Method and system for verifying software completeness

A technology of integrity verification and software, which is applied in the field of computer security, can solve the problems of lack of universality and compatibility of integrity verification methods, and rely on the integrity of the operating system to achieve the effects of reducing verification overhead, enhancing security, and reducing costs

Inactive Publication Date: 2011-03-23
BEIHANG UNIV
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The present invention provides a software integrity verification method and system. In order to solve the problem that the software integrity verification methods in the prior art are located inside the operating system and depend on the integrity of the operating system, and that the integrity verification methods in the prior art lack universal sex and compatibility issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for verifying software completeness
  • Method and system for verifying software completeness
  • Method and system for verifying software completeness

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] figure 1 It is a flowchart of a software integrity verification method in Embodiment 1 of the present invention; specifically, it includes the following steps:

[0061] Step 100, in the virtual machine monitor, obtain the path of the loaded executable file by intercepting the system call of the upper-layer operating system;

[0062] To implement the software integrity verification method of this implementation, first, a virtual machine monitor must be inserted under the operating system, and the integrity verification of executable files must be implemented at the virtual machine monitor layer. In this embodiment, the integrity verification is carried out for the executable file in the file, that is, the executable code or executable software; in the existing operating system, the executable code is divided into an application program (Application); It is a shared library); there are three types of kernel modules (also called drivers under windows). During the loadin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for verifying software completeness. The method comprises the following steps: acquiring path of a loaded executable file through capturing system call of an upper operation system in a virtual machine monitor; acquiring a Hash value of the executable file according to the path of the executable file; comparing the Hash value of the executable file with software fingerprints in a fingerprint bank; and carrying out completeness verification on the executable file according to the result of fingerprint comparison. The invention also discloses a software completeness verification system. The method and the system for software completeness verification realize software completeness verification in the virtual monitor, is independent of the operation system without depending on completeness of the operation system, improves security of the system, and has universality and compatibility. The technical proposal belongs to completeness verification of softwarein loading period, reduces verification cost without support of auxiliary hardware, reduces cost and improves performance compared with the method for verifying completeness of a file system.

Description

technical field [0001] The invention relates to a software integrity verification method and system, in particular to a software integrity verification method and system at a virtual machine monitor layer, belonging to the technical field of computer security. Background technique [0002] With the rapid development of Internet technology, network security has become a major aspect of the Internet that cannot be ignored. The continuous proliferation of malicious software such as viruses, Trojan horses, spyware, and rootkits has seriously threatened Internet security and has become the number one threat in the field of network security. From a technical point of view, malware has the following characteristics: [0003] (a) Concealment: It runs in the software system in a way that is not noticed by the user; after running, it usually hides its own existence, so as to escape the detection of security tools such as anti-virus software. For example, malware often hides its own p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/22G06F21/52
Inventor 李建欣李博李沁刘新刚侯毅
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products