FR3105484B1 - METHOD OF DYNAMIC VERIFICATION OF THE INTEGRITY OF A MACHINE CODE - Google Patents

METHOD OF DYNAMIC VERIFICATION OF THE INTEGRITY OF A MACHINE CODE Download PDF

Info

Publication number
FR3105484B1
FR3105484B1 FR1914987A FR1914987A FR3105484B1 FR 3105484 B1 FR3105484 B1 FR 3105484B1 FR 1914987 A FR1914987 A FR 1914987A FR 1914987 A FR1914987 A FR 1914987A FR 3105484 B1 FR3105484 B1 FR 3105484B1
Authority
FR
France
Prior art keywords
integrity
authentication code
code
machine code
dynamic verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
FR1914987A
Other languages
French (fr)
Other versions
FR3105484A1 (en
Inventor
Aymen Boudguiga
Jerome Letailleur
Renaud Sirdey
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Commissariat a lEnergie Atomique et aux Energies Alternatives CEA
Original Assignee
Commissariat a lEnergie Atomique CEA
Commissariat a lEnergie Atomique et aux Energies Alternatives CEA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Commissariat a lEnergie Atomique CEA, Commissariat a lEnergie Atomique et aux Energies Alternatives CEA filed Critical Commissariat a lEnergie Atomique CEA
Priority to FR1914987A priority Critical patent/FR3105484B1/en
Publication of FR3105484A1 publication Critical patent/FR3105484A1/en
Application granted granted Critical
Publication of FR3105484B1 publication Critical patent/FR3105484B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne une méthode de vérification de l’intégrité d’un code binaire, comprenant une pluralité de processus destinés à être exécutés par un processeur après lancement d’un système d’exploitation. Après une procédure de boot sécurisée (210), un premier calcul (220, 260) d’un code d’authentification de référence est effectué pour chaque page mémoire de texte relative à un processus, dès que le code a été chargé dans la RAM. Ultérieurement et/ou périodiquement un second calcul (230, 270) d’un code d’authentification est effectué pour chacune de ces pages mémoire. En cas de de désaccord entre le code d’authentification d’une page et de son code d’authentification de référence, une alerte est générée (290). Figure pour l'abrégé: Fig. 2The present invention relates to a method of verifying the integrity of a binary code, comprising a plurality of processes intended to be executed by a processor after launching an operating system. After a secure boot procedure (210), a first calculation (220, 260) of a reference authentication code is performed for each text memory page relating to a process, as soon as the code has been loaded into the RAM . Subsequently and / or periodically a second calculation (230, 270) of an authentication code is performed for each of these memory pages. If there is a disagreement between a page's authentication code and its reference authentication code, an alert is generated (290). Figure for the abstract: Fig. 2

FR1914987A 2019-12-19 2019-12-19 METHOD OF DYNAMIC VERIFICATION OF THE INTEGRITY OF A MACHINE CODE Active FR3105484B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
FR1914987A FR3105484B1 (en) 2019-12-19 2019-12-19 METHOD OF DYNAMIC VERIFICATION OF THE INTEGRITY OF A MACHINE CODE

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1914987A FR3105484B1 (en) 2019-12-19 2019-12-19 METHOD OF DYNAMIC VERIFICATION OF THE INTEGRITY OF A MACHINE CODE
FR1914987 2019-12-19

Publications (2)

Publication Number Publication Date
FR3105484A1 FR3105484A1 (en) 2021-06-25
FR3105484B1 true FR3105484B1 (en) 2021-12-10

Family

ID=70613966

Family Applications (1)

Application Number Title Priority Date Filing Date
FR1914987A Active FR3105484B1 (en) 2019-12-19 2019-12-19 METHOD OF DYNAMIC VERIFICATION OF THE INTEGRITY OF A MACHINE CODE

Country Status (1)

Country Link
FR (1) FR3105484B1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5937063A (en) 1996-09-30 1999-08-10 Intel Corporation Secure boot
US10089498B2 (en) * 2013-10-31 2018-10-02 Hewlett Packard Enterprise Development Lp Memory integrity checking
EP3026560A1 (en) * 2014-11-28 2016-06-01 Thomson Licensing Method and device for providing verifying application integrity
FR3076014B1 (en) * 2017-12-26 2020-09-25 Ledger INTEGRITY CHECK OF AN ELECTRONIC DEVICE

Also Published As

Publication number Publication date
FR3105484A1 (en) 2021-06-25

Similar Documents

Publication Publication Date Title
US20220076167A1 (en) Method for model deployment, terminal device, and non-transitory computer-readable storage medium
US9934229B2 (en) Telemetry file hash and conflict detection
KR102317833B1 (en) method for machine LEARNING of MALWARE DETECTING MODEL AND METHOD FOR detecting Malware USING THE SAME
WO2005019974A3 (en) Secure protection method for access to protected resources in a processor
Berger Minimization, by its nature, precludes allocation concealment, and invites selection bias
US20160147867A1 (en) Information matching apparatus, information matching method, and computer readable storage medium having stored information matching program
CN113886885A (en) Data desensitization method, data desensitization device, equipment and storage medium
ES2818588T3 (en) Method and device to prevent the server from being attacked
US20190102165A1 (en) Method and system for identifying open-source software package based on binary files
WO2016180193A1 (en) Method and apparatus for identifying application installation package
CN105184152A (en) Mobile terminal data processing method
CN109192258B (en) Medical data conversion method, medical data conversion device, computer equipment and storage medium
EP2453356B1 (en) Method, computer program and device for securing byte code to be run by a virtual machine
CN111310129A (en) Method, device and storage medium for maintaining right of image
FR3105484B1 (en) METHOD OF DYNAMIC VERIFICATION OF THE INTEGRITY OF A MACHINE CODE
FR3083661B1 (en) ALEA SYNCHRONOUS GENERATION PROCESS FOR CRYPTOGRAPHIC PROCESSING
CN107908964B (en) Security detection method and device for shell files in Android platform Unity3D game
US20200090429A1 (en) Methods for improved delta velocity determination using machine learning and devices thereof
JP2016011954A (en) Detecting event from multiple time-series data sequences
CN111147477B (en) Verification method and device based on block chain network
CN110704437B (en) Method, device, equipment and storage medium for modifying database query statement
CN112367302A (en) Identity authentication method and system suitable for chrome browser
CN112131462A (en) Keyword discovery method and system based on information monitoring and electronic equipment
CN111091197A (en) Method, device and equipment for training GBDT model in trusted execution environment
CN110716930A (en) Numerical value transfer method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PLFP Fee payment

Year of fee payment: 2

PLSC Publication of the preliminary search report

Effective date: 20210625

PLFP Fee payment

Year of fee payment: 3

PLFP Fee payment

Year of fee payment: 4