Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and terminal equipment of layer-by-layer clamping variable positioning

A positioning method and pinching technology, applied in instruments, error detection/correction, calculation, etc., can solve the problems of difficult code location, difficulty in accurately locating the tampered position of variables, etc., and achieve a simple and easy-to-implement implementation and calling process. Effect

Active Publication Date: 2022-02-11
PAX COMP TECH SHENZHEN
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a layer-by-layer clamping type variable positioning method, system and terminal equipment to solve the difficulty in checking the code position where the variable has been tampered with only through simple manual inspection methods in the prior art. It is difficult to accurately locate the problem where variables have been tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and terminal equipment of layer-by-layer clamping variable positioning
  • Method, system and terminal equipment of layer-by-layer clamping variable positioning
  • Method, system and terminal equipment of layer-by-layer clamping variable positioning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] This embodiment provides a layer-by-layer clamping type variable positioning method, which is applied to any terminal device that can run an operating system and software program (for example, a mobile terminal such as a mobile phone, a tablet computer, a personal digital assistant, a notebook computer, and a smart bracelet) , PC (Personal Computer) client, test equipment, smart home equipment, etc.), mainly used to accurately locate the specific location of tampered variables in software programs.

[0030] In specific applications, the problem of variable tampering is usually caused by memory overflow.

[0031] In an embodiment, the executable operating system of the terminal device includes an embedded system (Embedded system).

[0032] like figure 1 As shown, the layer-by-layer clamping variable positioning method provided in this embodiment includes:

[0033] Step S100, defining a global pointer pointing to the target variable and a global variable for backing up ...

Embodiment 2

[0050] like figure 2 As shown, in this embodiment, step S100 in Embodiment 1 includes:

[0051] Step S201, defining a global pointer; wherein, the global pointer is of the same type as the target variable.

[0052] In a specific application, the tracking of the target variable can be realized by defining a global pointer to the target variable.

[0053] Step S202, defining a global variable; wherein, the global variable is of the same type as the target variable.

[0054] In a specific application, by defining a global variable for backing up the original value of the target variable, the tracking and monitoring of the current value of the target variable can be realized, so as to judge whether the current value of the target variable has changed through the global variable. When the current value is not equal to its original value, it is determined that the target variable has been tampered with.

[0055] In a specific application, the type of the target variable can be a...

Embodiment 3

[0085] like Figure 4 As shown, in this embodiment, based on the method steps in Embodiment 1 or 2, step S101 includes:

[0086] Step S1011, inserting debugging code in at least one position in the first-level code path of the target variable, so as to revise the first-level code path, and recompile the debugging code to run;

[0087] Wherein, the at least one position includes before or after the sub-function call position, before or after the suspicious code line, and the monitoring and debugging function has an entry parameter, and the entry parameter includes at least a unique position identification string, and the unique position The identification string is used to identify the position where the debugging code is inserted.

[0088] In a specific application, from the original assignment of the target variable to at least one of the first-level code paths where the target variable is found to be tampered with, the debugging code is inserted in a forced manner, that is,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applicable to the technical field of software security, and provides a layer-by-layer clamping type variable positioning method, system and terminal equipment. The embodiment of the present invention constructs a monitoring and debugging function for locating the tampered target variable in the program by using the penetrating access characteristic of the pointer variable, and calls the monitoring and debugging function layer by layer for the multi-layer code path where the target variable is located, and Re-run the program after successive revisions, reproduce the process in which the target variable of the program is tampered with, output the debug location information to locate the tampered position of the target variable, and finally accurately locate the specific position where the variable is tampered with, and monitor the debugging function The implementation and calling process are simple and easy to implement.

Description

technical field [0001] The invention belongs to the technical field of software security, and in particular relates to a layer-by-layer clamping type variable positioning method, system and terminal equipment. Background technique [0002] During the development and debugging or operation of the underlying software of the operating system and application software, it is easy to cause variables to be tampered with due to memory overflow, resulting in software exceptions or crashes. Only by accurately locating the exact location of the variable tampered, to completely solve this problem. [0003] However, after the instruction corresponding to the tampered variable is executed, the software will show an exception only when the variable is subsequently accessed, and at this time, a lot of instructions are often executed. That is to say, from the tampering of variables to the abnormality of the software, a rather long instruction path may have been run and there may be complex ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
CPCG06F11/3636G06F11/366
Inventor 董时舫覃刊
Owner PAX COMP TECH SHENZHEN