamic changes to program executables that are done at run-time. Thus, the mechanism provides the basis for building truly trusted computing platforms. ADVANTAGES:  Performs real-time authentication of programs, libraries and operating system code as the program executes with negligible impact on performance in most cases.  Guarantees the detection of control flow attacks and attacks that dynamically change the program executables.  Can be easily retrofitted to an existing microprocessor.  PATENTING:  US 8,285,999 & US 8,930,705   

Register for free for full unlimited access to all innovation profiles on LEO

  • Discover articles from some of the world’s brightest minds, or share your thoughts and add one yourself
  • Connect with like-minded individuals and forge valuable relationships and collaboration partners
  • Innovate together, promote your expertise, or showcase your innovations