Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for obtaining kernel control flow chart of operating system

A control flow chart and operating system technology, applied in the field of computer kernel, can solve the problems of low accuracy of control flow chart and inability to effectively eliminate computer attacks, etc.

Active Publication Date: 2016-10-05
HUAWEI TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention provides a method and device for obtaining the kernel control flow chart of the operating system, so as to overcome the problem that the accuracy of the control flow chart obtained in the prior art is too low, so that the attack on the computer cannot be effectively eliminated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for obtaining kernel control flow chart of operating system
  • Method and apparatus for obtaining kernel control flow chart of operating system
  • Method and apparatus for obtaining kernel control flow chart of operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0147] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0148] figure 1 The flow chart of the method for obtaining the kernel control flow chart of the operating system provided by the present invention, such as figure 1 As shown, the method of this embodiment may include:

[0149] Step 101: Perform code disassembly on the kernel image file of the operating system to obtain a disassembled code f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and an apparatus for obtaining a kernel control flow chart of an operating system. The method comprises the steps of performing code disassembling on the kernel mirror image file of the operating system to obtain a disassembled code file; determining an intermediate code file corresponding to the kernel source code of the operating system according to the kernel source code of the operating system; determining an indirect function control flow chart according to the disassembled code file and the intermediate code file; determining a direct function control flow chart according to the disassembled code file; and determining the kernel control flow chart according to the indirect function control flow chart and the direct function control flow chart. By adoption of the technical scheme provided by the invention, the accuracy of the control flow chart can be improved so as to eliminate attack to a computer.

Description

technical field [0001] The invention relates to computer kernel technology, in particular to a method and device for obtaining a kernel control flowchart of an operating system. Background technique [0002] With the development of computer technology, more and more security issues have brought great losses and troubles to people. [0003] Among various network attack methods, using system vulnerabilities to carry out attacks is a relatively common attack method. Attackers use buffer overflow vulnerabilities to tamper with the control data in the operating system kernel and overwrite the function return address with the address of the system library function. Overwrite the parameters with the parameters of the system function, so that the normal execution flow (or control flow) of the operating system can be transferred, and the purpose of obtaining the system control authority. [0004] If the control flow of the operating system kernel can be protected to prevent the norm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44
Inventor 李金库张相锋涂彬
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products