Kernel code protection method based on Harvard architecture

A kernel and code technology, applied in the field of protecting kernel code, to achieve the effect of convenient deployment, guaranteed safety, and small performance loss

Inactive Publication Date: 2010-03-17
HUNAN UNIV
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to improve the parallelism of the CPU executing instructions, the five processes of the pipeline should be able to run without interfering with each other, but the two stages of fetching and accessing memory must access the memory, and the memory can only be used at a certain time. a memory access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Kernel code protection method based on Harvard architecture
  • Kernel code protection method based on Harvard architecture
  • Kernel code protection method based on Harvard architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The method of the present invention does not require too much hardware, although it is a virtualization technology, it does not need the support of CPU hardware virtualization technology, so the experimental platform of the present invention can be a computer with common configuration. As shown in the table below.

[0034] Table 1 The hardware and software configuration of the experiment

[0035]

[0036] The realization of the method of the present invention needs to recompile the kernel. Since Fedora Core 4 itself has no source code package, so in order to set up the protection mechanism of the present invention, the kernel source code package of the current operating system must be installed at first. Then modify the current kernel source code and recompile to get the required kernel.

[0037] There are four steps to build an experimental test environment based on the software and hardware environment: install the kernel source code package, modify the kernel sour...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of computer security, and provides a kernel code protection method by using the virtualized Harvard memory architecture by combining the research of virtualization technology in order to overcome the shortage of the kernel code protection of the prior operating system. The method realizes the virtualized Harvard memory architecture on a computer based on the vonNeumann architecture by a kernel patch form and separates an instruction operation and a data operation in a memory area of the kernel code so as to basically prevent the probability of distortion forthe kernel code. The invention can well prevent the threat of the kernel grade Rootkit on the kernel code, record information associated with illegal operations while ensuring the integrality of thekernel code, and provide clue for analyzing attacks; in the aspect of performance, the method fully utilizes an instruction TLB (Translation Lookaside Buffer, namely branch translation buffer or pagetable buffer) and data TLB without remarkably influencing the performance of the operating system.

Description

technical field [0001] The invention belongs to the field of computer security, in particular to a method for protecting kernel codes in a Linux operating system. Background technique [0002] The computer operating system manages hardware resources downwards and provides interfaces for application programs upwards, playing an important role in the computer system. In order to make better use of underlying hardware resources and provide better services for upper-layer software, operating systems are becoming increasingly complex, the most direct manifestation of which is the increasing complexity of operating system codes. For example, the kernel codes of Linux and Windows XP, the two most popular operating systems, are 4.3 million lines and 40 million lines respectively. There must be some loopholes in such complicated operating system kernel codes, and the resulting security risks have seriously affected the security of computer systems. [0003] The traditional way to p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/12
Inventor 孙建华陈浩李兴邦刘志容
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products