Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A software behavior integrity verification method

An integrity verification and software technology, applied in the field of information security, can solve the problem that the trust status cannot be passed on

Inactive Publication Date: 2019-04-02
XIDIAN UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Static verification ensures that the initial state of the software is trustworthy by analyzing and verifying the state of software program files and data files, but this state of trust cannot be passed on during the running of the software, which is a major factor in ensuring software integrity. challenge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A software behavior integrity verification method
  • A software behavior integrity verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The invention provides a method for verifying the integrity of software behavior, which adopts C / S architecture, and the server side includes functions such as software policy configuration, feature storage, and feature matching, and is responsible for the verification of software behavior features. The client includes the collection of system calls of the software, which can generate a set of behavioral characteristics of the software according to the sequence of system calls. An SSL-based secure channel is deployed between the server and the client, and the peers interact through corresponding communication modules to realize identity authentication and data transmission encryption during mutual access.

[0064] A software behavior integrity verification method of the present invention is divided into two steps, which are respectively a software registration step and a verification step;

[0065] First, in the registration step, the initial state of the client is cons...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software behavior integrity verification method, which adopts a C / S (Client / Server) architecture, and a server side comprises software strategy configuration, feature storageand feature matching functions and is responsible for software behavior feature verification. The client comprises system call collection of software, and a behavior feature set of the software can be generated according to a system call sequence; An SSL-based security channel is deployed between the server and the client, and both parties in the same way interact through corresponding communication modules to realize identity authentication and data transmission encryption during mutual access. According to the invention, the remote proving problem of software integrity is solved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a software behavior integrity verification method. Background technique [0002] Software is the cornerstone of Internet applications. The dependence of modern society on computer systems is reflected in the dependence on software, and the defects of computer systems are also caused by software problems to a large extent. Especially in the current context, more and more software running and development environments are changing from the traditional static closed state to the dynamic open state in the Internet environment. More and more software vulnerabilities and defects are discovered and exploited by malicious attackers. [0003] In the field of security, software integrity provides a different perspective to evaluate the current operating state of software. The integrity of the software represents the trustworthiness of the software. Currently, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51
CPCG06F21/51
Inventor 杨力王焱济妥艳君张程辉庞晓健柳强
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products