Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and terminal for preventing malicious modification of process address space

A technology of address space and malicious modification, applied in computer security devices, instruments, computing, etc., can solve the problem of modifying the target process at will, and achieve the effect of preventing malicious programs from harming the terminal

Active Publication Date: 2019-12-03
ZHUHAI BAOQU TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present invention discloses a method, device and terminal for preventing malicious modification of a process address space, which can solve the problem that a malicious program modifies the address space of a target process at will

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and terminal for preventing malicious modification of process address space
  • Method, device and terminal for preventing malicious modification of process address space
  • Method, device and terminal for preventing malicious modification of process address space

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] It should be noted that the terms used in the embodiments of the present invention are only for the purpose of describing specific embodiments, and are not intended to limit the present invention. As used in the embodiments of the present invention and the appended claims, the singular forms "a", "said" and "the" are also intended to include the plural forms unless the context clearly indicates otherwise. It should also be understood that t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a process address space anti-malicious modification method, device and terminal; the method comprises the following steps: using a hook function to receive a process address space modification request, and obtaining the operator identity identification and object process identification according to the process address space modification request, wherein the object process refers to the process to which the process address space belongs; determining whether the process address space modification request satisfies a rejection condition or not according to the operator identity identification and object process identification; rejecting the process address space modification request if the rejection condition is satisfied. The method can solve the problems that a malicious program can modify the object process address space at will.

Description

technical field [0001] The invention relates to terminal technology, in particular to a method, device and terminal for preventing malicious modification of a process address space. Background technique [0002] With the development of Internet technology, malicious program technologies such as viruses and Trojan horses emerge in an endless stream. Some malicious programs use remote threads to inject dynamic link libraries into the target process to run, so as to achieve the purpose of endangering the target terminal. To inject the dynamic link library module into the target process for the malicious program to run, it needs to create a new memory space on the target process to ensure the memory overhead required for injecting the dynamic link library module, and then modify this memory space. Contents of the invention [0003] The embodiment of the invention discloses a method, device and terminal for preventing malicious modification of a process address space, which can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 李文靖
Owner ZHUHAI BAOQU TECH CO LTD