Open Text has patented a system for detecting and mitigating stack pivoting exploits in software code. The system defines memory ranges for processes and automatically performs remedial actions when a stack pivot exploit is detected. Checkpoints are executed to monitor stack pivots in different execution modes. GlobalData’s report on Open Text gives a 360-degree view of the company including its patenting strategy. Buy the report here.

Access deeper industry intelligence

Experience unmatched clarity with a single platform that combines unique data, AI, and human expertise.

Find out more

According to GlobalData’s company profile on Open Text, AI for workflow management was a key innovation area identified from patents. Open Text's grant share as of May 2024 was 49%. Grant share is based on the ratio of number of grants to total number of patents.

Stack pivot exploit detection and mitigation system

Source: United States Patent and Trademark Office (USPTO). Credit: Open Text Corp

A recently granted patent (Publication Number: US12013929B2) discloses a system for stack pivot exploit detection and mitigation. The system includes a processor and memory storing instructions that, when executed, perform operations for stack pivot detection and mitigation. These operations involve defining thread information for a process, generating memory base and limit pointers, comparing memory pointers to determine if they are within the memory range, and executing a series of checkpoints to detect stack pivots in different execution modes. Remedial actions are taken when a stack pivot exploit is detected, such as generating notifications, terminating processes, modifying user permissions, or quarantining files associated with the process.

Furthermore, the patent also covers a method and a computer storage device capable of performing the same stack pivot exploit detection and mitigation process. The method involves defining thread information, generating memory pointers, comparing them to determine memory range inclusion, and executing checkpoints specific to different file types or files. The computer storage device stores instructions for executing this method, ensuring the detection and mitigation of stack pivot exploits across various execution modes. The remedial actions and series of checkpoints are designed to enhance the security of processes and prevent unauthorized access or exploitation through stack pivots.

To know more about GlobalData’s detailed insights on Open Text, buy the report here.

Data Insights

From

The gold standard of business intelligence.

Blending expert knowledge with cutting-edge technology, GlobalData’s unrivalled proprietary data will enable you to decode what’s happening in your market. You can make better informed decisions and gain a future-proof advantage over your competitors.

GlobalData

GlobalData, the leading provider of industry intelligence, provided the underlying data, research, and analysis used to produce this article.

GlobalData Patent Analytics tracks bibliographic data, legal events data, point in time patent ownerships, and backward and forward citations from global patenting offices. Textual analysis and official patent classifications are used to group patents into key thematic areas and link them to specific companies across the world’s largest industries.