Unlock instant, AI-driven research and patent intelligence for your innovation.

A tampered software detection method based on electromagnetic signal EMR

A software detection and electromagnetic signal technology, applied in the computer field, can solve problems such as instability, loss of waveform characteristics of the mean value sequence, etc., and achieve the effect of safety assurance, fast and convenient detection

Active Publication Date: 2022-05-24
WUHAN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the second question, many scholars have proposed some average algorithms based on DTW, such as DBA, etc., but the average sequence obtained by these algorithms in some special cases will appear some steep situations, in this case The mean value sequence loses the original waveform characteristics. In order to solve this unstable situation, Morel et al. proposed a CDBA algorithm based on path slope constraints to obtain multi-sequence averages. The idea is to solve the problem by controlling the slope of the DTW path. In some steep situations, the tampering software detection method in this paper is based on the CDBA algorithm to obtain the mean center

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A tampered software detection method based on electromagnetic signal EMR
  • A tampered software detection method based on electromagnetic signal EMR
  • A tampered software detection method based on electromagnetic signal EMR

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0052] In this embodiment of the present invention, the user uses an offline installation package that has been attacked by a virus, or downloads a piece of software from an unsafe website, such as an operating system bound with many programs, in the tampered software Some promoted applications or background Trojan horses may be implanted. These software often bypass common security checks and are successfully installed on electronic devices. Usually, we don't need to judge what kind of security risks it has. We only need to compare it with the original software to see if it has been tampe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a tampered software detection method based on electromagnetic signal EMR, which is used to determine whether the program to be detected has been tampered with compared with the official original software; the method includes the following steps: Step 1. Construction of feature database: In electronic equipment Start the software, use a magnetometer device to obtain the electromagnetic signal EMR emitted when the software is started, extract the time domain characteristics and frequency characteristics of the EMR signal, and build a feature database; Step 2. Software detection: For the EMR signal in the feature database, use The dynamic bending algorithm with path slope constraints is used as a distance measurement algorithm. The corresponding mean center algorithm with path slope constraints is used to obtain the time series center. It is matched with the preset original software feature library, and its membership degree is calculated to determine whether it has been tampered with based on the threshold. The invention can quickly and conveniently detect software that may have been tampered with, thereby providing guarantee for the security of electronic equipment.

Description

Technical field [0001] The invention relates to the field of computer technology, and in particular to a method for detecting tampered software based on electromagnetic signal EMR. Background technique [0002] The Internet is filled with a large number of tampered software, some of which are rogue software, and some of which are malware that carry viruses. They often modify the original software from the official website, insert advertisements or viruses, and then put it on the network to induce users to download it. Due to network restrictions, , cost, download speed and other factors, we often use offline installation packages or download some software offline from some network disks and unofficial free software downloads. These software may be maliciously tampered with or invaded by viruses. [0003] The hazards of this type of software can be summarized as follows: 1. Modifying functions, causing the software’s functions to change inconsistently with expectations; 2. Im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
CPCG06F11/3668
Inventor 吴黎兵刘英王敏张瑞
Owner WUHAN UNIV