Summary of the invention
The embodiment of the present application provides the blocking-up method and device of a kind of hardware rootkit malicious act, existing to solve
In technology when being attacked by hardware rootkit, hardware rootkit can not be blocked to storing in the EEPROM on hardware device
The problem of malicious act that content is arbitrarily distorted.
A kind of blocking-up method of hardware rootkit malicious act provided by the embodiments of the present application, comprising:
For hardware device, voltage switch is set;
The voltage switch is used to control the program voltage of the hardware device;
When the program voltage is greater than predeterminated voltage, the hardware device is in can write state;
When the program voltage is not more than predeterminated voltage, the hardware device is in can not write state.
A kind of blocking-up method of hardware rootkit malicious act provided by the embodiments of the present application is provided on hardware device
For controlling the voltage switch of program voltage, this method comprises:
The hardware device receives write request;
Predeterminated voltage is greater than by the program voltage that the voltage switch controls when the hardware device determines, and is set by monitoring
The mode of operation of standby control be can write state when, execute the write request;
Predeterminated voltage is not more than by the program voltage that the voltage switch controls when the hardware device determines, or by supervising
Control equipment control mode of operation be can not write state when, refusal executes the write request.
A kind of blocking-up method of hardware rootkit malicious act provided by the embodiments of the present application is provided on hardware device
For controlling the voltage switch of program voltage, this method comprises:
Monitoring device judges whether the password of input is identical as preset password;
If so, set the mode of operation of the hardware device to can write state;
Otherwise, setting the mode of operation of the hardware device to can not write state;
Wherein, when the program voltage of the hardware device is greater than predeterminated voltage, and the mode of operation being arranged by monitoring device
For can write state when, allow execute write operation;
When the program voltage of the hardware device is no more than predeterminated voltage, or by the mode of operation that monitoring device is arranged
Can not write state when, refusal execute write operation.
A kind of hardware device provided by the embodiments of the present application, comprising:
Voltage switch, for controlling the program voltage of the hardware device;
When the program voltage is greater than predeterminated voltage, the hardware device is in can write state;
When the program voltage is not more than predeterminated voltage, the hardware device is in can not write state.
A kind of occluding device of hardware rootkit malicious act provided by the embodiments of the present application, comprising:
Switch module, the switch module are used to control the program voltage of the hardware device;
When the program voltage is greater than predeterminated voltage, the hardware device is in can write state;
When the program voltage is not more than predeterminated voltage, the hardware device is in can not write state.
A kind of occluding device of hardware rootkit malicious act provided by the embodiments of the present application is provided on hardware device
For controlling the voltage switch of program voltage, which includes:
Interface module, for receiving write request;
Execution module, for being greater than predeterminated voltage when the program voltage controlled by the voltage switch, and by monitoring device
The mode of operation of control be can write state when, execute the write request;
Module is blocked, for working as the program voltage controlled by the voltage switch no more than predeterminated voltage, or by monitoring
The mode of operation of equipment control be can not write state when, refusal executes the write request.
A kind of occluding device of hardware rootkit malicious act provided by the embodiments of the present application is provided on hardware device
For controlling the voltage switch of program voltage, which includes:
Whether first judgment module, the password for judging input are identical as preset password;
Setup module, for when the judging result of the first judgment module be when, by the operation of the hardware device
State be set as can write state, when the judging result of the first judgment module be it is no when, by the operation shape of the hardware device
State is set as can not write state;
Wherein, when the program voltage of the hardware device is greater than predeterminated voltage, and the mode of operation being arranged by monitoring device
For can write state when, allow to execute the write operation;
When the program voltage of the hardware device is no more than predeterminated voltage, or by the mode of operation that monitoring device is arranged
Can not write state when, refusal executes the write operation.
The embodiment of the present application provides the blocking-up method and device of a kind of hardware rootkit malicious act, and this method is in hardware
Voltage switch is set in equipment, program voltage is controlled by the voltage switch, to control the write-in power of hardware device EEPROM
Limit, also monitoring device can be used to manage one or more hardware devices, and administrator password is arranged for hardware device, when attacker inputs
When password mistake, directly by the mode of operation of hardware device be set as can not write state, so as to effectively block hardware
Malice tampering of the rootkit to the content stored in EEPROM on hardware device.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
The concept explained or limited in the present embodiment is suitable for following all embodiments.
In the embodiment of the present application, voltage switch can be set for hardware device, which sets for controlling the hardware
Standby program voltage.Wherein, voltage switch described in the embodiment of the present application refers to physical switch, rather than software switch.
Hardware device described in the embodiment of the present application refers to using EEPROM the hardware device for storing information, such as can
To be mainboard, network interface card, video card, hard disk, printer, router, interchanger, industrial personal computer etc..EEPROM is a kind of plug and play, is fallen
Data are not lost after electricity, and the erasable twin voltage storage chip write.Wherein, twin voltage refers to operating voltage and program voltage,
Eeprom chip can only execute read operation under operating voltage, only when program voltage is higher than predeterminated voltage, could run life
Producing producer is the write operation program that chip provides, to execute write operation.In general, the predeterminated voltage is higher than normal working voltage,
Depending on predeterminated voltage is with different eeprom chip models, generally 12~24V.
It is used to control the program voltage for the voltage switch of hardware device setting, predeterminated voltage is that eeprom chip entrance can
The voltage threshold of write state, by eeprom chip, manufacturer is determined, is somebody's turn to do when the program voltage added to eeprom chip is greater than
When voltage threshold, hardware device is subjected to write operation, otherwise only receives read operation.That is, when the programming controlled by voltage switch
Voltage be greater than predeterminated voltage when, the hardware device be in can write state, when program voltage be not more than predeterminated voltage when, hardware device
In can not write state.
As a result, by the way that the voltage switch for controlling program voltage is arranged on hardware device, as long as being opened by the voltage
Close control hardware device program voltage be not more than predeterminated voltage, so that it may make hardware device be in can not write state, so as to keep away
Exempt from the EEPROM that attacker distorts hardware device by hardware rootkit attack pattern, especially when attacker remotely passes through firmly
When part rootkit mode attacks hardware device, since it not can control the physical switch being arranged on hardware, also
EEPROM can not be distorted.
It in the embodiment of the present application, can be in such a way that voltage switch controls program voltage are as follows: when voltage switch is closed
When, program voltage is greater than predeterminated voltage;Conversely, program voltage is not more than predeterminated voltage when voltage switch disconnects.Certainly,
It may is that program voltage is greater than predeterminated voltage when voltage switch disconnects;Conversely, program voltage is not when voltage switch closure
Greater than predeterminated voltage.
Further, the physics realization means of circuit are connected to or cut off in practical application scene, on the circuit board of chip
It is realized generally by the mode of jumper switch, therefore, voltage switch described in the embodiment of the present application can be jumper switch,
That is, the circuit communication of program voltage, program voltage is greater than predeterminated voltage when jumper switch closure, eeprom chip enters
Can write state, when the jumper switch disconnects, the circuit of program voltage is disconnected, and program voltage is not more than predeterminated voltage, EEPROM
Chip enters can not write state.
In view of in practical application scene, attacker may also can slip into computer room, the electricity being arranged on hardware device
Compress switch closure, and the program voltage of hardware device is made to be greater than predeterminated voltage so that hardware device be in can write state, then lead to
The mode for crossing hardware rootkit distorts the EEPROM of hardware device, to be implanted into the rogue programs such as wooden horse.Therefore, in order to further
The malicious act of hardware rootkit is blocked, to be further ensured that the safety of hardware device, the embodiment of the present application is in addition in hardware
Voltage switch for controlling program voltage is set in equipment, other than the mode of operation for controlling hardware device, also can be used
Monitoring device controls the mode of operation of hardware device, as shown in Figure 1.
Fig. 1 is the blocking process of hardware rootkit malicious act provided by the embodiments of the present application, specifically includes following step
It is rapid:
S101: hardware device receives write request.
In the present embodiment, write request can be original information erasure or write-in both operation requests of new information.For example,
The request for deleting the operations such as file, newly-increased file, modification file, alternate file belongs to write request.
S102: hardware device judges whether the program voltage of voltage switch control is greater than predeterminated voltage, if so, executing step
Otherwise S103 executes step S105.
In the embodiment of the present application, after hardware device receives write request, the program voltage of itself can be checked, and judging should
Whether program voltage is greater than predeterminated voltage, wherein if voltage switch is off-state, program voltage is not more than predeterminated voltage,
If voltage switch is closed state, program voltage is greater than predeterminated voltage.
S103: hardware device judge by monitoring device control mode of operation whether be can write state, if so, executing step
Otherwise rapid S104 executes step S105.
In the embodiment of the present application, monitoring device can be a host or server, and monitoring device can be set with hardware
Standby upper control interface docks, and the hardware device is managed monitoring by the management and monitoring function of itself.Wherein, a prison
Control equipment can manage one or more hardware devices.
Specifically, corresponding password can be arranged for hardware device in advance, and the password and the password are set with the hardware
Standby corresponding relationship is stored in monitoring device, then when user (user may be normal user, it is also possible to attacker)
By the mode of operation of hardware device by can not write state be changed to can write state when, it is necessary first to will change request be sent to prison
Equipment is controlled, monitoring device can then require user to input the corresponding password of the hardware device, after the password for receiving user's input,
Judge that whether corresponding with hardware device the password preset password of input be identical, if they are the same, the mode of operation of hardware device is set
Be set to can write state, if it is different, then setting the mode of operation of hardware device to can not write state.
For hardware device, since in a step 102, it is default that hardware device has determined that its program voltage is greater than
Voltage, therefore in S103 step, hardware device can decide whether to execute according to the mode of operation controlled by monitoring device
Write request.
S104: the write request is executed.
S105: refusal executes the write request.
That is, only when the program voltage controlled by voltage switch is greater than predeterminated voltage, and the behaviour controlled by monitoring device
Make state be can write state when, hardware device could execute write operation, and when being not more than by the program voltage that voltage switch controls
Predeterminated voltage, or when the mode of operation controlled by monitoring device be can not write state when, hardware device refuse execution writes behaviour
Make.
To even if attacker slips into computer room, and the voltage switch being arranged on hardware device is closed, make hardware device
Program voltage be greater than predeterminated voltage, and if by monitoring device control mode of operation be can not write state, attacker is still
The EEPROM of hardware device can not be so distorted by way of hardware rootkit, to be implanted into the rogue programs such as wooden horse, therefore can be into
The safety of one step guarantee hardware device.
Method as shown in Figure 1 can be seen that when password not being arranged to hardware device, and hardware device only has voltage switch
A kind of this write permission of physical means control hardware device, and after being provided with password to hardware device, it is the equal of further through prison
Control equipment increases the write permission that a kind of software approach is used to control hardware device.And one as built in the general meeting of eeprom chip
A program (hereinafter referred to as control program) dedicated for executing write request, if hardware device cannot correctly execute this
Program is controlled, hardware device can not just execute any write request, and therefore, monitoring device controls the side of the mode of operation of hardware device
Method may is that monitoring device can determine whether the password of user's input is identical as preset password, be that this is hard further according to judging result
A mode of operation parameter is arranged in part equipment, the control program whether then can be performed with the state modulator hardware device, also
Control the whether executable write request of hardware device.
For example, when Password Input is correct, monitoring device passes through hard under the premise of the voltage switch of hardware device closure
The control interface of part equipment sends the first mode of operation parameter, which should for allowing hardware device to execute
Program is controlled, when Password Input mistake, monitoring device setting sends the second mode of operation by the control interface of hardware device
Parameter, the second mode of operation parameter is for forbidding hardware device to execute the control program.
Fig. 2 is the blocking process of the hardware rootkit malicious act provided by the embodiments of the present application corresponding to Fig. 1, specifically
The following steps are included:
S201: monitoring device receives the password of user's input.
S202: monitoring device judges whether the password of input is identical as preset password, if so, step S203 is executed, otherwise,
Execute step S204.
S203: setting the mode of operation of the corresponding hardware device of the preset password to can write state.
S204: setting the mode of operation of the corresponding hardware device of the preset password to can not write state.
Further, in the embodiment of the present application, can with after preset password input error can number of retries and again
Effective time interval is tried, then monitoring device can determine whether that the last time receives in the password and preset password difference for determining input
To the time interval at current time whether being greater than preset duration at the time of the password of input, (preset duration is preset retries
Effective time interval), if so, the number of retries of preservation is reset and adds 1, otherwise, the number of retries of preservation is added 1.
Also, when monitoring device save number of retries be more than it is preset can number of retries when, monitoring device sets hardware
Standby mode of operation is set as lock state.Wherein, when the mode of operation of hardware device is arranged to lock state, the hardware
Equipment refuses the mode of operation of any apparatus modifications hardware device, and refuses to execute write operation, the only life of the hardware device
Producing producer can unlock state.It is opposite, when the number of retries that monitoring device saves be less than it is preset can number of retries
When, monitoring device wouldn't set the mode of operation of hardware device to lock state, and user can still re-enter password.
Further, if not in monitoring device preset can number of retries, when monitoring device judge input password with
When preset password is not identical, both directly can set lock state for the mode of operation of the hardware device, also allow for user without
Limit time re-enters password.
In addition, in the embodiment of the present application, monitoring device carries out the specified data in hardware device by control interface
Monitoring, and periodically obtains monitoring record, when monitoring these specified data and changing, by the mark of the hardware device
Labeled as the mark for being tampered equipment and monitoring log is written, to provide subsequent audit basis.Wherein, specified data can be
The sensitive data that bin file, cyclic redundancy check etc. are easily distorted by attacker passes through auditing and supervisory when monitoring the change of these data
The information such as the modification time, the login user that record in log may determine whether to be caused by malicious act.
The above are the blocking-up methods of hardware rootkit malicious act provided by the embodiments of the present application, are based on same thinking,
The embodiment of the present application also provides the occluding devices of hardware rootkit malicious act, as shown in Figure 3, Figure 4.
Fig. 3 is the occluding device structural schematic diagram of hardware rootkit malicious act provided by the embodiments of the present application, specific to wrap
It includes:
Interface module 301, for receiving write request;
Execution module 302 for being greater than predeterminated voltage when the program voltage controlled by the voltage switch, and is set by monitoring
The mode of operation of standby control be can write state when, execute the write request;
Module 303 is blocked, for working as the program voltage controlled by the voltage switch no more than predeterminated voltage, or by supervising
Control equipment control mode of operation be can not write state when, refusal executes the write request.
Specific above-mentioned device as shown in Figure 3 can be located on hardware device.
Fig. 4 is the occluding device structural schematic diagram of another hardware rootkit malicious act provided by the embodiments of the present application,
It specifically includes:
Whether first judgment module 401, the password for judging input are identical as preset password;
Setup module 402, for when the judging result of the first judgment module be when, by the behaviour of the hardware device
As state be set as can write state, when the judging result of the first judgment module be it is no when, by the operation of the hardware device
State is set as can not write state;
Wherein, when the program voltage of the hardware device is greater than predeterminated voltage, and the mode of operation being arranged by monitoring device
For can write state when, allow to execute the write operation;
When the program voltage of the hardware device is no more than predeterminated voltage, or by the mode of operation that monitoring device is arranged
Can not write state when, refusal executes the write operation.
Second judgment module 403, when for determining the password and preset password difference of input when the first judgment module,
Judge whether be greater than setting duration to the time interval at current time at the time of the last time receives the password of input;
Locking module 404, for when the judging result of the second judgment module, which is, is, the number of retries of preservation to be reset simultaneously
Add 1, when the judging result of the second judgment module is no, the number of retries of preservation is added 1, when the number of retries of preservation is more than pre-
If can number of retries when, set lock state for the mode of operation of the hardware device;
Wherein, when the mode of operation of the hardware device is arranged to lock state, the hardware device refusal is any
Apparatus modifications mode of operation, and refuse to execute write operation.
Monitoring module 405, for monitoring the specified data in the hardware device, when monitoring in the hardware device
When specified data change, labeled as the mark for being tampered equipment and monitoring log is written into the mark of the hardware device.
Specific above-mentioned device as shown in Figure 4 can be located in monitoring device.
The embodiment of the present application provides the blocking-up method and device of a kind of hardware rootkit malicious act, and this method is in hardware
Voltage switch is set in equipment, program voltage is controlled by the voltage switch, to control the write-in power of hardware device EEPROM
Limit, also monitoring device can be used to manage one or more hardware devices, and administrator password is arranged for hardware device, when attacker inputs
When password mistake, directly by the mode of operation of hardware device be set as can not write state, so as to effectively block hardware
Malice tampering of the rootkit to the content stored in EEPROM on hardware device.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.