Supercharge Your Innovation With Domain-Expert AI Agents!

Function hijacking method and device, medium and electronic equipment

A function and function library technology, applied in the computer field, can solve problems such as destroying the environment, reducing the running speed of the program, and failing to meet the debugging requirements.

Pending Publication Date: 2021-02-02
BEIJING BYTEDANCE NETWORK TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, both of these two methods reduce the running speed of the program due to the use of complex system hooks, destroying the environment where the original program runs with high concurrency, and cannot meet the debugging requirements in a high-concurrency environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Function hijacking method and device, medium and electronic equipment
  • Function hijacking method and device, medium and electronic equipment
  • Function hijacking method and device, medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0036] The first embodiment provided by the present disclosure is an embodiment of a function hijacking method.

[0037] Combine below Figure 1 to Figure 5 Embodiments of the present disclosure will be described in detail.

[0038] Such as figure 1 As shown, in step S101, the absolute starting address of the first jump table in the first memory is obtained.

[0039] The first memory includes memory occupied by the first function library symbol table after the function library symbol table file is loaded.

[0040] The function library symbol table file is a kind of library file, which provides information about the hijacked system functions, so that developers can perform some operations related to the system through the hijacked system functions. Before the program calls the hijacked system function, the function library symbol table file defining the hijacked system function needs to be loaded into the memory. For example, in the Android system, the function library symb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a function hijacking method and device, a medium and electronic equipment. The function hijacking method comprises the steps of obtaining an absolute starting address of a firstjump table in a first memory; acquiring an absolute address of the hijacked system function pointer variable based on the absolute initial address of the first jump table and the data structure of the first jump table; and writing an entry address of a preset hijacking function into the absolute address of the hijacked system function pointer variable. The invention includes obtaining the absolute address of the hijacked system function pointer variable through the absolute initial address of the jump table and the data structure of the jump table, and changing the absolute address value of the hijacked system function pointer variable in the jump table from the hijacked system function entry address to the entry address of the preset hijacking function. By modifying one entry address inthe jump table, the purpose of obtaining the debugging information of the hidden hijacked system function is achieved. On the basis of maintaining the original functions, the original high-concurrencyoperation environment of the system is reserved, and the operation stability, safety and reliability of the system are ensured. Under the condition that the operation condition of the hijacked systemfunction is monitored, the debugging requirement of the hijacked system function in a high-concurrency environment is met.

Description

technical field [0001] The present disclosure relates to the field of computer technology, in particular, to a function hijacking method, device, medium and electronic equipment. Background technique [0002] A memory leak is a space that is dynamically opened up by the dynamic storage allocation function and is not released after use. As a result, the memory unit is occupied until the end of the program. Memory leaks are a difficult bug to locate and track down. Code that leaks memory only occurs under certain circumstances or operating procedures. [0003] Memory out of bounds means that after the system has applied for a piece of memory, it exceeds the application range when using it. [0004] The memory field pointer is that the location pointed by the pointer is unknown (random, incorrect, and without clear restrictions). If the pointer variable is not initialized when it is defined, its value is random, and the value of the pointer variable is the address of other v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/50G06F11/36
CPCG06F9/5016G06F11/366
Inventor 朴英敏
Owner BEIJING BYTEDANCE NETWORK TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More