A method of operating system kernel integrity protection

An integrity protection, operating system technology, applied in the field of integrity monitoring and protection of the operating system kernel, can solve problems such as reduced practicability, and achieve the effect of protecting security and executing safely and efficiently

Active Publication Date: 2017-12-19
NANJING UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

VMM needs to perform virtualization operations for the operating system and needs to intervene in the kernel integrity check and protection process, which will cause serious performance overhead and greatly reduce the practicality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of operating system kernel integrity protection
  • A method of operating system kernel integrity protection
  • A method of operating system kernel integrity protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described below in conjunction with the accompanying drawings.

[0032] Such as figure 1As shown, an operating system kernel integrity protection system provided by the present invention includes components including an integrity protection program IPS, a kernel hook, a jump code, a target system Target OS, and a monitoring protector. When it is necessary to implement integrity monitoring and protection for the operating system kernel, the integrity protection program IPS is loaded into the Target OS address space of the target operating system through a kernel module, configures the monitoring protection environment, and registers with the monitoring protector , to build an isolated and protected operating environment. The integrity protection program IPS itself encapsulates the relevant codes for integrity checking and protection of the Target OS kernel, as well as the data segments and work stacks required at runtime, forming a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for protecting integrity of a kernel of an operating system. An operating system kernel integrity protecting system comprises integrity protection software (IPS), a kernel hook, skip codes, a target operating system (Target OS) and a monitor protector. The method comprises the following steps: (1) starting up and initializing the monitor protector; after initializing is completed, waiting for request operation of the IPS; (2) logging in the IPS and setting a monitoring and protecting environment; (3) monitoring and protecting the integrity of the kernel of the Target OS; when a hook, arranged in the kernel, of the IPS is triggered, checking the integrity of the kernel of the Target OS, protecting a kernel event from occurring, and then, switching into the IPS for corresponding processing; (4) logging off the IPS and clearing the monitoring and protecting environment; clearing the monitoring and protecting environment established in the step (2), and recovering the normal operation of the Target OS.

Description

technical field [0001] The invention relates to the safety protection of the operating system, in particular to a method for monitoring and protecting the integrity of the operating system kernel. Background technique [0002] The kernel code of the operating system has a large scale and complex structure, and in order to ensure the operating efficiency of the system, it is usually written in an unsafe programming language, so there are a large number of loopholes and errors in it. Attackers can use these vulnerabilities to attack the kernel, modify the key state of the kernel, and execute arbitrary malicious codes. Therefore, the operating system kernel is facing very serious security problems. Monitoring and protecting the integrity of the operating system kernel can effectively improve its security. [0003] The integrity protection of the existing operating system kernel mostly adopts the mechanism of the virtual machine monitor VMM. These VMMs must provide virtualizati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/62
CPCG06F21/57G06F21/6218
Inventor 曾庆凯黄啸
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products