Integrity checking method during kernel running anda computer readable storage medium

A technology for integrity verification and storage media, applied in the field of integrity verification when the kernel is running, and computer-readable storage media, can solve problems such as inability to ensure security

Pending Publication Date: 2019-05-14
XIAMEN YAXON NETWORKS CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution only checks the integrity of the kernel data before starting and loading the kernel to ensure that the kernel data has not been tampered with before running, but the security cannot be guaranteed after the kernel is running.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrity checking method during kernel running anda computer readable storage medium
  • Integrity checking method during kernel running anda computer readable storage medium
  • Integrity checking method during kernel running anda computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] Please refer to figure 2 , Embodiment one of the present invention is: a kind of integrity verification method based on trustzone kernel runtime; This method is based on the following conditions: (1) have trustzone hardware architecture; Run a safe operating system, instead of running a common operating system (such as linux / android or other operating systems) in a non-safe area, that is, the object that this method needs to protect; (3) all image data have passed static integrity before running Verification, where trusted boot technology is used for verification. Otherwise, it is meaningless to perform a runtime integrity check on a kernel that has been injected with malicious programs.

[0079] The sequence of the entire static integrity check is: trusted root program -> first level loader -> safe operating system program -> second level loader -> non-safety operating system program. The direction of the arrow indicates the sequence in which the software components...

Embodiment 2

[0098] This embodiment is a further extension of Embodiment 1.

[0099] In step S2, the data in the first field and the data in the second field are respectively subjected to block-by-block one-way hash calculation to obtain a first hash value and a second hash value.

[0100] In this embodiment, the data in the first field is taken as an example for description. Such as image 3 As shown, according to the preset block size, the data in the first field is divided into multiple data blocks; for example, the size of each block is 4K, assuming that the size of .text data is 1M, it can be divided into 256 blocks; if the final data If it is less than 4K, for example, the last block is only 2K, it is also counted as one block.

[0101] Then calculate the hash value of the first data block; for each next data block, perform one-way hash calculation on the hash value of the current data block and the previous data block to obtain the hash value of the current data block; That is, t...

Embodiment 3

[0108] This embodiment is a computer-readable storage medium corresponding to the above-mentioned embodiments, on which a computer program is stored, and when the program is executed by a processor, the following steps are implemented:

[0109] Obtain the data of the first field and the data of the second field in the kernel file, the first field is the .text field, and the second field is the .rodata field;

[0110] performing a one-way hash calculation on the data in the first field and the data in the second field, respectively, to obtain a first hash value and a second hash value;

[0111] After the secure operating system is running, store the first hash value and the second hash value in the secure memory area respectively;

[0112] The normal operating system decompresses the kernel file to the normal memory area, and sends the starting addresses and corresponding lengths of the data of the first field and the data of the second field in the normal memory area to the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an integrity checking method during kernel running and a computer readable storage medium, and the method comprises the steps: obtaining the data of a first field and the dataof a second field in a kernel file, and carrying out the one-way hash calculation of the data, and obtaining a first hash value and a second hash value; after the secure operating system runs, storingthe two hash values into a secure memory area; the common operating system sending the initial addresses and the corresponding lengths of the data of the first field and the data of the second fieldin the common memory area to the secure operating system; and the security operation system acquiring the data of the first field and the data of the second field from the common memory area at regular time, and performing integrity verification on the data according to the two hash values in the security memory area. According to the method, integrity verification can be performed on the runningkernel data, and it is ensured that when the corresponding region of the kernel is tampered, the corresponding region can be found in time and a corresponding security strategy is adopted.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method for checking the integrity of a kernel during runtime and a computer-readable storage medium. Background technique [0002] Nowadays, general solutions can provide static integrity verification of the kernel, such as trusted boot technology, that is, the modules (such as the kernel) loaded at each stage of the boot process have undergone safety verification before loading and running. If the verification is passed, it will run; otherwise, it will refuse to execute. But after running the kernel, there is no further protection. [0003] For example, in the Chinese patent publication with the publication number CN106250760A, a U-Boot trusted startup method based on the TPM2.0 chip is proposed. The method utilizes the hardware characteristics of the TPM2.0 chip to collect U-Boot loading driver The integrity information of the program, and verify the integrity of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/52G06F21/56
Inventor 赵国开涂岩恺刘炯钟池炜宾
Owner XIAMEN YAXON NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products