Method and system for verifying software completeness

A technology of integrity verification and software, which is applied in the field of computer security, can solve the problems of lack of universality and compatibility of integrity verification methods, and rely on the integrity of the operating system to achieve the effects of reducing verification overhead, enhancing security, and reducing costs

Inactive Publication Date: 2009-12-02
BEIHANG UNIV
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The present invention provides a software integrity verification method and system. In order to solve the problem that the software integrity verification methods in the prior art are located inside the operating system and depend on the integrity of the operating system, and that the integrity verification methods in the prior art lack universal sex and compatibility issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for verifying software completeness
  • Method and system for verifying software completeness
  • Method and system for verifying software completeness

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0033] The embodiment of the present invention provides a software integrity verification method, which is used to solve the problem that the software integrity verification methods are all based on the inside of the operating system, rely on the integrity of the operating system, and the existing integrity verification methods lack versatility and compatibility. question.

[0034] figure 1 It is a flowchart of a software integrity verification method in Embodiment 1 of the present invention; specifically, it includes the following steps:

[0035] Step 100, in the virtual machine monitor, obtain the path of the loaded executable file by intercepting the system call of the upper-layer operating system;

[0036] To implement the software integrity verification method of this implementation, first, a virtual m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for verifying software completeness. The method comprises the following steps: acquiring path of a loaded executable file through capturing system call of an upper operation system in a virtual machine monitor; acquiring a Hash value of the executable file according to the path of the executable file; comparing the Hash value of the executable file with software fingerprints in a fingerprint bank; and carrying out completeness verification on the executable file according to the result of fingerprint comparison. The invention also discloses a software completeness verification system. The method and the system for software completeness verification realize software completeness verification in the virtual monitor, is independent of the operation system without depending on completeness of the operation system, improves security of the system, and has universality and compatibility. The technical proposal belongs to completeness verification of software in loading period, reduces verification cost without support of auxiliary hardware, reduces cost and improves performance compared with the method for verifying completeness of a file system.

Description

technical field [0001] The invention relates to a software integrity verification method and system, in particular to a software integrity verification method and system at a virtual machine monitor layer, belonging to the technical field of computer security. Background technique [0002] With the rapid development of Internet technology, network security has become a major aspect of the Internet that cannot be ignored. The continuous proliferation of malicious software such as viruses, Trojan horses, spyware, and rootkits has seriously threatened Internet security and has become the number one threat in the field of network security. From a technical point of view, malware has the following characteristics: [0003] (a) Concealment: It runs in the software system in a way that is not noticed by the user; after running, it usually hides its own existence, so as to escape the detection of security tools such as anti-virus software. For example, malware often hides its own p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/52
Inventor 李建欣李博李沁刘新刚侯毅
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products