WIPO logo
Mobile | Deutsch | Español | Français | 日本語 | 한국어 | Português | Русский | 中文 | العربية |
PATENTSCOPE

Search International and National Patent Collections
World Intellectual Property Organization
Options
Query Language
Stem
Sort by:
List Length
Some content of this application is unavailable at the moment.
If this situation persist, please contact us atFeedback&Contact
1. (WO2016060817) CODE POINTER AUTHENTICATION FOR HARDWARE FLOW CONTROL
Latest bibliographic data on file with the International Bureau   

Pub. No.: WO/2016/060817 International Application No.: PCT/US2015/051955
Publication Date: 21.04.2016 International Filing Date: 24.09.2015
Chapter 2 Demand Filed: 02.05.2016
IPC:
G06F 21/52 (2013.01)
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50
Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
52
during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
Applicants: QUALCOMM INCORPORATED[US/US]; ATTN: International IP Administration 5775 Morehouse Drive San Diego, California 92121-1714, US
Inventors: ACAR, Can; US
KRISHNASWAMY, Arvind; US
TURNER, Robert; US
Agent: KING, Jeffrey S.; Hunter Clark PLLC 900 Cummings Center Suite 213-T Beverly, Massachusetts 01915, US
HUNTER, Shane; Hunter Clark PLLC 900 Cummings Center Suite 213-T Beverly, MA 01915, US
KING, Jeffrey S.; 900 Cummings Center Suite 213-T Beverly, MA 01915, US
Priority Data:
14/517,57217.10.2014US
Title (EN) CODE POINTER AUTHENTICATION FOR HARDWARE FLOW CONTROL
(FR) AUTHENTIFICATION DE POINTEUR CODE POUR COMMANDE DE FLUX DE MATÉRIEL
Abstract:
(EN) Techniques for enforcing flow control of a software program in a processor are provided. An example method according to these techniques includes analyzing program code of the software program to identify a code pointer in the program code, generating an authentication tag based on the code pointer, and modifying the code pointer in the program code with the authentication tag to generate a tagged code pointer.
(FR) La présente invention concerne des techniques permettant de mettre en œuvre une commande de flux d'un programme logiciel dans un processeur. Un procédé donné à titre d'exemple selon ces techniques consiste à analyser un code programme du programme logiciel pour identifier un pointeur code dans le code programme, à générer une étiquette d'authentification sur la base du pointeur code, et à modifier le pointeur code dans le code programme avec l'étiquette d'authentification pour générer un pointeur code étiqueté.
front page image
Designated States: AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IR, IS, JP, KE, KG, KN, KP, KR, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW
African Regional Intellectual Property Organization (ARIPO) (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW)
Eurasian Patent Office (AM, AZ, BY, KG, KZ, RU, TJ, TM)
European Patent Office (EPO) (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR)
African Intellectual Property Organization (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG)
Publication Language: English (EN)
Filing Language: English (EN)