Guarantees the detection of control flow attacks and attacks that dynamically change the program executables. Can be easily retrofitted to an existing microprocessor.
About
This technology provides a mechanism for validating the legal execution path and instructions along the legal execution path that works in parallel with normal program execution and imposes a very small performance penalty. The reference information for the validation is stored in an encrypted form in memory. The mechanism is capable of detecting various control flow attacks and dynamic changes to program executables that are done at run-time. Thus, the mechanism provides the basis for building truly trusted computing platforms. ADVANTAGES: Performs real-time authentication of programs, libraries and operating system code as the program executes with negligible impact on performance in most cases. Guarantees the detection of control flow attacks and attacks that dynamically change the program executables. Can be easily retrofitted to an existing microprocessor. PATENTING: US 8,285,999 & US 8,930,705