Description:
A mechanism for validating the legal execution path and instructions that works in parallel with normal program execution and imposes a small performance penalty
Background:
The construction of trustworthy systems demands that the execution of every piece of code is validated as genuine – that the executed codes do exactly what they are supposed to do. Most systems implement this requirement prior to execution by matching a cryptographic hash of the binary file against a reference hash value, leaving the code vulnerable to run time compromises, such as code injection, return and jump-oriented programming, and illegal linking of the code to compromised library functions.
https://binghamton.technologypublisher.com/files/sites/pexels-photo-10894383.jpeg
https://www.pexels.com/photo/battery-black-cable-charger-518530/
Technology Overview:
The present technology provides a mechanism for validating the legal execution path and instructions along the legal execution path that works in parallel with normal program execution and imposes a very small performance penalty. The reference information for the validation is stored in an encrypted form in memory. The mechanism is capable of detecting various control flow attacks and dynamic changes to program executables that are done at run-time. Thus, the mechanism provides the basis for building truly trusted computing platforms.
Advantages:
- Performs real-time authentication of programs, libraries and operating system code as the program executes with negligible impact on performance in most cases.
- Guarantees the detection of control flow attacks and attacks that dynamically change the program executables.
- Can be easily be retrofitted to an existing microprocessor.
Intellectual Property Summary:
Patent rights available for licensing.