Kernel vulnerability discovery method and device, computing equipment and computer storage medium

A vulnerability mining and kernel technology, applied in the field of information security, can solve problems such as discovery difficulties and achieve the effect of avoiding attacks

Active Publication Date: 2017-10-03
BEIJING QIHOO TECH CO LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For traditional memory corruption vulnerabilities, the vulnerability itself will affect the normal operation of the system. Tools such as a verifier can be used to capture such anomalies more conveniently, but information leakage vulnerabilities will not trigger anomalies. Nor do they interfere with the proper functioning of the system, which makes finding them more difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Kernel vulnerability discovery method and device, computing equipment and computer storage medium
  • Kernel vulnerability discovery method and device, computing equipment and computer storage medium
  • Kernel vulnerability discovery method and device, computing equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0028] figure 1 A flow chart of a method for mining kernel vulnerabilities according to an embodiment of the present invention is shown. Such as figure 1 As shown, the method includes the following steps:

[0029] Step S101 , monitor the operation of the kernel writing data to the memory in the user state, and obtain log information related to the operation of writing data.

[0030] During the running process of the kernel, ther...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a kernel vulnerability discovery method and device, computing equipment and a computer storage medium. The kernel vulnerability discovery method includes the steps that operation of writing data in a user state memory by a kernel is monitored, and log information related with the operation of writing the data is acquired; the log information is analyzed, and an occurrence point of a kernel vulnerability is found out; readable information of the occurrence point of the kernel vulnerability is generated. According to the scheme, the leakage position, namely the occurrence point of the kernel vulnerability, of kernel information can be found out by analyzing the log information related with the operation of writing the data in the user state memory by the kernel, the vulnerability where the kernel information leaks can be easily, conveniently and efficiently found out in the mode, and following restoration is convenient.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a kernel vulnerability mining method, device, computing device and computer storage medium. Background technique [0002] The kernel is the core of an operating system and is also the first layer of software expansion based on hardware. It provides the most basic functions of the operating system and is the basis for the operation of the operating system. At the same time, kernel information leakage means that key information in the kernel may be used by exploiters to attack the system and other operations. [0003] Existing technologies have some mitigation measures for this type of kernel information leakage vulnerability: after the Windows Vista operating system, Microsoft introduced an address space configuration random loading technology (Kernel Address Space Layout Randomization, hereinafter referred to as KASLR) to the kernel, and KASLR randomized the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 范晓草潘剑锋闫广禄
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products