会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • ISA bridging with callback
    • ISA与回调桥接
    • US09513977B2
    • 2016-12-06
    • US13995935
    • 2012-01-10
    • Jianhui LiLing LinYong WuXiaodong LinWen TanHonesty Cheng YoungYihua Jin
    • Jianhui LiLing LinYong WuXiaodong LinWen TanHonesty Cheng YoungYihua Jin
    • G06F3/00G06F9/54G06F9/455
    • G06F9/54G06F9/45504G06F9/541
    • Methods, apparatuses and storage medium associated with ISA bridging with callback, are disclosed. In various embodiments, at least one computer-readable storage medium may include instructions configured to enable a target device with a target ISA, in response to execution of the instructions, to provide an ISA bridging layer to the target device to facilitate a library service to callback a callback function of an application. The library service may be implemented for the target ISA, and the application may be implemented at least partially for a source ISA that may be different from the target ISA. The ISA bridging layer may include a source ISA emulator and a library emulator configured to cooperate to enable the application to call the library service, and the library service to callback the callback function, across the two instruction set architectures. Other embodiments may be disclosed or claimed.
    • 公开了与与回调桥接的ISA相关联的方法,装置和存储介质。 在各种实施例中,至少一个计算机可读存储介质可以包括被配置为使得具有目标ISA的目标设备响应于指令的执行而向目标设备提供ISA桥接层以促进图书馆服务 回调一个应用程序的回调函数。 可以为目标ISA实现库服务,并且应用可以至少部分地针对可能与目标ISA不同的源ISA来实现。 ISA桥接层可以包括源ISA仿真器和库仿真器,其被配置为协作以使应用能够调用库服务,并且库服务在两个指令集体系结构之间回调回调函数。 可以公开或要求保护其他实施例。
    • 5. 发明申请
    • ISA BRIDGING INCLUDING SUPPORT FOR CALL TO OVERIDDING VIRTUAL FUNCTIONS
    • ISA桥接包括支持以覆盖虚拟功能
    • US20140046649A1
    • 2014-02-13
    • US13745203
    • 2013-01-18
    • Yong WuJianhui LiXiaodong Lin
    • Yong WuJianhui LiXiaodong Lin
    • G06F9/455
    • G06F9/45504G06F9/455G06F9/45508G06F9/541
    • Methods, apparatuses and storage medium associated with ISA bridging with support for virtual functions, are disclosed. In embodiments, at least one computer-readable storage medium may include instructions configured to enable a target device with a target ISA, in response to execution, to provide an ISA bridging layer to the target device to facilitate a library service of a library of the target device to call a virtual function of the library, while servicing an application operating on the target device, where the application has an overriding implementation. The ISA bridging layer may include a loader configured to load the application for execution, and as part of loading the application, detect the virtual function and modify a virtual function table of the application to enable the call. Other embodiments may be disclosed or claimed.
    • 公开了与支持虚拟功能的ISA桥接相关联的方法,装置和存储介质。 在实施例中,至少一个计算机可读存储介质可以包括被配置为使得具有目标ISA的目标设备响应于执行而向目标设备提供ISA桥接层以促进图书馆服务 目标设备调用库的虚拟功能,同时为在目标设备上运行的应用程序提供服务,其中应用程序具有重写的实现。 ISA桥接层可以包括被配置为加载应用以执行的加载器,并且作为加载应用的一部分,检测虚拟功能并修改应用的虚拟功能表以启用该呼叫。 可以公开或要求保护其他实施例。
    • 8. 发明申请
    • Preventing stack buffer overflow attacks
    • 防止堆栈缓冲区溢出攻击
    • US20160098556A1
    • 2016-04-07
    • US14970397
    • 2015-12-15
    • Khalid Nawaf ALHARBIXiaodong LINNorthern Borders University
    • Khalid Nawaf ALHARBIXiaodong LIN
    • G06F21/52
    • G06F21/52G06F21/64G06F2221/033
    • Improved buffer overflow protection for a computer function call stack is provided by placing a predetermined ShadowKEY value on a function's call stack frame and copying the ShadowKEY, a caller EBP, and a return pointer are pushed onto a duplicate stack. The prologue of the function may be modified for this purpose. The function epilogue is modified to compare the current values of the ShadowKEY, caller EBP, and the return pointer on the function stack to the copies stored on the duplicate stack. If they are not identical, an overflow is detected. The preserved copies of these values may be copied back to the function stack frame thereby enabling execution of the process to continue. A function prologue and epilogue may be modified during compilation of the program.
    • 通过在函数的调用堆栈框架上放置一个预定的ShadowKEY值并复制ShadowKEY,一个调用者EBP和一个返回指针来提供对计算机函数调用堆栈的改进的缓冲区溢出保护。 为此,可以修改该功能的序言。 修改函数结尾,将ShadowKEY,调用者EBP和函数堆栈上的返回指针的当前值与存储在重复堆栈上的副本进行比较。 如果它们不相同,则检测到溢出。 这些值的保留副本可以被复制回到功能堆栈帧,从而使得该进程的执行继续。 在程序编译期间可能会修改函数序言和结尾语。
    • 9. 发明申请
    • Preventing stack buffer overflow attacks
    • 防止堆栈缓冲区溢出攻击
    • US20140283088A1
    • 2014-09-18
    • US13804056
    • 2013-03-14
    • Khalid Nawaf AlHarbiXiaodong LinNORTHERN BORDERS UNIVERSITY
    • Khalid Nawaf AlHarbiXiaodong Lin
    • G06F21/64
    • G06F21/52G06F21/64G06F2221/033
    • Improved buffer overflow protection for a computer function call stack is provided by placing a predetermined ShadowKEY value on a function's call stack frame and copying the ShadowKEY, a caller EBP, and a return pointer are pushed onto a duplicate stack. The prologue of the function may be modified for this purpose. The function epilogue is modified to compare the current values of the ShadowKEY, caller EBP, and the return pointer on the function stack to the copies stored on the duplicate stack. If they are not identical, an overflow is detected. The preserved copies of these values may be copied back to the function stack frame thereby enabling execution of the process to continue. A function prologue and epilogue may be modified during compilation of the program.
    • 通过在函数的调用堆栈框架上放置一个预定的ShadowKEY值并复制ShadowKEY,一个调用者EBP和一个返回指针来提供对计算机函数调用堆栈的改进的缓冲区溢出保护。 为此,可以修改该功能的序言。 修改函数结尾,将ShadowKEY,调用者EBP和函数堆栈上的返回指针的当前值与存储在重复堆栈上的副本进行比较。 如果它们不相同,则检测到溢出。 这些值的保留副本可以被复制回到功能堆栈帧,从而使得该进程的执行继续。 在程序编译期间可能会修改函数序言和结尾语。