CN109960940B - Log-based embedded device control flow certification method and system - Google Patents
Log-based embedded device control flow certification method and system Download PDFInfo
- Publication number
- CN109960940B CN109960940B CN201910119686.9A CN201910119686A CN109960940B CN 109960940 B CN109960940 B CN 109960940B CN 201910119686 A CN201910119686 A CN 201910119686A CN 109960940 B CN109960940 B CN 109960940B
- Authority
- CN
- China
- Prior art keywords
- log
- jump
- function
- target program
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910119686.9A CN109960940B (en) | 2019-02-18 | 2019-02-18 | Log-based embedded device control flow certification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910119686.9A CN109960940B (en) | 2019-02-18 | 2019-02-18 | Log-based embedded device control flow certification method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109960940A CN109960940A (en) | 2019-07-02 |
CN109960940B true CN109960940B (en) | 2021-01-01 |
Family
ID=67023841
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910119686.9A Active CN109960940B (en) | 2019-02-18 | 2019-02-18 | Log-based embedded device control flow certification method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109960940B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117235686A (en) * | 2023-10-30 | 2023-12-15 | 杭州海康威视数字技术股份有限公司 | Data protection method, device and equipment |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112332973B (en) * | 2020-10-23 | 2022-06-24 | 南京理工大学 | Fine-grained Internet of things equipment control flow protection method |
CN114611106B (en) * | 2022-03-10 | 2024-04-09 | 昆明理工大学 | Program control flow proving method based on multi-target particle swarm algorithm |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103560887A (en) * | 2013-11-04 | 2014-02-05 | 深圳数字电视国家工程实验室股份有限公司 | Intelligent terminal remote attestation method and system |
CN103795717A (en) * | 2014-01-23 | 2014-05-14 | 中国科学院计算技术研究所 | Method and system for proving integrity of cloud computing platform |
CN107194252A (en) * | 2017-05-09 | 2017-09-22 | 华中科技大学 | The program control flow completeness protection method and system of a kind of complete context-sensitive |
CN108345786A (en) * | 2018-01-17 | 2018-07-31 | 中国人民解放军战略支援部队信息工程大学 | The software control stream integrality remote certification method of hardware assist |
CN109583191A (en) * | 2018-10-31 | 2019-04-05 | 清华大学 | Cloud program control flow completeness protection method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8136091B2 (en) * | 2007-01-31 | 2012-03-13 | Microsoft Corporation | Architectural support for software-based protection |
-
2019
- 2019-02-18 CN CN201910119686.9A patent/CN109960940B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103560887A (en) * | 2013-11-04 | 2014-02-05 | 深圳数字电视国家工程实验室股份有限公司 | Intelligent terminal remote attestation method and system |
CN103795717A (en) * | 2014-01-23 | 2014-05-14 | 中国科学院计算技术研究所 | Method and system for proving integrity of cloud computing platform |
CN107194252A (en) * | 2017-05-09 | 2017-09-22 | 华中科技大学 | The program control flow completeness protection method and system of a kind of complete context-sensitive |
CN108345786A (en) * | 2018-01-17 | 2018-07-31 | 中国人民解放军战略支援部队信息工程大学 | The software control stream integrality remote certification method of hardware assist |
CN109583191A (en) * | 2018-10-31 | 2019-04-05 | 清华大学 | Cloud program control flow completeness protection method and device |
Non-Patent Citations (1)
Title |
---|
ARM架构中控制流完整性验证技术研究;叶雁秋 等;《计算机工程》;20150331;第41卷(第3期);第151-171页 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117235686A (en) * | 2023-10-30 | 2023-12-15 | 杭州海康威视数字技术股份有限公司 | Data protection method, device and equipment |
CN117235686B (en) * | 2023-10-30 | 2024-01-30 | 杭州海康威视数字技术股份有限公司 | Data protection method, device and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN109960940A (en) | 2019-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Steiner et al. | Attestation in wireless sensor networks: A survey | |
Ibrahim et al. | Darpa: Device attestation resilient to physical attacks | |
Shuai et al. | Modelling analysis and auto-detection of cryptographic misuse in android applications | |
Dunn et al. | Cloaking malware with the trusted platform module | |
US9177153B1 (en) | Verifying integrity and guaranteeing execution of code on untrusted computer platform | |
CN109960940B (en) | Log-based embedded device control flow certification method and system | |
Schneier et al. | Surreptitiously weakening cryptographic systems | |
CN110276198B (en) | Embedded variable granularity control flow verification method and system based on probability prediction | |
Agrawal et al. | Detection of node capture attack in wireless sensor networks | |
CN105323074B (en) | The trust authentication method in terminal device geographical location | |
CN111783097A (en) | Information integrity measurement verification method and system for satellite-borne computing system | |
Lu et al. | xTSeH: A trusted platform module sharing scheme towards smart IoT-eHealth devices | |
Tan et al. | A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks. | |
CN108184146B (en) | Method for calculating popularity of live broadcast platform and related equipment | |
Banescu et al. | Software-based protection against changeware | |
US20220335118A1 (en) | Detection and prevention of reverse engineering of computer programs | |
Mus et al. | Jolt: Recovering tls signing keys via rowhammer faults | |
Myers et al. | MAD-IoT: Memory anomaly detection for the Internet of Things | |
CN107026729B (en) | Method and device for transmitting software | |
Li et al. | Practical analysis framework for software-based attestation scheme | |
Zaharis et al. | Live forensics framework for wireless sensor nodes using sandboxing | |
Colombo et al. | Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. | |
Wagner et al. | Faulting Winternitz One-Time Signatures to Forge LMS, XMSS, or Signatures | |
Yoshida et al. | Towards trusted iot sensing systems: Implementing puf as secure key generator for root of trust and message authentication code | |
Ferreira et al. | Software-based security approach for networked embedded devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Luohu District Shenzhen Shennan Road 518000 No. 4020 Guangdong provincial power dispatching center building Applicant after: SHENZHEN POWER SUPPLY BUREAU Co.,Ltd. Applicant after: Institute of Software, Chinese Academy of Sciences Applicant after: China Southern Power Grid Research Institute Co.,Ltd. Address before: 100190 No. four, 4 South Street, Haidian District, Beijing, Zhongguancun Applicant before: Institute of Software, Chinese Academy of Sciences Applicant before: China Southern Power Grid Research Institute Co.,Ltd. Applicant before: SHENZHEN POWER SUPPLY BUREAU Co.,Ltd. |
|
CB02 | Change of applicant information | ||
CB03 | Change of inventor or designer information |
Inventor after: Lv Zhining Inventor after: Xi Wei Inventor after: Kuang Xiaoyun Inventor after: Yao Hao Inventor after: Yu Yang Inventor after: Ning Baifeng Inventor after: Luo Weifeng Inventor after: Liu Wei Inventor after: Deng Wei Inventor after: Qin Yu Inventor after: Liu Jingbin Inventor after: Zhao Shijun Inventor after: Feng Wei Inventor before: Lv Zhining Inventor before: Liu Wei Inventor before: Kuang Xiaoyun Inventor before: Yao Hao Inventor before: Yu Yang Inventor before: Qin Yu Inventor before: Liu Jingbin Inventor before: Zhao Shijun Inventor before: Ning Baifeng Inventor before: Feng Wei Inventor before: Xi Wei Inventor before: Luo Weifeng Inventor before: Deng Wei |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |