Hard disk firmware attack preventing system and method

A hard disk and firmware technology, applied in the field of information security, to achieve the effect of a wide range of firmware attack behavior characteristics

Inactive Publication Date: 2016-08-17
张曦
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem solved by the present invention is: to overcome the deficiencies of existing methods, to provide a system and method for preventing hard disk firmware attacks, which can block all hard disk attack commands, and can capture suspicious command information for manual analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hard disk firmware attack preventing system and method
  • Hard disk firmware attack preventing system and method
  • Hard disk firmware attack preventing system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with the accompanying drawings and preferred embodiments.

[0027] Such as figure 1 Shown is a schematic diagram of the system structure of the present invention. include:

[0028] The black and white list database 10 stores the blacklist and whitelist of the invariant characteristics of the hard disk instructions; the whitelist matching module 11 receives the hard disk control instructions sent by the computer, obtains the instruction identity information of the received instructions, and compares the instruction invariant characteristics of the above-mentioned instructions Whether it matches the invariant feature of the instruction in the whitelist; the instruction blocking and forwarding module 12 is connected with the whitelist matching module 11, and directly returns the result data to the computer for the above-mentioned unmatched hard disk control instruction, and directly returns the result da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hard disk firmware attack preventing system. The system comprises a blacklist and white list database used for storing a blacklist and a white list of hard disk instruction invariant features, a white list matching module used for receiving hard disk control instructions sent out by a computer and comparing whether the hard disk control instructions are matched with the white list or not, an instruction blocking and transmitting module used for blocking the unmatched hard disk control instructions and transmitting the matched instructions to a hard disk, and a suspicious instruction processing module used for outputting instruction identity information of the instructions which are not matched with the white list or the blacklist so that the instruction identity information can be analyzed manually. The invention further provides a hard disk firmware attack preventing method. On the premise that the computer normally visits hard disk user data, the purposes of blocking hostile attacks and recognizing unknown behaviors are achieved.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a system and method for preventing hard disk firmware attacks. Background technique [0002] With the development of hacking technology, firmware attack has become a new security threat faced by information equipment. The hard disk firmware contains the codes and parameters required by the hard disk microprocessor to control the operation of each electromagnetic component. Its storage area is isolated from the user data area and cannot be recognized by the API or software using standard operating system instructions. Can be operated. If exploited by hackers, it can achieve the purpose of deeply hiding data, damaging hard drives, etc., which is extremely harmful. [0003] The interaction between the computer and the hard disk is mainly through the command register group. Among them, there are 7 registers related to control, and each register is 8 bits. In theory, there are 2 ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/78
CPCG06F21/57G06F21/78
Inventor 袁建国张曦
Owner 张曦
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products