Kernel integrity detection method based on Xen virtualization
An integrity detection and virtualization technology, applied in platform integrity maintenance, software simulation/interpretation/simulation, memory address/allocation/relocation, etc., can solve the problem that security software does not have privileged advantages, and achieve the goal of ensuring security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0036] The present invention will be further described below in conjunction with the drawings.
[0037] 1. Overall structure design
[0038] The kernel integrity detection system based on Xen virtualization consists of three basic parts, which are the memory mapping part, the information acquisition part, and the security detection part. The system of the present invention is deployed in the management domain Dom0, effectively utilizes the isolation provided by Xen, and prevents the system of the present invention from being attacked by malicious software in the customer domain DomU. The overall system architecture diagram is as figure 1 Shown.
[0039] The functions of the above parts are as follows:
[0040] The memory mapping part simulates the paging mechanism in the customer domain DomU in the management domain Dom0, and provides an interface to obtain the machine byte data of the hardware level in the customer domain DomU, including obtaining the binary data of the register in ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap