Computer Stack Protection

Method of Protecting a Computer Stack

This technology protects against malware that attempts to gain control by corrupting return addresses kept on a computers stack. This is commonly known as return oriented programming (ROP). ROP is one of the most vicious techniques malware authors use and easily encompasses 50% of malware today. This invention’s approach modifies the hardware of a computer’s central processing unit (CPU) using a second stack to validate return addresses stored on the existing stack. The system’s hardware-based approach works transparently with unmodified binary applications and does not degrade processing efficiency.

 

Abstract: 

Click to view PDFs of these patents on the US Patent and Trademark Office website: Patent 7,581,089

applications: 
  • E-commerce security
  • Protection of network-enabled objects
Patent Number: 
7,581,089
Patent Issue Date: 
August 25, 2009
Email: 
tech_transfer@nsa.gov
Lab Representatives
Share to Facebook Share to Twitter Share to Google Plus Share to Linkedin