FIELD: information technology.
SUBSTANCE: method comprises the steps of: storing the first memory address in the lower limit register of the stack by the data processing system, wherein the lower boundary register of the stack is associated with at least one of the following modes: 32-bit user mode, 64-bit user mode or privileged mode, the first memory address indicates the lower limit of the memory addressable through the stack segment; store the second memory address in the upper-border register of the stack. The upper bound of the stack is associated with at least one of the following modes: 32-bit user mode, 64-bit user mode, or privileged mode, the second memory address indicates the upper limit of the memory addressed through the stack segment; determining access to memory through the stack segment; and detecting an unauthorized stack move by comparing the address of the memory accessed through the stack segment with at least the first memory address and the second memory address.
EFFECT: preventing unauthorized modification of the stack.
19 cl, 11 dwg
Authors
Dates
2017-08-29—Published
2014-05-30—Filed