Code signature verifying method of ELF file form

A signature verification and file format technology, applied in the direction of preventing unauthorized use of memory, protecting stored content from loss, etc., can solve problems such as the imbalance between security and efficiency, and achieve the effect of improving security and preventing malicious code attacks

Inactive Publication Date: 2004-07-14
成都三零盛安信息系统有限公司
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method that can ensure computer security, achieve the best balance between operating system efficiency and security performance, and effectively prevent ELF files from being used in view of the serious imbalance between security and efficiency in most current code signature methods. Code signature verification method for illegal intrusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code signature verifying method of ELF file form
  • Code signature verifying method of ELF file form
  • Code signature verifying method of ELF file form

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] An implementation example based on the Linux operating system is given below.

[0019] 1. Functional module design

[0020] This example mainly includes the following six functional modules:

[0021] 1. Signature module

[0022] 2. Core layer verification module

[0023] 3. Application layer verification module

[0024] 4. Public key management module

[0025] 5. System verification level management module

[0026] 6. File verification level management module

[0027] 2. Functional modules

[0028] 1. Signature module

[0029] The signature module is a relatively independent module, which is provided to software publishers and is mainly used to sign ELF files.

[0030] The main functions of this module are: sign the specified ELF file, sign all ELF files in the specified directory, and generate a signature report. At the same time, this module also has basic exception handling functions, such as: can identify whether the signed file is an ELF file, can identify...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses the verifying method of code signature in ELF file format. After the user requests executing ELF file, the system judges the level of system verification and determines the level of file verification of the executed file. For 0-level system verification, no code signature is not verified. For non-zero level, incomplete or complete signature value of the executed file is verified. During verification, the signer's public key is taken out from the kernel space chain table to decipher signature data and primary abstract data while available file is used to calculate the corresponding abstract data. The two pieces of abstract data are compared, and when they are the same, the verification is successful, or else failed. The present invention has the advantages of raised system safety resisting virus attack, optimal balance between safety and efficiency of the operation system and effective protection of software resource.

Description

technical field [0001] The invention relates to a technical method for preventing computing viruses and other malicious codes from intruding, specifically to a code signature verification method that can effectively prevent the ELF file format from being easily used by hackers to attack viruses or other malicious codes and ensure computer security. Background technique [0002] The ELF file format is one of the most important executable binary file formats in the Unix environment. This file format is completely open, and anyone can understand its specific format, so it is easy to be used by hackers. By directly modifying the binary file, you can To achieve the purpose of invading the computer. In history, there are many virus programs under Unix, which achieve intrusion through this method. The traditional Unix system does not check the integrity and legality of the executed code, thus allowing many virus programs and Trojan horse programs to take advantage of it. In addit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14G06F12/16
Inventor 吴志刚
Owner 成都三零盛安信息系统有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products