Preventing unauthorized calls to a protected function

    公开(公告)号:US09721120B2

    公开(公告)日:2017-08-01

    申请号:US13893463

    申请日:2013-05-14

    Applicant: Apple Inc.

    CPC classification number: G06F21/629 G06F21/125

    Abstract: An obfuscated program can be configured to resist attacks in which an attacker directly calls a non-entry function by verifying that an execution path to the function is an authorized execution path. To detect an unauthorized execution order, a secret value is embedded in each function along an authorized execution path. At runtime, the secrets are combined to generate a runtime representation of the execution path, and the runtime representation is verified against an expected value. To perform the verification, a verification polynomial is evaluated using the runtime representation as input. A verification value result of zero means the execution path is an authorized execution path.

    PREVENTING UNAUTHORIZED CALLS TO A PROTECTED FUNCTION
    2.
    发明申请
    PREVENTING UNAUTHORIZED CALLS TO A PROTECTED FUNCTION 有权
    防止未经授权的呼叫保护功能

    公开(公告)号:US20140344924A1

    公开(公告)日:2014-11-20

    申请号:US13893463

    申请日:2013-05-14

    Applicant: APPLE INC.

    CPC classification number: G06F21/629 G06F21/125

    Abstract: An obfuscated program can be configured to resist attacks in which an attacker directly calls a non-entry function by verifying that an execution path to the function is an authorized execution path. To detect an unauthorized execution order, a secret value is embedded in each function along an authorized execution path. At runtime, the secrets are combined to generate a runtime representation of the execution path, and the runtime representation is verified against an expected value. To perform the verification, a verification polynomial is evaluated using the runtime representation as input. A verification value result of zero means the execution path is an authorized execution path.

    Abstract translation: 可以配置一个混淆程序,以抵御攻击者通过验证到该功能的执行路径是授权的执行路径直接调用非入口功能的攻击。 为了检测未经授权的执行顺序,秘密值被嵌入在沿着授权的执行路径的每个功能中。 在运行时,组合秘密以生成执行路径的运行时表示,并根据预期值验证运行时间表示。 为了执行验证,使用运行时表示作为输入来评估验证多项式。 验证值结果为零表示执行路径是授权的执行路径。

Patent Agency Ranking