Detection method based on PIE security protection, terminal and storage medium
A technology of security protection and detection method, applied in the field of computer security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0026] The detection method based on PIE security protection described in the preferred embodiment of the present invention, such as figure 1 As shown, the detection method based on PIE security protection comprises the following steps:
[0027] Step S10, obtaining the ELF file of the program, and checking the file header information of the ELF file by analyzing the first command of the ELF file.
[0028] In the present invention, the address-independent executable file (PIE) refers to the code that is independent of the operation and placement address. In fact, PIE is a relative meanin...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

