Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method for processing and generating kernel image, kernel initialization method and device and equipment

A technology of kernel mirroring and initialization, which is applied in electrical digital data processing, computer security devices, instruments, etc., can solve problems such as threats to kernel security, and achieve the effect of improving security and increasing difficulty

Active Publication Date: 2018-02-13
BANMA ZHIXING NETWORK HONGKONG CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, attackers can obtain kernel information through kernel arbitrary address readable vulnerabilities, which greatly threatens the security of the kernel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for processing and generating kernel image, kernel initialization method and device and equipment
  • Method for processing and generating kernel image, kernel initialization method and device and equipment
  • Method for processing and generating kernel image, kernel initialization method and device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0055] Terms used in the embodiments of the present invention are only for the purpose of describing specific embodiments, and are not intended to limit the present invention. As used in the embodiments of the present invention and the appended claims, the singular forms "a", "said" and "the" are also intended to include the plural forms unless the context clearly dictates otherwise.

[0056] It should be understood that the term "and / or" used herein is only an association relationship describing associated objects, indicating that there may be three relationships, for example, A and / or B, which may mean that A exists alone, and A and B exist simultaneously. B, there are three situations of B alone. In addition, the character " / " in this article ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for processing and generating a kernel image, a method and device for kernel initialization method and equipment. Interference sub pages are inserted into a virtual address space corresponding to the kernel image; in the kernel initialization phase, partial or all interference sub pages are selected from the interference sub pages, and the selected interference subpages are made to be free of mapped physical address. In this way, when an attacker utilizes any kernel address readable bugs, and when it is scanned that no interference sub page of the mapped physical address exists, abnormity is returned, and then stable scanning of the kernel virtual address space is difficult, the attack difficulty is improved to a certain extent, and the kernel information security is improved.

Description

【Technical field】 [0001] The invention relates to the technical field of computer applications, in particular to a method for processing and generating a kernel image, a kernel initialization method, device and equipment. 【Background technique】 [0002] The kernel is the core part of the operating system, and kernel information disclosure vulnerabilities are related to the security of the entire operating system. Kernel arbitrary address readable vulnerability is a kind of kernel information disclosure vulnerability. By analyzing the kernel image or files describing the physical address distribution of the kernel (such as " / proc / iomem file"), the start and end physical addresses of the kernel image are obtained. One, and then calculate the start and end virtual addresses of the kernel according to the linear mapping rules, and then further obtain kernel information by scanning the virtual address space of the kernel. Therefore, attackers can obtain kernel information throug...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F12/0882G06F12/1036
CPCG06F12/0882G06F12/1036G06F21/577
Inventor 李丹裘绍翔张智宇
Owner BANMA ZHIXING NETWORK HONGKONG CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More