The processor described here provides specific hardware support to detect common types of software vulnerabilities or weaknesses that lead to security violations in computing.

About

Since 2005, Mitre Corporation has developed a list of such vulnerabilities with Federal support and assistance from other organization. These are described in detail at: https://cwe.mitre.org/index.html. This disclosure describes specific details of the support in hardware that can be incorporated into an existing processor to detect and prevent the exploitations of the common software vulnerabilities in the software, either accidentally or maliciously by compromised programs. The mechanisms described are largely portable across different instruction sets, making them easy to adopt.

Key Benefits

Software vulnerabilities that may be left intentionally or unintentionally in programs are detected at run-time to prevent security exploits.

Register for free for full unlimited access to all innovation profiles on LEO

  • Discover articles from some of the world’s brightest minds, or share your thoughts and add one yourself
  • Connect with like-minded individuals and forge valuable relationships and collaboration partners
  • Innovate together, promote your expertise, or showcase your innovations