CN107092831A - Firmware based on firmware layer updates anti-virus method and device - Google Patents

Firmware based on firmware layer updates anti-virus method and device Download PDF

Info

Publication number
CN107092831A
CN107092831A CN201710238068.7A CN201710238068A CN107092831A CN 107092831 A CN107092831 A CN 107092831A CN 201710238068 A CN201710238068 A CN 201710238068A CN 107092831 A CN107092831 A CN 107092831A
Authority
CN
China
Prior art keywords
firmware
result
calculation
bios
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710238068.7A
Other languages
Chinese (zh)
Inventor
吴成红
梁辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kunshan One Hundred Ao Electronic Technology Co Ltd
Original Assignee
Kunshan One Hundred Ao Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kunshan One Hundred Ao Electronic Technology Co Ltd filed Critical Kunshan One Hundred Ao Electronic Technology Co Ltd
Priority to CN201710238068.7A priority Critical patent/CN107092831A/en
Publication of CN107092831A publication Critical patent/CN107092831A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Storage Device Security (AREA)

Abstract

Anti-virus method is updated the invention discloses a kind of firmware based on firmware layer, including:(1) encipheror is write in Windows consoles, and Encryption Tool will be generated after encipheror compiling link;(2) by firmware source code compiling generation BIOS BIN files;(3) call Encryption Tool that computing is encrypted to BIOS BIN, obtain result of calculation, and result of calculation is stored in BIOS BIN files, complete BIOS/firmware encryption;(4) decryption program is increased in refurbishing procedure, generation refreshes decoding tool;(5) when firmware updates, refresh in environment to use in firmware and refresh decoding tool by the firmware loads after encryption into internal memory, and call decryption program to handle the firmware after encryption, obtain result of calculation;(6) if result of calculation value is 0, it is determined as that firmware does not infect virus, is otherwise determined as firmware infection virus, sends virus infection alarm prompt.Security performance of the present invention is higher.

Description

Firmware based on firmware layer updates anti-virus method and device
Technical field
Anti-virus method is updated the present invention relates to virus defense technical field, more particularly to a kind of firmware based on firmware layer And device.
Background technology
A large amount of with computer use, the popularization of internet, and computer technology is substantially improved, and people are to computer Using also more and more skillfully, more and more professional, dependence is also more and more stronger.But computer virus is wreaked havoc everywhere, to us Life, property safety, company property safety, the national defense safety of individual brings great threat.Although having many on the market now Gas defence tool and method, but this few tool and method is essentially all based on operating system end, and for computer The antivirus protection of bottom is inoperative.Also there are some companies to add ID inside firmware, disease is prevented by judging ID Poison, but many viruses are not in the case where changing ID now, virus implantation.The possibility of bottom firmware infection virus is main Embody in the following areas:Firmware has infected virus before firmware (UEFI BIOS) is brushed to computer for the first time, updates solid Virus has been infected during part and for the firmware updated.
The content of the invention
Goal of the invention:The problem of present invention exists for prior art updates anti-there is provided a kind of firmware based on firmware layer Viral methods and device, are to take precautions against virus before bottom firmware (UEFI BIOS) is refreshed based on firmware, it can be ensured that be updated Firmware (UEFI BIOS) above to computer is not infect virus.
Technical scheme:Firmware of the present invention based on firmware layer, which updates anti-virus method, to be included:
(1) encipheror is write in Windows consoles, and work is encrypted into generation after the encipheror compiling link Tool, wherein, the encipheror is used to the initial data of file to be encrypted being encrypted after computing to obtain a result of calculation;
(2) by firmware source code compiling generation BIOS BIN files;
(3) call the Encryption Tool that computing is encrypted to the initial data of BIOS BIN files, obtain the first calculating As a result, and by the first result of calculation it is stored in BIOS BIN files, completes BIOS/firmware encryption;
(4) increase decryption program in refurbishing procedure, generation refreshes decoding tool, wherein, the decryption program with it is described Encipheror correspondence, a result of calculation is obtained for the initial data for having encrypted file to be decrypted after computing, and the meter It is 0 when not made any modification in having encrypted file to calculate result;
(5) when BIOS/firmware updates, refresh in firmware and the refreshing decoding tool is used in environment, after encryption BIOS/firmware is loaded into internal memory, and all initial data that BIOS/firmware after encryption includes the first result of calculation are solved Close computing, obtains the second result of calculation;
(6) if the second result of calculation value is 0, it is determined as that firmware does not infect virus, performs renewal;
(7) if the second result of calculation value is not 0, it is determined as firmware infection virus, sends virus infection alarm and carry Show.
Firmware of the present invention based on firmware layer updates anti-virus device, it is characterised in that the device includes:
Encryption Tool generation module, is compiled for writing encipheror in Windows consoles, and by the encipheror Encryption Tool is generated after translating link, wherein, the encipheror is used to the initial data of file to be encrypted computing is encrypted After obtain a result of calculation;
Collector, for firmware source code compiling to be generated into BIOS BIN files;
Firmware encrypting module, calls the Encryption Tool that computing is encrypted to the initial data of BIOS BIN files, obtains It is stored in the first result of calculation, and by the first result of calculation in BIOS BIN files, completes BIOS/firmware encryption;
Refresh decoding tool generation module, for increasing decryption program in refurbishing procedure, generation refreshes decoding tool, its In, the decryption program is corresponding with the encipheror, is obtained for the initial data for having encrypted file to be decrypted after computing To a result of calculation, and the result of calculation is 0 when not made any modification in having encrypted file;;
Computing module before firmware updates, for when BIOS/firmware updates, refreshing in firmware in environment using the refreshing Decoding tool, the BIOS/firmware after encryption is loaded into internal memory, and BIOS/firmware after encryption is included into the first result of calculation All initial data computing is decrypted, obtain the second result of calculation;
Judge module is infected, for when the second result of calculation value is 0, being determined as that firmware does not infect virus, performing more Newly;When the second result of calculation value is not 0, it is determined as firmware infection virus, sends virus infection alarm prompt.
Beneficial effect:Compared with prior art, its remarkable advantage is the present invention:1. it is safe, crack difficulty.2. algorithm is simple It is single.3. it is practical.4. cost is low.
Brief description of the drawings
Fig. 1 is the flow signal that the firmware based on firmware layer that the present invention is provided updates encryption part in anti-virus method Figure;
Fig. 2 is that the flow of firmware renewal part in the firmware renewal anti-virus method based on firmware layer that the present invention is provided is shown It is intended to.
Embodiment
Embodiment 1
Present embodiments provide a kind of firmware based on firmware layer and update anti-virus method, as depicted in figs. 1 and 2, including:
Encrypt part:
(1) encipheror is write in Windows consoles using Visual C++6.0, is named as CheckSum, and will Encryption Tool CheckSum.exe is generated after the encipheror CheckSum compiling links, wherein, the encipheror is used for The initial data of file to be encrypted is encrypted after computing and obtains a result of calculation.For example, AES can be CheckSum16 is encrypted, or md5 encryption or other encipherors, etc..
(2) by firmware source code compiling generation BIOS BIN files.
(3) autoexec is edited, calls Encryption Tool CheckSum.exe to enter BIOS BIN initial data Row cryptographic calculation, obtains the first result of calculation, and the first result of calculation is stored in BIOS BIN files, completes BIOS/firmware and adds It is close.
Firmware updates part:
(4) increase decryption program in refurbishing procedure, generation refreshes decoding tool, wherein, the decryption program with it is described Encipheror correspondence, a result of calculation is obtained for the initial data for having encrypted file to be decrypted after computing, and the meter It is 0 when not made any modification in having encrypted file to calculate result.When AES is CheckSum16, because if verification The numerical value of sum exceed hexadecimal FF, that is, 255. require its complement code as verification and, then this verification and deposit Gone inside to encryption file, as long as tiring out so carrying out 16 to 16 binary datas inside whole encryption file inside decryption program Plus, the data of low 16 of this accumulation result are finally taken again as final result, then do not appointed in file has been encrypted What is exactly 0 when changing, and decrypted result is not just 0 after being modified.
(5) when BIOS/firmware updates, refresh in firmware and the refreshing decoding tool is used in environment, after encryption BIOS/firmware is loaded into internal memory, and BIOS/firmware after encryption is included to all initial data (i.e. of the first result of calculation All data in BIOSBIN files before one result of calculation and encryption) computing is decrypted, obtain the second result of calculation.If not yet Thoughts are caught an illness poison or destruction, then it is exactly 0 that this value, which should be, if infection virus, or be someone one 0 of the inside Make 1 into, then this result is just 0.
(6) if the second result of calculation value is 0, it is determined as that firmware does not infect virus, performs renewal.
(7) if not 0, then be determined as firmware infection virus, send virus infection alarm prompt.
Embodiment 2
Present embodiments provide a kind of firmware based on firmware layer and update anti-virus device, specifically include:
Encryption Tool generation module, is compiled for writing encipheror in Windows consoles, and by the encipheror Encryption Tool is generated after translating link, wherein, the encipheror is used to the initial data of file to be encrypted computing is encrypted After obtain a result of calculation;
Collector, for firmware source code compiling to be generated into BIOS BIN files;
Firmware encrypting module, calls the Encryption Tool that computing is encrypted to the initial data of BIOS BIN files, obtains It is stored in the first result of calculation, and by the first result of calculation in BIOS BIN files, completes BIOS/firmware encryption;
Refresh decoding tool generation module, for increasing decryption program in refurbishing procedure, generation refreshes decoding tool, its In, the decryption program is corresponding with the encipheror, is obtained for the initial data for having encrypted file to be decrypted after computing To a result of calculation, and the result of calculation is 0 when not made any modification in having encrypted file;;
Computing module before firmware updates, for when BIOS/firmware updates, refreshing in firmware in environment using the refreshing Decoding tool, the BIOS/firmware after encryption is loaded into internal memory, and BIOS/firmware after encryption is included into the first result of calculation All initial data computing is decrypted, obtain the second result of calculation;
Judge module is infected, for when the second result of calculation value is 0, being determined as that firmware does not infect virus, performing more Newly;When the second result of calculation value is not 0, it is determined as firmware infection virus, sends virus infection alarm prompt.
The present embodiment is corresponded with embodiment 1, and other parts are repeated no more.
Above disclosed is only a kind of preferred embodiment of the invention, it is impossible to the right model of the present invention is limited with this Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.

Claims (2)

1. a kind of firmware based on firmware layer updates anti-virus method, it is characterised in that this method includes:
(1) encipheror is write in Windows consoles, and Encryption Tool will be generated after the encipheror compiling link, Wherein, the encipheror is used to the initial data of file to be encrypted being encrypted after computing to obtain a result of calculation;
(2) by firmware source code compiling generation BIOS BIN files;
(3) call the Encryption Tool that computing is encrypted to the initial data of BIOS BIN files, obtain the first result of calculation, And the first result of calculation is stored in BIOS BIN files, complete BIOS/firmware encryption;
(4) decryption program is increased in refurbishing procedure, generation refreshes decoding tool, wherein, the decryption program and the encryption Program correspondence, a result of calculation is obtained for the initial data for having encrypted file to be decrypted after computing, and the calculating knot Fruit is 0 having encrypted when file is not made any modification;
(5) when BIOS/firmware updates, refresh in firmware and the refreshing decoding tool is used in environment, the BIOS after encryption is consolidated Part is loaded into internal memory, and all initial data that BIOS/firmware after encryption includes the first result of calculation are decrypted into fortune Calculate, obtain the second result of calculation;
(6) if the second result of calculation value is 0, it is determined as that firmware does not infect virus, performs renewal;
(7) if the second result of calculation value is not 0, it is determined as firmware infection virus, sends virus infection alarm prompt.
2. a kind of firmware based on firmware layer updates anti-virus device, it is characterised in that the device includes:
Encryption Tool generation module, chain is compiled for writing encipheror in Windows consoles, and by the encipheror Encryption Tool is generated after connecing, wherein, the encipheror, which is used to the initial data of file to be encrypted being encrypted after computing, to be obtained To a result of calculation;
Collector, for firmware source code compiling to be generated into BIOS BIN files;
Firmware encrypting module, calls the Encryption Tool that computing is encrypted to the initial data of BIOS BIN files, obtains One result of calculation, and the first result of calculation is stored in BIOS BIN files, complete BIOS/firmware encryption;
Refresh decoding tool generation module, for increasing decryption program in refurbishing procedure, generation refreshes decoding tool, wherein, The decryption program is corresponding with the encipheror, and one is obtained for the initial data for having encrypted file to be decrypted after computing Individual result of calculation, and the result of calculation is 0 when not made any modification in having encrypted file;
Computing module before firmware updates, for when BIOS/firmware updates, refreshing in firmware in environment using the refreshing decryption Instrument, the BIOS/firmware after encryption is loaded into internal memory, and BIOS/firmware after encryption is included to the institute of the first result of calculation There is initial data that computing is decrypted, obtain the second result of calculation;
Judge module is infected, for when the second result of calculation value is 0, being determined as that firmware does not infect virus, performing renewal; When second result of calculation value is not 0, it is determined as firmware infection virus, sends virus infection alarm prompt.
CN201710238068.7A 2017-04-13 2017-04-13 Firmware based on firmware layer updates anti-virus method and device Pending CN107092831A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710238068.7A CN107092831A (en) 2017-04-13 2017-04-13 Firmware based on firmware layer updates anti-virus method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710238068.7A CN107092831A (en) 2017-04-13 2017-04-13 Firmware based on firmware layer updates anti-virus method and device

Publications (1)

Publication Number Publication Date
CN107092831A true CN107092831A (en) 2017-08-25

Family

ID=59638597

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710238068.7A Pending CN107092831A (en) 2017-04-13 2017-04-13 Firmware based on firmware layer updates anti-virus method and device

Country Status (1)

Country Link
CN (1) CN107092831A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5964873A (en) * 1997-03-10 1999-10-12 Samsung Electronics Co., Ltd. Method for updating a ROM BIOS
CN101924607A (en) * 2010-08-27 2010-12-22 华为终端有限公司 Firmware processing method based on firmware air transmission technology, device and system thereof
US7971199B1 (en) * 2004-05-03 2011-06-28 Hewlett-Packard Development Company, L.P. Mobile device with a self-updating update agent in a wireless network
CN105068824A (en) * 2015-07-16 2015-11-18 福建联迪商用设备有限公司 Method and device for dividing terminal development mode and product mode
CN106227503A (en) * 2016-07-29 2016-12-14 苏州国芯科技有限公司 Safety chip COS firmware update, service end, terminal and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5964873A (en) * 1997-03-10 1999-10-12 Samsung Electronics Co., Ltd. Method for updating a ROM BIOS
US7971199B1 (en) * 2004-05-03 2011-06-28 Hewlett-Packard Development Company, L.P. Mobile device with a self-updating update agent in a wireless network
CN101924607A (en) * 2010-08-27 2010-12-22 华为终端有限公司 Firmware processing method based on firmware air transmission technology, device and system thereof
CN105068824A (en) * 2015-07-16 2015-11-18 福建联迪商用设备有限公司 Method and device for dividing terminal development mode and product mode
CN106227503A (en) * 2016-07-29 2016-12-14 苏州国芯科技有限公司 Safety chip COS firmware update, service end, terminal and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
IMMEMBER: "checksum-8位和16位校验和代码示例", 《HTTPS://BLOG.CSDN.NET/IMMEMBER/ARTICLE/DETAILS/41244507》 *
徐飞,张新元编著: "《MS-DOS6.2 中文版 使用详解》", 31 January 1995, 中国科学技术大学出版社 *

Similar Documents

Publication Publication Date Title
Namanya et al. The world of malware: An overview
Li et al. Mechanisms of polymorphic and metamorphic viruses
Singhal et al. Malware detection module using machine learning algorithms to assist in centralized security in enterprise networks
EP3270317B1 (en) Dynamic security module server device and operating method thereof
JP4878447B2 (en) Worm containment
US10594705B2 (en) Systems and methods for instructions-based detection of sophisticated obfuscation and packing
Andriesse et al. Parallax: Implicit code integrity verification using return-oriented programming
Zeng et al. Resilient user-side android application repackaging and tampering detection using cryptographically obfuscated logic bombs
Kanzaki et al. Code artificiality: a metric for the code stealth based on an n-gram model
Cicala et al. Analysis of encryption key generation in modern crypto ransomware
Wang et al. Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks
Jia et al. ERMDS: A obfuscation dataset for evaluating robustness of learning-based malware detection system
Greco et al. Explaining binary obfuscation
CN107092831A (en) Firmware based on firmware layer updates anti-virus method and device
Kumar et al. The Recent Trends in Malware Evolution, Detection and Analysis for Android Devices.
Jones et al. Defeating denial-of-service attacks in a self-managing N-variant system
Mishra et al. Dynamic model on the transmission of malicious codes in network
Banescu Characterizing the strength of software obfuscation against automated attacks
Luoma-aho Analysis of modern malware: obfuscation techniques
Bajpai Extracting ransomware's keys by utilizing memory forensics
Sardar et al. Confidential Computing and Related Technologies: A Review
Reinikainen Computer viruses
Smith Malware" Ecology" Viewed as Ecological Succession: Historical Trends and Future Prospects
Sharov Development of Software to Protect Executable Files
Barak Preventive medicine is the best method for computer hygiene

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 210032 Building 501-505, Dongchuang Science and Technology Center, No. 1 Hongfeng Road, Jinqian East Road Enterprise Science and Technology Park, Kunshan City, Suzhou City, Jiangsu Province

Applicant after: Kunshan one hundred Ao Electronic Technology Co., Ltd.

Address before: 215300 Science and Technology Plaza, Qianjin East Road, Kunshan City, Suzhou City, Jiangsu Province, 1602

Applicant before: Kunshan one hundred Ao Electronic Technology Co., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170825