Invention Grant
- Patent Title: Identifying exploitable code sequences
-
Application No.: US15274817Application Date: 2016-09-23
-
Publication No.: US10423792B2Publication Date: 2019-09-24
- Inventor: Nick Clifton
- Applicant: Red Hat, Inc.
- Applicant Address: US NC Raleigh
- Assignee: Red Hat, Inc.
- Current Assignee: Red Hat, Inc.
- Current Assignee Address: US NC Raleigh
- Agency: Womble Bond Dickinson (US) LLP
- Agent Daniel E. Ovanezian
- Main IPC: G06F21/57
- IPC: G06F21/57 ; G06F21/56

Abstract:
A system and method for identifying exploitable code sequences. In one implementation, a first processing device identifies an executable portion of a program and a set of registers of a second processing device, and stores a set of addresses in the set of registers. The first processing device allocates a region of memory populated with a set of values, and sets a stack pointer of the second processing device to point to a first location within the region of memory. The first processing device emulates an execution by the second processing device of an instruction at a first address of the executable portion. In response to determining that, after the emulating of the instruction at the first address, an address of a next instruction to execute after the instruction at the first address is in the set of addresses or the set of values, a signal is generated that indicates a potential exploitable code sequence.
Public/Granted literature
- US20180089421A1 IDENTIFYING EXPLOITABLE CODE SEQUENCES Public/Granted day:2018-03-29
Information query