Distributed coding system for preventing code injection or source code decompilation
A technology of distributed coding and distributed system, applied in the direction of program/content distribution protection, platform integrity maintenance, etc., can solve the problem of unsuitable distributed coding method, etc., and achieve the effect of good versatility.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] as attached figure 1 And attached figure 2 , a distributed coding system that prevents code injection or source code decompilation, the coding system includes a scheduling module, a checking module, and a processing module; the scheduling module runs on at least one node in the distributed system; the scheduling module The coding task to be performed generates a task number and reserves the corresponding distributed cloud storage space, and splits the coding task into k coding stages according to the splitting rules, and further splits each coding stage into j subtasks item; according to the distributed current deployment situation, the dispatching module assigns the subtask item to a designated node in the distributed system for encoding processing; the checking module monitors and verifies the subtask item that has been encoded, and Feedback verification results; the processing module is located on all distributed computing nodes, and is used to perform coding opera...
Embodiment 2
[0049] This embodiment should be understood as at least including all the features of any one of the foregoing embodiments, and further improvements on the basis thereof;
[0050] In the process of executing the code normally, it has certain stability to the memory usage of the system, processor computing power usage, network bandwidth traffic usage and other computer computing characteristics; especially the various function libraries and statement handles transferred into the memory , output fields, etc. have a relatively fixed length and timing; when the code is loaded, the operating system allocates virtual memory, maps the code segment, data segment, etc. in the executable file to the memory, loads the dynamic library, and then executes from the entry point ;All code injections will read / write data in memory, thus enabling additional execution of injected code;
[0051] However, once the code is modified, the execution logic in it is easily disturbed and thus changed; the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


