Diversified construction method for industrial control black box software

A construction method and black box technology, applied in the direction of program code conversion, decompilation/disassembly, code compilation, etc., can solve the problems of long-term confidentiality, industrial control software mimic transformation and security reinforcement obstacles, and the inability to provide source code and other issues to achieve the effect of flexible description

Pending Publication Date: 2022-01-18
ZHEJIANG LAB
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most industrial control software cannot provide source code due to age or confidentiality issues, which hinders the mimetic transformation and security reinforcement of industrial control software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Diversified construction method for industrial control black box software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solution and technical effect of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0023] like figure 1 As shown, a diversified construction method for industrial control black-box software of the present invention is divided into two stages: the decompilation stage and the diversified compilation stage. First, in the decompilation stage, the industrial control black-box software is decompiled to generate and The equivalent intermediate language representation of the industrial control black-box software is then decompiled into a high-level language representation, and then in the diversified compilation stage, based on the diversified compilation tool chain, the industrial control black-box software is diversified and reinforced, such as: security stack reinforcement, optimization , control flow integrity check, etc., compile high-level ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computer network security, and relates to a diversified construction method for industrial control black box software, which comprises a decompilation stage and a diversified compiling stage, specially comprises the following steps of decompiling the industrial control black box software in the decompilation stage, generating an intermediate representation equivalent to the industrial control black box software, decompiling the intermediate representation into a high-level language representation, in the diversified compiling stage, on the basis of a diversified compiling tool chain, subjecting the industrial control black box software to diversified reinforcement, compiling the high-level language representation into a diversified executive, so that diversified support is provided for the mimicry defense technology. According to the method, basic technical support can be provided for the mimicry defense technology, and the ELF file format is adopted, so that the overall industrial control black box software description is very flexible.

Description

technical field [0001] The invention belongs to the technical field of computer network security, and relates to a diversified construction method for industrial control black box software. Background technique [0002] With the continuous advancement of the industrialization process, people have gradually entered the era of Industry 4.0. In recent years, the problem of industrial control security has become increasingly serious and has received widespread attention at home and abroad. [0003] Research shows that vulnerabilities are widespread in software. Industrial control software is often developed early and has a long service life. In the early stage of research and development, developers of industrial control software often focus more on the engineering implementation of industrial control software, while ignoring software security issues. Therefore, industrial control software has more security issues than application software. [0004] Traditional security defen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/41G06F8/53
CPCG06F8/41G06F8/53
Inventor 张兴明李顺斌李铮卫今王肖孟金燕山侯飞龙张富军
Owner ZHEJIANG LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products