Security protection system and method for call chain

A technology of security protection and call chain, applied in the field of security protection system of call chain, which can solve the problems of inability to prevent the invasion of new malicious DLLs, complicated methods and only applicable to Linux systems.

Pending Publication Date: 2021-05-14
AEROSPACE INFORMATION
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The above-mentioned first solution focuses on solving the intrusion event of the kernel state of the Linux system. The method of obtaining the call chain is to obtain the system call entry through the assembly instruction, and obtain the system call list pointer through the system call entry. The method is complicated and can only be applied to the Linux system; The second solution is to use the hook function to monitor the call of the loading function of the dynamic link library, and judge whether the loading function exists in the pre-stored malicious dynamic link library, thereby re...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection system and method for call chain
  • Security protection system and method for call chain
  • Security protection system and method for call chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0031] Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or ov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security protection system and method for a call chain, and belongs to the technical field of call chain security protection. The system comprises: a call stack module which obtains a call chain, extracts process information of the call chain and transmits the process information to a call stack encryption module; a call stack encryption module which is used for receiving the process information and encrypting the process information in a preset mode; and a judgment processing module which is used for comparing the encrypted process information with encrypted data pre-stored in the encrypted file, and if the process data contains the process information, the process of the call chain is allowed to be loaded. According to the method, the event of illegally calling the process of the program is effectively prevented, an intrusion event is prevented, the safety of the program is guaranteed, and the method has very high application value.

Description

technical field [0001] The present invention relates to the technical field of call chain security protection, and more specifically, to a security protection system and method for call chains. Background technique [0002] With the continuous advancement of science and technology, in C# applications, there are many malicious calls of malicious software and illegal acts of destroying source programs, which have caused serious impact on society. [0003] Three existing technologies are introduced below, and existing problems are explained. [0004] In the patent application number 201310462793.4, an intrusion detection method and device are described, through the first acquisition module, the export module, the fingerprint algorithm processing module, the first comparison module and the first confirmation module, the kernel intrusion detection under the Linux system is realized . [0005] In the patent with application number 201510809215.2, a protection method and device f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/52G06F21/56G06F21/60
CPCG06F21/602G06F21/52G06F21/566
Inventor 魏贺生洒西涛范丽单国军
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products