Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A kind of active defense method and device

An active defense and versioning technology, applied in the direction of program code conversion, code compilation, program/content distribution protection, etc., to increase the cost of detection and attack, increase uncertainty, and reduce the time window of opportunity

Active Publication Date: 2021-04-06
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the security problems of embedded systems are difficult to solve in the IT security field (such as virus scanning, frequent patch updates)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of active defense method and device
  • A kind of active defense method and device
  • A kind of active defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to facilitate the understanding of those skilled in the art, the present invention will be further described below in conjunction with the accompanying drawings, which cannot be used to limit the protection scope of the present invention. It should be noted that, in the case of no conflict, the embodiments in the present application and various manners in the embodiments can be combined with each other.

[0053] see Figure 1A , the present invention proposes a kind of active defense method, described method comprises:

[0054] Step 100, generate multiple different heterogeneous versions by compiling according to the business source code;

[0055] Step 200, write the heterogeneous versions into multiple devices according to the multiple different heterogeneous versions.

[0056] Among them, see Figure 1B , step 100 includes:

[0057] Step 110, generating a header file for a new system call;

[0058] Step 120, compile the business source code according to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an active defense method and device. The method includes: generating a plurality of different heterogeneous versions by compiling according to the business source code; writing the heterogeneous versions into multiple devices according to the plurality of different heterogeneous versions middle. Through the solution of the present invention, when installing the same business software on different devices, different heterogeneous versions are used to integrate dynamic, diverse, random and other features into the existing software system, breaking the fixed and predictable system on which the attack chain depends. The expected and consistent law enables the software system to have the ability of mimetic active defense, thereby increasing the attacker's uncertainty of the system and the obvious attack complexity, reducing the attacker's opportunity time window, and increasing the attacker's detection and execution. The cost of the attack.

Description

technical field [0001] The invention relates to the field of software security, in particular to an active defense method and device. Background technique [0002] According to the statistics of relevant agencies, 80% of my country's key infrastructure (electricity, transportation, energy) relies on embedded system automation operations, and the scale of IoT devices will reach 50 billion in 2020. With the development of embedded systems, more and more problems have been discovered. Various malicious software, viruses, and Trojan horses threaten the security of individuals, industries, and countries. The exposed vulnerabilities and attack methods are increasing year by year, and there may be more unexposed problems. The rapidly developing embedded system faces many unknown security risks. [0003] In the field of embedded systems, in addition to facing these unknown security risks, there are also its own characteristics: the performance of the processor is lower than that of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14G06F8/41
CPCG06F8/41G06F21/14
Inventor 崔云峰钟卫东刘东王继刚
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products