Implementation method for isomerizing function-equivalent executers

An implementation method and technology for implementing bodies, applied in the field of network security, can solve problems such as difficulties, complex functions and structures of executive bodies, and difficulty in constructing heterogeneous executive bodies with equivalent functions, so as to achieve a wide range of applications and reduce the cost of implementation of isomerization. Effect

Active Publication Date: 2018-08-03
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in practical applications, some executives have complex functional structures, and it is difficult to construct heterogeneous executives with equivalent functions, which brings great difficulties to the construction of computer information systems with high reliability and high security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method for isomerizing function-equivalent executers
  • Implementation method for isomerizing function-equivalent executers
  • Implementation method for isomerizing function-equivalent executers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Embodiment one, such as figure 1 and figure 2 As shown, this embodiment provides a method for implementing heterogeneous functionally equivalent executives, the method including:

[0028] Step S201, according to the operation logic function of the executive body, it is divided into key group subsets and non-key group subsets, and the user can realize the heterogeneity of the executive bodies by isomerizing the key group subsets;

[0029] Preferably, the elements of the key group subset are core components hidden in the executive body or added to the executive body and do not affect the functional components of the executive body; the key group subsets are under the condition that they are not modified , which cannot be bypassed in the running logic of the execution body where it is located.

[0030] It can be understood that the elements of the key group subset may be key nodes in the data flow diagram of the executive, or a necessary condition for triggering the key...

Embodiment 2

[0040] Embodiment two, such as image 3 As shown, a SGX-based implementation method for heterogeneous functional equivalent executives includes the following steps:

[0041]Step S301, perform modeling and abstraction according to the logic function of the executive body, and analyze and obtain the key group subset according to the principle of minimizing the key group subset. The elements in the key group subset can be the key modules of the internally extracted executive logic. , or add a module that does not affect its normal function at the external IO interface of the executive body;

[0042] Step S302, judge the component category of the executable, if it is a non-key group subset, go to step S303, if it is a key group subset, go to step S304;

[0043] Step S303, executing its elements in a common execution environment;

[0044] Step S304, deploy redundant functionally equivalent executives, and isomerize the key component subsets in each executive;

[0045] Step S305,...

Embodiment 3

[0050] Embodiment three, such as Figure 4 As shown, a heterogeneous function equivalent execution method based on CPU+heterogeneous computing platform includes the following steps:

[0051] Step S401: Carry out modeling and abstraction according to the logic function of the executive body, and analyze and obtain the key group subset according to the principle of minimizing the key group subset. The elements in the key group subset can be the key modules of the internally extracted executive logic. , or add a module that does not affect its normal function at the external IO interface of the executive body;

[0052] Step S402, judge the component category of the executable, if it is a non-key group subset, go to step S403, if it is a key group subset, go to step S404;

[0053] Step S403, executing its elements in a common execution environment;

[0054] Step S404, deploy redundant functionally equivalent executives, and isomerize the key component subsets in each executive; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security, and particularly relates to an implementation method for isomerizing function-equivalent executers. The implementation method comprises the steps that firstly, key component subsets, non key component subsets and isomerized key component subsets are obtained through partitioning according to the operation logic functions of the executer; secondly, specific function areas are constructed through a hardware or software mode; and finally, redundant function-equivalent isomerized executers are deployed, the key component subsets ofthe function-equivalent isomerized executers are placed in different specific function areas to be executed, and different implementation schemes are set for the specific function areas according to different security requirements of users. The method is suitable for the executer scenes with the simple function structure and particularly suitable for the executer scenes with the complex function structure and can protect the executers from being attacked by malicious software.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a method for realizing a heterogeneous function equivalent execution body. Background technique [0002] With the continuous development and popularization of network equipment and services, people are increasingly dependent on cyberspace, and the importance of network security has become increasingly prominent. In the traditional cyberspace field, the attributes of equipment and devices (including software and hardware) that complete specific service functions are static and definite, and there is a strong correlation with their internal structures. The collection and analysis of characterization content and corresponding relationship can grasp specific information about equipment and devices to a certain extent, and may discover exploitable loopholes or defects, and then carry out intrusions and threaten cyberspace security. [0003] The mimic defense arch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0428H04L63/205
Inventor 邬江兴扈红超程国振艾健健刘文彦霍树民梁浩
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products