-
公开(公告)号:EP3608805A1
公开(公告)日:2020-02-12
申请号:EP19190300.4
申请日:2019-08-06
发明人: Kovelman, Alexei , Dagmi, Or , Skverer, Tal , Shalev, Amos , Roth, Gilad , Alon, Bar
摘要: An apparatus and method for enforcing control-flow integrity (CFI) may include obtaining assembly code; patching the assembly code to produce patched code including control-flow integrity (CFI) enforcement; and assembling the patched code into a binary output. Patching may include adding, to assembly code of a function, at least one of: assembly code for storing and validating a stack-cookie and assembly code for validating a return address.
-
公开(公告)号:EP3958154A1
公开(公告)日:2022-02-23
申请号:EP21186793.2
申请日:2021-07-20
发明人: Ezra, Shiran , Roth, Gilad , Kaneti, Liron
摘要: A system and method for booting a computing device may include, during a boot process of the device: preventing access to a set of storage blocks including a software object; selectively validating one or more storage blocks in the set; and enabling access to validated storage blocks.
-
公开(公告)号:EP3889815A1
公开(公告)日:2021-10-06
申请号:EP21165341.5
申请日:2021-03-26
发明人: Roth, Gilad
摘要: A system and method for controlling operation of a computing device may include associating a resource with a first manager; receiving, by the first manager and from a source, a request to access the resource; selecting, by the first manager, whether or not to allow the source to access the resource, and: if selecting to allow access then refusing the request, and if selecting to prevent access then performing at least one of: providing access to a dummy resource, preventing access to the resource, logging an attempt to access the resource, and reporting an attempt to access the resource.
-
公开(公告)号:EP3916598A1
公开(公告)日:2021-12-01
申请号:EP21175570.7
申请日:2021-05-25
发明人: Roth, Gilad , Ben Noon, Ofer , Einhorn, Raziel
摘要: A system and method for detecting exploitation of a vulnerability of software in a system may include associating a hook with the software by updating a configuration object in the system. A hook may be adapted to detect exploitation of a vulnerability of the software. An attempt to exploit a vulnerability may be logged.
-
-
-