An efficient method for protecting entry addresses in computer programs allows direct jumps to permissible entry addresses. The permissible entry addresses are identified with a correlation of data which are not provided within the same individual instruction. By organizing the program code, the compiler or linker ensures that only legal entry addresses satisfy this correlation.

 
Web www.patentalert.com

< Apparatus and method for providing secure communication on a network

< Adaptive runtime repairable entry register file

> Method and apparatus for providing seamless hooking and intercepting of selected kernel and HAL exported entry points

> Installing software on a mobile computing device using the rollback and security features of a configuration manager

~ 00259