Unlock instant, AI-driven research and patent intelligence for your innovation.

Peripheral transplantation method for embedded firmware based on Linux kernel

An embedded and kernel technology, applied in the field of information security, can solve problems such as peripheral dependence, and achieve the effect that functionality and stability will not be affected

Active Publication Date: 2021-06-04
ZHEJIANG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the deficiencies in the prior art, the present invention provides a method for transplanting peripherals based on Linux kernel-based embedded firmware, which solves the problem of peripheral dependencies in the process of simulating the execution of embedded devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Peripheral transplantation method for embedded firmware based on Linux kernel
  • Peripheral transplantation method for embedded firmware based on Linux kernel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be described in detail below with reference to the accompanying drawings and preferred embodiments, and the purpose and effect of the present invention will become clearer. It should be understood that the specific embodiments described here are only used to explain the present invention and are not intended to limit the present invention.

[0024] The peripheral hardware transplantation method of the embedded firmware based on Linux kernel of the present invention, wherein the peripheral hardware transplantation comprises hardware model transplantation and software driver transplantation;

[0025] Among them, the hardware model transplantation is a specific description through the fixed interface (API) provided by QEMU;

[0026] The software driver transplantation is adapted to the corresponding hardware model transplantation, and the software driver is transplanted into the opaque memory of the Linux kernel without affecting the memory alloca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a peripheral transplantation method for embedded firmware based on a Linux kernel, which comprises the following steps of: receiving the embedded firmware as input, automatically decompressing the embedded firmware, and extracting a required kernel. Meanwhile, by means of peripheral transplantation, a peripheral specified by a developer is transplanted into the decompressed and extracted Linux kernel, so that the Linux kernel is successfully simulated and started, and corresponding security analysis is carried out. According to the method, the specified peripheral can be transplanted into the Linux kernel of the embedded firmware to be analyzed, so that the dependence required for dynamically analyzing the Linux kernel is reduced. Through the method, a developer can simulate and run the Linux kernel in the embedded firmware, so that an embedded firmware analysis platform based on the Linux kernel is constructed.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a peripheral transplantation method of embedded firmware based on Linux kernel. Background technique [0002] In recent years, embedded devices have become more and more popular. Many of them run on Linux-based operating systems. Hundreds of vulnerabilities are discovered in the Linux kernel every year. Therefore, once the embedded firmware based on the Linux operating system is compromised, the attacker will control the entire machine and cause huge losses. Therefore, the kernel security issue of embedded firmware is worth studying. [0003] Researching the kernel of embedded firmware requires static or dynamic analysis methods. The static method is not accurate enough, and the dynamic method requires a corresponding simulator. And because there are many peripherals in embedded devices, the most popular emulator (QEMU) cannot support all peripherals...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/76
CPCG06F8/76Y02D10/00
Inventor 周亚金姜木慧马麟刘强吴磊罗夏朴任奎
Owner ZHEJIANG UNIV