Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

99 results about "Os kernel" patented technology

Method and apparatus for remote debugging of kernel and application software

A method and apparatus for debugging of OS kernel and applications software that does not require use of a hardware probe; can debug both user-mode programs and a significant body of the OS kernel code; allows the OS to continue servicing exceptions while debugging; leverages OS built-in device drivers for communicating devices to communicate with the host debugger; and can debug a production version of the OS kernel. When debugging is required, the running OS kernel dynamically loads a software-based debug agent on demand whereby such debug agent dynamically modifies the running production OS kernel code and data to intercept debugging traps and provide run-control. To provide debugging of loadable module, the debug agent implement techniques to intercept the OS module loading system call; set breakpoints in the loaded module initialization function; calculate the start address of the debugged module in memory; and asynchronously put the system under debug. By structuring command loop to execute in non-exception mode, and devising a process to transfer execution from the debug agent exception handler to the debug agent command loop and back, the debug agent can communicate with the host debugger using interrupt-driven input/output devices as well as allowing the system to service interrupts while under debug.
Owner:TRAN HIEU TRUNG

Kernel-level code reuse type attack detection method based on QEMU

The invention discloses a kernel-level code reuse type attack detection method based on QEMU. The method mainly solves the problem of relying on hardware or need of modifying kernel source code in the prior art. According to the method, a function module of a QEMU virtual machine manager is expanded; each instruction which operates on the function module and in an operating system kernel is traversed and detected; jumping instructions relevant to the control flow process are recognized from the instructions, wherein the jumping instructions include ret and indirect call instructions; the jumping target addresses of the instructions are recorded; then, the target addresses are compared with legal target addresses in the system normal execution flow process for detecting whether a system is normally executed or not; and meanwhile, the interruption return addresses pushed into a stack during the interruption occurrence and the return addresses used during interruption actual return are subjected to comparison verification, so that whether attack occurs or not is judged. The kernel-level code reuse type attack detection method has the advantages that by aiming at the characteristic that the system original execution flow process needs to be changed for the code reuse type attack, the attack can be effectively discovered by monitoring the kernel execution flow process change instructions (and positions), and the kernel-level code reuse type attack detection method can be used for protecting the security of an operating system.
Owner:XIDIAN UNIV

Trusted payment computer system

A trusted payment computer system relates to the technical field of information security. The system comprises input equipment, a trusted computer mainframe, output equipment and trusted card reading equipment, wherein the input equipment, the trusted computer mainframe and the output equipment are connected in sequence; and the trusted card reading equipment is connected with the trusted computer mainframe by a USB-HID interface. The input equipment includes a keyboard and a mouse and the output equipment is a display. The system is characterized in that TCM chips are embedded in the trusted computer mainframe to serve as the root of trust for measurement, the root of trust for reporting and the root of trust for storage. A system of trust for measurement inside the trusted computer mainframe completes the following step-by-step measurement: measurement of integrity carried out on trusted BIOS by TCM, measurement of integrity carried out on MBR by trusted BIOS, measurement of integrity carried out on OS Kernel by MBR and measurement of integrity carried out on a PE file by a trusted monitoring program. A software system installed on the trusted computer mainframe contains a TCM management program, a trusted card reading equipment management program and a payment transaction management program. The system is convenient and easy to use and can reliably ensure the security of the whole trusted payment transaction.
Owner:TSINGHUA TONGFANG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products