Unlock instant, AI-driven research and patent intelligence for your innovation.

Detection method based on PIE security protection, terminal and storage medium

A technology of security protection and detection method, applied in the field of computer security

Pending Publication Date: 2021-01-05
北京智游网安科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to provide a detection method, terminal and storage medium based on PIE security protection, aiming to solve the problem in the prior art that the program can be run on any computer with loopholes when the PIE security protection is not turned on

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method based on PIE security protection, terminal and storage medium
  • Detection method based on PIE security protection, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] The detection method based on PIE security protection described in the preferred embodiment of the present invention, such as figure 1 As shown, the detection method based on PIE security protection comprises the following steps:

[0027] Step S10, obtaining the ELF file of the program, and checking the file header information of the ELF file by analyzing the first command of the ELF file.

[0028] In the present invention, the address-independent executable file (PIE) refers to the code that is independent of the operation and placement address. In fact, PIE is a relative meanin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a detection method based on PIE security protection, a terminal and a storage medium. The method comprises the steps of obtaining an ELF file of a program, and checking the file header information of the ELF file through analyzing a first command of the ELF file, judging whether a Type option in the file header information is a DYN type or not, and if so, checking a dynamicsegment of the ELF file by analyzing a second command of the ELF file, and judging whether DEBUG options exist in the dynamic segment or not, and if yes, indicating that PIE protection of the programis started. According to the method, whether the PIE security protection is started by the program or not is judged, a user is reminded to start the PIE security protection when the PIE security protection is not started by the program, and if the PIE security protection is started by the program, the loading address needs to be changed every time the program is loaded, so that a hacker cannot attack the program by using vulnerability by using a traditional fixed address method.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a detection method based on PIE security protection, a terminal and a storage medium. Background technique [0002] In the computer field, PIE (position-independent executable) means an address-independent executable file (also known as address-independent code, PIC, position-independent code), which means that it can run correctly at any location in the main memory, and A machine code that is not affected by its absolute address. This technology is a protection technology for fixed addresses such as code segment (.text), data segment (.data), and uninitialized global variable segment (.bss). [0003] PIE is widely used in shared libraries, so that the code in the same library can be loaded into the address space of different processes. The PIC is also used in computer systems that lack a memory management unit, allowing the operating system to isolate different runnin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/22G06F21/57G06F21/64
CPCG06F11/2205G06F11/2273G06F21/577G06F21/64
Inventor 余少高严智慧
Owner 北京智游网安科技有限公司