CN107886005B - A kind of cipher processing method and system of system management interrupt - Google Patents
A kind of cipher processing method and system of system management interrupt Download PDFInfo
- Publication number
- CN107886005B CN107886005B CN201711190693.5A CN201711190693A CN107886005B CN 107886005 B CN107886005 B CN 107886005B CN 201711190693 A CN201711190693 A CN 201711190693A CN 107886005 B CN107886005 B CN 107886005B
- Authority
- CN
- China
- Prior art keywords
- port
- information
- write
- interrupt
- written
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of cipher processing method of system management interrupt and system, the cipher processing method includes: to preset the first interrupt number, for receiving the first port I/O of the first interrupt number, and the 2nd port I/O for receiving interruption data;It when needing using system management interrupt, is first written to the 2nd port I/O and interrupts data, then the first interrupt number is written to the first port I/O, triggering CPU enters System Management Mode;When triggering enters System Management Mode, the first write-in information, which is read, from the first port I/O judges whether the first write-in information is identical as first interrupt number, if they are the same, the second write-in information then is read from the 2nd port I/O, corresponding interrupt processing is executed according to the second write-in information.The embodiment of the present invention can effectively evade the maloperation of extraneous attack and user, guarantee the safety of system.
Description
Technical field
The present invention relates to the cipher processing method of interrupt processing technology field more particularly to a kind of system management interrupt and it is
System.
Background technique
SMM (System Management Mode, System Management Mode) is CPU used in general computer system now
A kind of special function of (Central Processing Unit, central processing unit).As SMI (System Management
Interrupt, system management interrupt) when being triggered to central processing unit, System Management Mode will be entered.In system administration
Under mode, CPU will execute the SMI handler of BIOS (Basic Input Output System, basic input output system)
(SMIhandler routine, system management interrupt handler), to be serviced by SMI handler in this system administration
It is disconnected.
The SMI of Intel platform is the interrupt number by specifying to the fixed port I/O (such as 0xB2) write-in at present, thus
Certain Special controllings are done to system.But the interrupt number that the fixed port I/O can receive at most only has 256 (0~0xFF) kind
May, such mechanism is easy by hacker attack to which there are security risks, or because the maloperation of user causes to open
Specific function generates system abnormal, such as cannot be started up, accidentally enter factory mode etc..
Summary of the invention
The purpose of the present invention is to provide a kind of cipher processing method of system management interrupt and systems, avoid extraneous evil
Meaning attack or the maloperation of user cause system exception.
To achieve this purpose, the present invention adopts the following technical scheme:
A kind of cipher processing method of system management interrupt, comprising:
The first interrupt number is preset, interrupts number for receiving the first port I/O of the first interrupt number, and for receiving
According to the 2nd port I/O;
When needing using system management interrupt, is first written to the 2nd port I/O and interrupts data, then to described first
The first interrupt number is written in the port I/O, and triggering CPU enters System Management Mode;
When triggering enters System Management Mode, the first write-in information is read from the first port I/O and judges described the
Whether one write-in information is identical as first interrupt number, if they are the same, then reads the second write-in letter from the 2nd port I/O
Breath executes corresponding interrupt processing according to the second write-in information.
Optionally, when determining the first write-in information and not identical first interrupt number, the first I/O is removed
First write-in information of port and the second write-in information of the 2nd port I/O, do not execute interrupt processing.
Optionally, the cipher processing method further include: preset the 3rd end I/O for receiving the first license code
Mouthful, for receiving the 4th port I/O of the second license code;
When needing using system management interrupt, before the first interrupt number is written to the first port I/O further include:
The first license code is generated, the second license code is obtained to the first license code encryption according to preset Encryption Algorithm;To described
First license code is written in three ports I/O, and second license code is written in the 4th port I/O Xiang Suoshu;
Triggering enter System Management Mode when, determine it is described first write-in information it is identical with the first interrupt number later and
Before execution interrupt processing further include: obtain third from the 3rd port I/O and information is written, obtained from the 4th port I/O
The 4th write-in information is taken, judges whether the information decrypted by the 4th write-in information and third write-in information are identical, if they are the same,
Corresponding interrupt processing is then executed according to the second write-in information.
Optionally, the cipher processing method includes:
In the information and not identical third write-in information for determining to be decrypted by the 4th write-in information, described first is removed
The write-in information of the port I/O, the 2nd port I/O, the 3rd port I/O and the 4th port I/O, does not execute interrupt processing.
Optionally, first license code is generated using random fashion.
Optionally, the preset Encryption Algorithm are as follows: A | B=FF;A therein is first license code, and B is described the
Two license codes.
A kind of encryption treatment system of system management interrupt, comprising:
Parameter setting unit, for presetting the first interrupt number, for receiving the first port I/O of the first interrupt number,
And for receiving the 2nd port I/O for interrupting data;
Information writing unit, for being first written and interrupting to the 2nd port I/O when needing using system management interrupt
Data, then the first interrupt number is written to the first port I/O, triggering CPU enters System Management Mode;
Interrupt processing unit, for reading the first write-in letter from the first port I/O under the System Management Mode
Breath judges whether the first write-in information is identical as first interrupt number, if they are the same, then reads from the 2nd port I/O
The second write-in information is taken, corresponding interrupt processing is executed according to the second write-in information.
Optionally, the parameter setting unit is also used to preset the 3rd end I/O for receiving the first license code
Mouthful, and the 4th port I/O for receiving the second license code;
The information writing unit is also used to when needing using system management interrupt, to the first I/O port write
Before entering the first interrupt number, the first license code is generated, the is obtained to the first license code encryption according to preset Encryption Algorithm
Two license codes, and first license code, the 4th port I/O Xiang Suoshu write-in described second is written to the 3rd port I/O
License code;
The interrupt processing unit is also used to after determining that the first write-in information is identical as the first interrupt number and holds
Before row interrupt processing, third is obtained from the 3rd port I/O, information is written, obtain the 4th from the 4th port I/O and write
Enter information, judges whether the information decrypted by the 4th write-in information and third write-in information are identical, if they are the same, then according to institute
It states the second write-in information and executes corresponding interrupt processing.
Optionally, the encryption treatment system includes: erasing of information unit, for determine it is described first write-in information with
When the first interrupt number difference, and it is different from third write-in information in the information for determining to be decrypted by the 4th write-in information
When, remove the write-in information of the first port I/O, the 2nd port I/O, the 3rd port I/O and the 4th port I/O.
Compared with prior art, the embodiment of the present invention has the advantages that
The embodiment of the present invention is when the first fixed port I/O receives interrupt number, not directly according to the interrupt number
Carry out interrupt processing, but first judge the interrupt number whether be the first specified interrupt number, further according to from the 2nd port I/O read
Interruption data execute corresponding interrupt processing, can effectively evade the maloperation of extraneous attack and user, guarantee the peace of system
Quan Xing.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art
To obtain other attached drawings according to these attached drawings.
Fig. 1 is the cipher processing method flow chart for the system management interrupt that the embodiment of the present invention one provides;
Fig. 2 is the cipher processing method flow chart of system management interrupt provided by Embodiment 2 of the present invention.
Specific embodiment
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention
Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that disclosed below
Embodiment be only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiments of the present invention, this field
Those of ordinary skill's all other embodiment obtained without making creative work, belongs to protection of the present invention
Range.
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
Embodiment one
Referring to Fig. 1, a kind of cipher processing method of system management interrupt is present embodiments provided, comprising steps of
Step 101 presets the first interrupt number, for receiving the first port I/O of the first interrupt number, and for connecing
Receive the 2nd port I/O for interrupting data.
Wherein, the first interrupt number will be used to trigger CPU and enter System Management Mode, while as judging whether in execution
The judgment basis of disconnected processing, can be any type of SMI interrupt number.
First port I/O and the 2nd port I/O are different ports.
Step 102, when operating system is needed using system management interrupt, first to the 2nd port I/O be written according to user
The interruption data that the parameter information of input generates, then the first interrupt number is written to the first port I/O, triggering CPU, which enters, is
System management mode.
Step 103, under System Management Mode, obtain the first port I/O first write-in information, judge this first write-in
Whether information is identical as preset first interrupt number,
If they are the same, then the second write-in information is read from the 2nd port I/O, and is executed in corresponding according to the second write-in information
Disconnected processing;
If it is different, then removing the first write-in information of the first port I/O and the second write-in information of the 2nd port I/O, no
Execute interrupt processing.
The present embodiment receives interrupt number in the first fixed port I/O, and trigger action system enters System Management Mode
When, interrupt processing is not directly carried out according to the interrupt number, but first judge whether the interrupt number is the first specified interrupt number, it can
The maloperation for effectively evading extraneous attack and user, guarantees the safety of system.
Embodiment two
Referring to Fig. 2, the cipher processing method of another system management interrupt is present embodiments provided, comprising steps of
Step 201 presets the first interrupt number, for receiving the first port I/O of the first interrupt number, used in receiving
2nd port I/O of disconnected data, for receiving the 3rd port I/O of license code A, and the 4th I/O for receiving license code B
Port.
Wherein, the first interrupt number will be used as while being used to trigger CPU and entering System Management Mode and judge whether to execute
The initial decision foundation of interrupt processing can be any type of SMI interrupt number.First port I/O, the 2nd port I/O, third
The port I/O and the 4th port I/O are respectively different ports, for receiving different information.For example, the first port I/O is set as
The port 0xC6, the 2nd port I/O are set as the port 0xB3, and the 3rd port I/O is set as the port 0xB4, and the 4th port I/O is set as 0xB5
Port.
Step 202, when operating system is needed using system management interrupt, a license code A is first generated, according still further to default
Encryption Algorithm license code B is obtained to license code A encryption;And it is generated according to the parameter information of user's input and interrupts data.
In this step, random fashion generation is can be used in license code A, and specific format does not limit;License code B is added by license code A
Close processing obtains, to centainly be associated with license code A generation.In follow-up process, license code A and license code B will be applied in combination,
As another judgment basis for judging whether execution interrupt processing.
Used Encryption Algorithm can be any particular algorithms, not limit specifically.Such as: license code B can be license code A's
Complement code, that is to say, that license code A and license code B " step-by-step or " the result is that 0xFF.
Data are interrupted, this specific interrupt operation content needed to be implemented is reflected, can be specific SMI interrupt number.
Step 203 is written to the 2nd port I/O and interrupts data, license code A is written to the 3rd port I/O, to the 4th I/O
License code B is written in port.
The first interrupt number is written to the first port I/O for step 204, which enters system administration for CPU is triggered
Mode.
Step 205, under System Management Mode, obtain the first port I/O first write-in information, judge this first write-in
Whether information is preset first interrupt number, if so, perform the next step, otherwise gos to step 209.
Under normal circumstances, the first write-in information that the first port I/O is written should be the first interrupt number;And by black
Visitor malicious attack or user misoperation when, write-in the 4th port I/O first write-in information may change, for except
Other interrupt numbers except first interrupt number, will not execute interrupt processing at this time.
Step 206 obtains the interruption data that the 2nd port I/O receives, and obtains the third that the 3rd port I/O receives and writes
Enter information, obtains the 4th write-in information that the 4th port I/O receives.
Under normal circumstances, third write-in information should be license code A, and the 4th write-in information should be license code B, third write-in
Meet preset condition between information and the 4th write-in information;However, when by the malicious attack or user misoperation of hacker,
Even if the third write-in information of acquisition may be changed with the 4th write-in information into System Management Mode, it is unsatisfactory for pre-
If condition.
Step 207, according to preset decipherment algorithm, to read 4th write-in information decryption, and judge that decryption obtains
Data and read third write-in information it is whether identical, if they are the same, then perform the next step, otherwise go to step 209.
The interruption data that step 208, basis are read from the 2nd port I/O execute corresponding interrupt processing operation.
Step 209, the data for removing each port I/O, terminate this process.
To sum up, in this process, when the first fixed port I/O receives interrupt number, not directly according in this
Disconnected number carries out interrupt processing, but first judges whether the interrupt number is the first specified interrupt number, secondly judges from the 3rd end I/O
Whether two license codes that mouth and the 4th port I/O obtain meet preset condition, further according to the interruption read from the 2nd port I/O
Data execute corresponding interrupt processing, can effectively evade the maloperation of extraneous attack and user, guarantee the safety of system.
Embodiment three
Present embodiments provide a kind of encryption treatment system of system management interrupt, comprising: parameter setting unit, information are write
Enter unit, interrupt processing unit.
Parameter setting unit, for presetting the first interrupt number, for receiving the first port I/O of the first interrupt number,
And for receiving the 2nd port I/O for interrupting data, for receiving the 3rd port I/O of the first license code, and for connecing
Receive the 4th port I/O of the second license code;
Information writing unit, for a license code A first being generated, according still further to pre- when needing using system management interrupt
If Encryption Algorithm license code B obtained to license code A encryption, and generated according to the parameter information of user's input and interrupt number
According to the 2nd port I/O write-in interruption data, to the 3rd port I/O write-in license code A, to the 4th port I/O write-in license code
B;The first interrupt number finally is written to the first port I/O, triggering CPU enters System Management Mode;
Interrupt processing unit, for reading the first write-in information, judgement from the first port I/O under System Management Mode
Whether the first write-in information is identical as the first interrupt number, if they are the same, then obtains third from the 3rd port I/O and information is written, from the
Four ports I/O obtain the 4th write-in information, when the information decrypted by the 4th write-in information is identical as third write-in information,
The second write-in information is read from the 2nd port I/O, corresponding interrupt processing is executed according to the second write-in information.
The system further includes erasing of information unit, is used for when information and the first interrupt number difference is written in judgement first, and
In the information and third write-in information difference for determining decrypted by the 4th write-in information, the first port I/O, the 2nd I/ are removed
O port, the 3rd port I/O and the 4th port I/O write-in information.
Different from traditional direct mode for carrying out interrupt processing according to interrupt number, the interrupt processing unit of the present embodiment is adopted
With safer reliable processing mode, effectively evades the maloperation of extraneous attack and user, guarantee the safety of system.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before
Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (7)
1. a kind of cipher processing method of system management interrupt, which is characterized in that the cipher processing method includes:
The first interrupt number is preset, interrupts data for receiving the first port I/O of the first interrupt number, and for receiving
2nd port I/O;
When needing using system management interrupt, is first written to the 2nd port I/O and interrupts data, then to the first I/O
The first interrupt number is written in port, and triggering CPU enters System Management Mode;
When triggering enters System Management Mode, the first write-in information is read from the first port I/O and judges that described first writes
Whether identical as first interrupt number enter information, if they are the same, then reads the second write-in information, root from the 2nd port I/O
Corresponding interrupt processing is executed according to the second write-in information;
The cipher processing method further include: the 3rd port I/O for receiving the first license code is preset, for receiving the
4th port I/O of two license codes;
When needing using system management interrupt, before the first interrupt number is written to the first port I/O further include: generate
First license code obtains the second license code to the first license code encryption according to preset Encryption Algorithm;To the 3rd I/O
First license code is written in port, and second license code is written in the 4th port I/O Xiang Suoshu;
When triggering enters System Management Mode, after determining that the first write-in information is identical as the first interrupt number and execute
Before interrupt processing further include: obtain third from the 3rd port I/O and information is written, obtain the from the 4th port I/O
Four write-in information, judge information is written by the 4th information decrypted of write-in information and third it is whether identical, if they are the same, then root
Corresponding interrupt processing is executed according to the second write-in information.
2. the cipher processing method of system according to claim 1 management interrupt, which is characterized in that determining described first
When information and not identical first interrupt number is written, the first write-in information and the 2nd end I/O of the first port I/O are removed
Second write-in information of mouth, does not execute interrupt processing.
3. the cipher processing method of system according to claim 1 management interrupt, which is characterized in that the encryption side
Method includes:
In the information and not identical third write-in information for determining to be decrypted by the 4th write-in information, the first I/O is removed
The write-in information of port, the 2nd port I/O, the 3rd port I/O and the 4th port I/O, does not execute interrupt processing.
4. the cipher processing method of system according to claim 1 management interrupt, which is characterized in that first license code
It is generated using random fashion.
5. the cipher processing method of system according to claim 1 management interrupt, which is characterized in that the preset encryption
Algorithm are as follows: A | B=FF;A therein is first license code, and B is second license code.
6. a kind of encryption treatment system of system management interrupt, which is characterized in that the encryption treatment system includes:
Parameter setting unit, for presetting the first interrupt number, for receiving the first port I/O of the first interrupt number, and
For receiving the 2nd port I/O for interrupting data;
Information writing unit, for being first written to the 2nd port I/O and interrupting number when needing using system management interrupt
According to, then to the first interrupt number of the first port I/O write-in, triggering CPU enters System Management Mode;
Interrupt processing unit, for reading the first write-in information from the first port I/O under the System Management Mode,
Judge whether the first write-in information is identical as first interrupt number, if they are the same, then reads the from the 2nd port I/O
Two write-in information execute corresponding interrupt processing according to the second write-in information;
The parameter setting unit is also used to preset the 3rd port I/O for receiving the first license code, and for connecing
Receive the 4th port I/O of the second license code;
The information writing unit is also used to when needing using system management interrupt, to the first port I/O write-in the
Before one interrupt number, the first license code is generated, second is obtained to the first license code encryption according to preset Encryption Algorithm and is permitted
Can code, and first license code, the 4th port I/O Xiang Suoshu write-in second license is written to the 3rd port I/O
Code;
The interrupt processing unit is also used to after determining that the first write-in information is identical as the first interrupt number and in execution
Before disconnected processing, third is obtained from the 3rd port I/O, information is written, obtain the 4th write-in letter from the 4th port I/O
Breath, judge information is written by the 4th information decrypted of write-in information and third it is whether identical, if they are the same, then according to described the
Two write-in information execute corresponding interrupt processing.
7. the encryption treatment system of system management interrupt according to claim 6, which is characterized in that the encryption system
System includes: erasing of information unit, is used for when determining the first write-in information and the first interrupt number difference, and determining
When the information and third write-in information difference decrypted by the 4th write-in information, the first port I/O, the 2nd I/O are removed
The write-in information of port, the 3rd port I/O and the 4th port I/O.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711190693.5A CN107886005B (en) | 2017-11-24 | 2017-11-24 | A kind of cipher processing method and system of system management interrupt |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711190693.5A CN107886005B (en) | 2017-11-24 | 2017-11-24 | A kind of cipher processing method and system of system management interrupt |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107886005A CN107886005A (en) | 2018-04-06 |
CN107886005B true CN107886005B (en) | 2019-11-08 |
Family
ID=61774887
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711190693.5A Active CN107886005B (en) | 2017-11-24 | 2017-11-24 | A kind of cipher processing method and system of system management interrupt |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107886005B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101859258A (en) * | 2009-04-08 | 2010-10-13 | 英特尔公司 | Interrupt redirection between the System Management Mode processor |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1121012C (en) * | 2000-03-03 | 2003-09-10 | 英业达股份有限公司 | Method for preventing BIOS from virus damage |
US7698507B2 (en) * | 2007-02-28 | 2010-04-13 | Intel Corporation | Protecting system management mode (SMM) spaces against cache attacks |
US20090320128A1 (en) * | 2008-06-04 | 2009-12-24 | Dell Products L.P. | System management interrupt (smi) security |
CN102467644B (en) * | 2010-11-17 | 2014-09-03 | 英业达股份有限公司 | Method for executing system management interrupt |
-
2017
- 2017-11-24 CN CN201711190693.5A patent/CN107886005B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101859258A (en) * | 2009-04-08 | 2010-10-13 | 英特尔公司 | Interrupt redirection between the System Management Mode processor |
Also Published As
Publication number | Publication date |
---|---|
CN107886005A (en) | 2018-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8856542B2 (en) | System and method for detecting malware that interferes with the user interface | |
EP3779745B1 (en) | Code pointer authentication for hardware flow control | |
CN100489805C (en) | Autonomous memory checker for runtime security assurance and method therefore | |
RU2627107C2 (en) | Code execution profiling | |
CN102722675B (en) | The device of secure execution environments is provided and performs the method for safe coding | |
US10303883B2 (en) | Firmware verification through data ports | |
CN101334760B (en) | Method, device for controlling bus illegal operation and system embodying the device | |
US10409705B2 (en) | Automated code verification and machine learning in software defined networks | |
US10671416B2 (en) | Layered virtual machine integrity monitoring | |
EP2181394B1 (en) | Method of protecting input/output packet of usb device and apparatus thereof | |
CN102047261B (en) | A method for adapting and executing a computer program and computer architecture therefore | |
WO2019209630A1 (en) | File processing method and system, and data processing method | |
US20220292226A1 (en) | Peripheral Device Comportability with Security Circuitry | |
EP3270318A1 (en) | Dynamic security module terminal device and method for operating same | |
US9542557B2 (en) | Snoop-based kernel integrity monitoring apparatus and method thereof | |
CN110362995B (en) | Malicious software detection and analysis system based on reverse direction and machine learning | |
US20210357532A1 (en) | Preemption of a container in a secure computation environment | |
CN104866767A (en) | Embedded module of novel security mechanism | |
US10496974B2 (en) | Secure transactions with connected peripherals | |
CN101175268B (en) | Method and device for controlling operation authority of communication terminal chip | |
CN107886005B (en) | A kind of cipher processing method and system of system management interrupt | |
Lee et al. | Keyboard security: A technological review | |
CN104361280B (en) | A kind of method realizing carrying out authentic authentication to USB storage device by SMI interrupt | |
Abbasi | Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O | |
Yim | A new noise mingling approach to protect the authentication password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |