CN116303017A - Internet of things equipment safety debugging method and device, medium and electronic equipment - Google Patents

Internet of things equipment safety debugging method and device, medium and electronic equipment Download PDF

Info

Publication number
CN116303017A
CN116303017A CN202310263498.XA CN202310263498A CN116303017A CN 116303017 A CN116303017 A CN 116303017A CN 202310263498 A CN202310263498 A CN 202310263498A CN 116303017 A CN116303017 A CN 116303017A
Authority
CN
China
Prior art keywords
internet
debugging
sram space
information
things
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310263498.XA
Other languages
Chinese (zh)
Inventor
周健波
王峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ziguang Zhanrui Communication Technology Co Ltd
Original Assignee
Beijing Ziguang Zhanrui Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ziguang Zhanrui Communication Technology Co Ltd filed Critical Beijing Ziguang Zhanrui Communication Technology Co Ltd
Priority to CN202310263498.XA priority Critical patent/CN116303017A/en
Publication of CN116303017A publication Critical patent/CN116303017A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/3644Software debugging by instrumenting at runtime
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/3648Software debugging using additional hardware
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/10Detection; Monitoring
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a method, a device, a medium and electronic equipment for safely debugging Internet of things equipment, wherein the method comprises the following steps: configuring an MTB module function of the Internet of things equipment to be in an on state, pre-distributing a first SRAM space, wherein the first SRAM space is used for storing stack information of an unsafe world when a program of the Internet of things equipment runs; when the running of the Internet of things equipment is abnormal, invoking a safe storage service in an abnormal interrupt processing function in a software system of the Internet of things equipment, encrypting stack information in a first SRAM space, generating encrypted debugging information, and storing the debugging information into FLASH; and after the Internet of things equipment is powered on again, analyzing and debugging the debugging information in the FLASH through a debugging tool. The method has less requirements on the debugging environment for the Internet of things equipment debugging, and can conveniently acquire the debugging information for debugging. And the debugging information can be safe by encrypting the debugging information, so that the debugging safety is high.

Description

Internet of things equipment safety debugging method and device, medium and electronic equipment
Technical Field
The invention relates to the technical field of chip debugging, in particular to a method and a device for safely debugging equipment of the Internet of things, a medium and electronic equipment.
Background
The current Cortex-M chip debugging mainly depends on an emulator, a joint test working group (JointTest ActionGroup, JTAG) on-line debugging, trace32 (a debugging tool) debugging and the like, so that the debugging environment is more dependent and more required, and the debugging is more troublesome to use. If the simulator is not connected or the crash situation happens probabilistically when the equipment of the Internet of things crashes, debugging information is difficult to acquire, debugging is difficult, the required debugging cost is high, and the debugging time is long. Therefore, it is necessary to provide a new method for debugging the internet of things device to solve the above-mentioned problems.
Disclosure of Invention
The invention aims to provide a method and a device for safely debugging Internet of things equipment, a medium and electronic equipment, which are used for solving the problem that the Internet of things equipment is difficult to debug.
In a first aspect, the method for safely debugging the internet of things equipment provided by the invention comprises the following steps: configuring an MTB module function of the Internet of things equipment to be in an on state, and pre-distributing a first SRAM space, wherein the first SRAM space is used for storing stack information of a non-secure world when a program of the Internet of things equipment runs; when the operation of the Internet of things equipment is abnormal, invoking a safe storage service in an abnormal interrupt processing function in the Internet of things equipment software system, encrypting stack information in the first SRAM space, generating encrypted debugging information, and storing the debugging information into FLASH; and after the Internet of things equipment is powered on again, analyzing and debugging the debugging information in the FLASH through a debugging tool.
The safety debugging method of the Internet of things equipment provided by the invention has the beneficial effects that: the requirements on the debugging environment are less, and the debugging information can be conveniently acquired for debugging. And the debugging information can be safe by encrypting the debugging information, so that the debugging safety is high.
In a possible embodiment, when the internet of things device is not provided with a trust zone chip, encrypting stack information in the first SRAM space, including: the stack information in the first SRAM space is encrypted with the debug public key.
In another possible embodiment, when the internet of things device is provided with a trust zone chip, a second SRAM space is also pre-allocated, where the second SRAM space is used to store stack information of a secure world when a program of the internet of things device runs; when the operation of the Internet of things equipment is abnormal, calling a safe storage service in an abnormal interrupt processing function in the software system of the Internet of things equipment, and copying stack information in the first SRAM space to the second SRAM space; and encrypting the encryption key through the debugging public key to obtain a target encryption key, and encrypting the debugging information in the second SRAM space through the target encryption key.
In other possible embodiments, when the first SRAM space stores stack information of the unsafe world during program operation of the internet of things device, the method includes: judging whether the first SRAM space is filled up or not; and if the first SRAM space is filled, discarding the data information which is stored earlier and is in the set time length in the first SRAM space, and storing stack information to be stored into the first SRAM space.
When the Internet of things equipment is provided with a trust zone chip, the control equipment to which the debugging tool belongs has safety access rights; when the internet of things equipment is not provided with the trust zone chip, the control equipment to which the debugging tool belongs has access rights.
In a second aspect, the present invention further provides a device for safely debugging an internet of things device, including:
the configuration unit is used for configuring the MTB module function of the Internet of things equipment to be in an on state, and pre-distributing a first SRAM space, wherein the first SRAM space is used for storing stack information of the unsafe world when a program of the Internet of things equipment runs;
the encryption storage unit is used for calling a safe storage service in an abort processing function in the software system of the Internet of things equipment when the operation of the Internet of things equipment is abnormal, encrypting stack information in the first SRAM space, generating encrypted debugging information, and storing the debugging information into a FLASH;
and the analysis and debugging unit is used for analyzing and debugging the debugging information in the FLASH through a debugging tool after the Internet of things equipment is powered on again.
When the internet of things device is not provided with a trust zone chip, the encryption storage unit encrypts stack information in the first SRAM space, and is specifically used for: the stack information in the first SRAM space is encrypted with the debug public key.
When the internet of things equipment is provided with a trust zone chip, a second SRAM space is also pre-allocated, wherein the second SRAM space is used for storing stack information of the safety world when a program of the internet of things equipment runs; when the operation of the Internet of things equipment is abnormal, calling a safe storage service in an abnormal interrupt processing function in the software system of the Internet of things equipment, and copying stack information in the first SRAM space to the second SRAM space; and encrypting the encryption key through the debugging public key to obtain a target encryption key, and encrypting the debugging information in the second SRAM space through the target encryption key.
When the first SRAM space stores stack information of the unsafe world when the program of the internet of things device runs, the method comprises: judging whether the first SRAM space is filled up or not; and if the first SRAM space is filled, discarding the data information which is stored earlier and is in the set time length in the first SRAM space, and storing stack information to be stored into the first SRAM space.
When the Internet of things equipment is provided with a trust zone chip, the control equipment to which the debugging tool belongs has safety access rights; when the internet of things equipment is not provided with the trust zone chip, the control equipment to which the debugging tool belongs has access rights.
In a third aspect, the present invention also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor implements the above method.
In a fourth aspect, the present invention also provides an electronic device, including: a processor and a memory; the memory is used for storing a computer program; the processor is configured to execute the computer program stored in the memory, so that the electronic device performs the above method.
The advantageous effects concerning the above second to fourth aspects can be seen from the description of the above first aspect.
Drawings
Fig. 1 is a flow chart of a security debugging method for an internet of things device according to an embodiment of the present invention;
fig. 2 is a schematic working diagram of an internet of things device according to an embodiment of the present invention when a trust zone chip is not provided;
fig. 3 is a schematic working diagram of an internet of things device according to an embodiment of the present invention when a trust zone chip is provided;
fig. 4 is a schematic structural diagram of a security debugging device for an internet of things device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention. Unless otherwise defined, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this invention belongs. As used herein, the word "comprising" and the like means that elements or items preceding the word are included in the element or item listed after the word and equivalents thereof without precluding other elements or items.
Aiming at the problems existing in the prior art, the embodiment of the invention provides a method, a device, a medium and electronic equipment for safely debugging the equipment of the Internet of things, so as to solve the problem of difficult debugging of the equipment of the Internet of things.
The embodiment provides a method for safely debugging equipment of the Internet of things. Referring to fig. 1 of the specification, the method comprises:
s1: an MTB (micro buffer) module function of the Internet of things equipment is configured to be in an on state, and a first SRAM (static random-Access memory) space is pre-allocated and used for storing stack information of the unsafe world when a program of the Internet of things equipment runs.
Referring to fig. 2 of the specification, in S1, in a possible embodiment, when the internet of things device is not provided with a trust zone chip, a first SRAM space is pre-allocated, where the first SRAM space is used to store stack information of an unsafe world when a program of the internet of things device runs. When the internet of things device operates, the generated stack information is stored in the first SRAM space continuously. Because the memory allocated in the first SRAM space is limited, the memory allocated in the first SRAM space is filled in the running process of the internet of things device, and early data needs to be discarded to save stack information.
Referring to fig. 3 of the specification, in a possible embodiment, when the internet of things device is provided with a trust zone chip, the physical network device includes a secure world and an unsecure world, it is necessary to pre-allocate a first SRAM space in the unsecure world and pre-allocate a second SRAM space in the secure world. Wherein, since the second SRAM space is in the secure world, protected by the security module, only the device given the secure access right can access, and the first SRAM space in the non-secure world can be accessed by the device given the access right.
The first SRAM space is used for storing stack information of an unsafe world when a program of the Internet of things equipment runs, and the second SRAM space is used for storing stack information of the safe world when the program of the Internet of things equipment runs. When the internet of things device operates, stack information generated by the unsafe world can be continuously stored in the first SRAM space, and stack information generated by the safe world can be continuously stored in the second SRAM space. Because the memories allocated to the first SRAM space and the second SRAM space are limited, the memories allocated to the first SRAM space and the second SRAM space are filled in the running process of the internet of things device, and early data needs to be discarded to save stack information.
Illustratively, when the first SRAM space stores stack information of a non-secure world when a program of the internet of things device runs, the method includes: judging whether the first SRAM space is filled or not; if the first SRAM space is filled, discarding the stored data information which is stored earlier and is in a set time length in the first SRAM space, and storing stack information to be stored into the first SRAM space; if the first SRAM space is not filled, the stack information is directly stored in the first SRAM space.
When the second SRAM space stores stack information of the secure world during program running of the internet of things device, the method comprises: judging whether the second SRAM space is filled up; if the second SRAM space is filled, discarding the stored data information which is stored earlier and is in a set time length in the second SRAM space, and storing stack information to be stored into the second SRAM space; if the second SRAM space is not filled, the stack information is directly stored in the first SRAM space.
S2: when the running of the Internet of things equipment is abnormal, a safe storage service is called in an abnormal interrupt processing function in the software system of the Internet of things equipment, stack information in a first SRAM space is encrypted, encrypted debugging information is generated, and the encrypted debugging information is stored in FLASH (FLASH memory).
Referring to fig. 2 of the specification, in S2, in a possible embodiment, when the internet of things device is not provided with a trust zone chip, and when an abnormality occurs in operation of the internet of things device, a secure storage service is invoked in an abort handling function in a software system of the internet of things device, and stack information in a first SRAM space is encrypted, including: when the operation of the Internet of things equipment is abnormal, the secure storage service is called in an abnormal interrupt processing function in the software system of the Internet of things equipment, and stack information in the first SRAM space is encrypted through the debugging public key. When the operation of the internet of things equipment is abnormal, the stack information in the first SRAM space can be used for debugging, and the encrypted debugging information is obtained after the stack information in the first SRAM space is encrypted, so that the safety of the debugging information can be realized, and the debugging safety is improved. And after the encrypted debugging information is obtained, storing the encrypted debugging information into FLASH.
Referring to fig. 3 of the specification, in a possible embodiment, when an internet of things device is provided with a trust zone chip, and when the operation of the internet of things device is abnormal, a secure storage service is called in an abnormal interrupt processing function in a software system of the internet of things device, and stack information in a first SRAM space is copied to a second SRAM space; and encrypting the encryption key through the debugging public key to obtain a target encryption key, and encrypting the debugging information in the second SRAM space through the target encryption key. When the operation of the Internet of things equipment is abnormal, stack information in the first SRAM space and the second SRAM space can be used for debugging, data in the second SRAM space is encrypted after the stack information in the first SRAM space is copied to the second SRAM space, and the stack information in the first SRAM space and the stack information in the second SRAM space can be encrypted to generate encrypted debugging information when the operation of the Internet of things equipment is abnormal. The target encryption key is adopted to encrypt the data, and the encrypted debugging information is stored in the FLASH which can be read only in the safety world, so that the safety of the debugging information is higher, and the debugging safety better than that of the scheme that the internet of things equipment is not provided with the trust zone chip can be realized.
S3: and after the Internet of things equipment is powered on again, analyzing and debugging the debugging information in the FLASH through a debugging tool.
In S3, in one possible embodiment, when the internet of things device is provided with a trust zone chip, the control device to which the debug tool belongs has security access rights, so that the debug information in the FLASH can be resolved and debugged by the debug tool.
In a possible embodiment, when the internet of things device is not provided with the trust zone chip, the control device to which the debugging tool belongs has access rights.
In a specific embodiment, parsing and debugging the debug information in the FLASH by the debug tool includes: the internet of things device is connected through pythonScipt (a computer programming language script), encrypted debugging information is exported to the local device, and the encrypted debugging information is decrypted and restored into data which can be identified by GDB (a debugger) through a debugging private key. And loading the decrypted data to a GDB debugger through a GDBServer (a debugging tool), so as to realize the debugging of the abnormal operation of the Internet of things equipment.
In one possible embodiment, the debug tool is capable of invoking a debug private key.
When the internet of things equipment is provided with the trust zone chip, the python script needs to be decrypted by applying the private key in the process of connecting the internet of things equipment, if the private key is wrong, the debugging information cannot be normally decrypted, so that the security of the private debugging information of the internet of things equipment can be ensured.
The method for debugging the Internet of things equipment has less requirements on the debugging environment, and can conveniently acquire the debugging information for debugging. And the debugging information can be safe by encrypting the debugging information, so that the debugging safety is high. The method for debugging the Internet of things equipment can not only carry out offline debugging when the Internet of things equipment fails, but also realize online debugging through a debugging tool, and is convenient to apply.
Referring to fig. 4 of the specification, this embodiment further provides a device for safely debugging an internet of things device, where the device includes:
the configuration unit 401 is configured to configure an MTB module function of the internet of things device to be in an on state, and pre-allocate a first SRAM space, where the first SRAM space is used to store stack information of a non-secure world when a program of the internet of things device runs.
And the encryption storage unit 402 is used for calling the safe storage service in the abnormal interrupt processing function in the software system of the internet of things equipment when the operation of the internet of things equipment is abnormal, encrypting stack information in the first SRAM space, generating encrypted debugging information, and storing the debugging information into the FLASH.
The parsing and debugging unit 403 is configured to parse and debug the debug information in the FLASH through the debug tool after the internet of things device is powered on again.
All relevant contents of each step related to the above method embodiment may be cited to the functional descriptions of the corresponding functional modules, which are not described herein.
In other embodiments of the present application, embodiments of the present application disclose an electronic device, as shown in fig. 5, the electronic device 500 may include: one or more processors 501; a memory 502; a display 503; one or more applications (not shown); and one or more computer programs 504, which may be connected via one or more communication buses 505. Wherein the one or more computer programs 504 are stored in the memory 502 and configured to be executed by the one or more processors 501, the one or more computer programs 504 comprise instructions that may be used to perform the various steps as in fig. 1 and the corresponding embodiments.
From the foregoing description of the embodiments, it will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of functional modules is illustrated, and in practical application, the above-described functional allocation may be implemented by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to implement all or part of the functions described above. The specific working processes of the above-described systems, devices and units may refer to the corresponding processes in the foregoing method embodiments, which are not described herein.
The functional units in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the embodiments of the present application may be essentially or a part contributing to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: flash memory, removable hard disk, read-only memory, random access memory, magnetic or optical disk, and the like.
The foregoing is merely a specific implementation of the embodiments of the present application, but the protection scope of the embodiments of the present application is not limited thereto, and any changes or substitutions within the technical scope disclosed in the embodiments of the present application should be covered by the protection scope of the embodiments of the present application. Therefore, the protection scope of the embodiments of the present application shall be subject to the protection scope of the claims.

Claims (12)

1. The method for safely debugging the equipment of the Internet of things is characterized by comprising the following steps of:
configuring an MTB module function of the Internet of things equipment to be in an on state, and pre-distributing a first SRAM space, wherein the first SRAM space is used for storing stack information of a non-secure world when a program of the Internet of things equipment runs;
when the operation of the Internet of things equipment is abnormal, invoking a safe storage service in an abnormal interrupt processing function in the Internet of things equipment software system, encrypting stack information in the first SRAM space, generating encrypted debugging information, and storing the debugging information into FLASH;
and after the Internet of things equipment is powered on again, analyzing and debugging the debugging information in the FLASH through a debugging tool.
2. The method of claim 1, wherein encrypting stack information in the first SRAM space when the internet of things device is not provided with a trust zone chip comprises:
the stack information in the first SRAM space is encrypted with the debug public key.
3. The method of claim 1, wherein when the internet of things device is provided with a trust zone chip, a second SRAM space is also pre-allocated, the second SRAM space being used to store stack information of a secure world when a program of the internet of things device is run;
when the operation of the Internet of things equipment is abnormal, calling a safe storage service in an abnormal interrupt processing function in the software system of the Internet of things equipment, and copying stack information in the first SRAM space to the second SRAM space;
and encrypting the encryption key through the debugging public key to obtain a target encryption key, and encrypting the debugging information in the second SRAM space through the target encryption key.
4. A method according to any one of claims 1 to 3, wherein when the first SRAM space stores stack information of a non-secure world at program run time of the internet of things device, comprising:
judging whether the first SRAM space is filled up or not;
and if the first SRAM space is filled, discarding the data information which is stored earlier and is in the set time length in the first SRAM space, and storing stack information to be stored into the first SRAM space.
5. A method according to any one of claims 1 to 3, wherein when the internet of things device is provided with a trust zone chip, the control device to which the debugging tool belongs has secure access rights;
when the internet of things equipment is not provided with the trust zone chip, the control equipment to which the debugging tool belongs has access rights.
6. The utility model provides an thing networking equipment safety debugging device which characterized in that includes:
the configuration unit is used for configuring the MTB module function of the Internet of things equipment to be in an on state, and pre-distributing a first SRAM space, wherein the first SRAM space is used for storing stack information of the unsafe world when a program of the Internet of things equipment runs;
the encryption storage unit is used for calling a safe storage service in an abort processing function in the software system of the Internet of things equipment when the operation of the Internet of things equipment is abnormal, encrypting stack information in the first SRAM space, generating encrypted debugging information, and storing the debugging information into a FLASH;
and the analysis and debugging unit is used for analyzing and debugging the debugging information in the FLASH through a debugging tool after the Internet of things equipment is powered on again.
7. The apparatus of claim 6, wherein when the internet of things device is not provided with a trust zone chip, the encryption storage unit encrypts stack information in the first SRAM space, specifically for:
the stack information in the first SRAM space is encrypted with the debug public key.
8. The apparatus of claim 6, wherein when the internet of things device is provided with a trust zone chip, a second SRAM space is further pre-allocated, the second SRAM space being used to store stack information of a secure world when a program of the internet of things device is run;
when the operation of the Internet of things equipment is abnormal, calling a safe storage service in an abnormal interrupt processing function in the software system of the Internet of things equipment, and copying stack information in the first SRAM space to the second SRAM space;
and encrypting the encryption key through the debugging public key to obtain a target encryption key, and encrypting the debugging information in the second SRAM space through the target encryption key.
9. The apparatus of any of claims 6 to 8, wherein when the first SRAM space stores stack information of a non-secure world at program run time of the internet of things device, comprising:
judging whether the first SRAM space is filled up or not;
and if the first SRAM space is filled, discarding the data information which is stored earlier and is in the set time length in the first SRAM space, and storing stack information to be stored into the first SRAM space.
10. The apparatus according to any one of claims 6 to 8, wherein when the internet of things device is provided with a trust zone chip, the control device to which the debugging tool belongs has a secure access right;
when the internet of things equipment is not provided with the trust zone chip, the control equipment to which the debugging tool belongs has access rights.
11. A computer readable storage medium having stored thereon a computer program, characterized in that the computer program, when executed by a processor, implements the method of any of claims 1 to 5.
12. An electronic device, comprising: a processor and a memory;
the memory is used for storing a computer program;
the processor is configured to execute the computer program stored in the memory, to cause the electronic device to perform the method of any one of claims 1 to 5.
CN202310263498.XA 2023-03-10 2023-03-10 Internet of things equipment safety debugging method and device, medium and electronic equipment Pending CN116303017A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310263498.XA CN116303017A (en) 2023-03-10 2023-03-10 Internet of things equipment safety debugging method and device, medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310263498.XA CN116303017A (en) 2023-03-10 2023-03-10 Internet of things equipment safety debugging method and device, medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN116303017A true CN116303017A (en) 2023-06-23

Family

ID=86777606

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310263498.XA Pending CN116303017A (en) 2023-03-10 2023-03-10 Internet of things equipment safety debugging method and device, medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN116303017A (en)

Similar Documents

Publication Publication Date Title
KR102447251B1 (en) Unsealing data as a sealing enclave
US10148442B2 (en) End-to-end security for hardware running verified software
Carvalho et al. Heartbleed 101
US20170103192A1 (en) Secure code delivery
Buchacker et al. Framework for testing the fault-tolerance of systems including OS and network aspects
Panda et al. Verification in the age of microservices
US10671758B2 (en) Redacting core dumps by identifying modifiable parameters
WO2016033966A1 (en) Protection method and device for application data
CN111475782A (en) API (application program interface) key protection method and system based on SGX (secure gateway) software extension instruction
US20100023995A1 (en) Methods and Aparatus for Securing Access to Computer Libraries and Modules, The SecModule Framework
Tabrizi et al. Design-level and code-level security analysis of IoT devices
Hetzelt et al. Via: Analyzing device interfaces of protected virtual machines
DE102023202297A1 (en) MAINTAINING THE CONFIDENTIALITY OF CLIENTS IN A CLOUD ENVIRONMENT WHEN USING SECURITY SERVICES
Strackx et al. Salus: Kernel support for secure process compartments
Liu et al. Task parameters analysis in schedule-based timing side-channel attack
CN111367505A (en) JavaScript source code secrecy method, device, equipment and storage medium
CN116303017A (en) Internet of things equipment safety debugging method and device, medium and electronic equipment
US9841960B2 (en) Dynamic provision of debuggable program code
US10452408B1 (en) System and method for intercepting data flow between a computer process and a file
Taubmann Improving digital forensics and incident analysis in production environments by using virtual machine introspection
EP3244340A1 (en) Method for securely running an application
Gunupudi et al. Timing-accurate TPM simulation for what-if explorations in trusted computing
Noorman Sancus: A low-cost security architecture for distributed IoT applications on a shared infrastructure
CN117675267A (en) Log processing method and device
CN115357901A (en) System and method based on trusted hardware platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination