CN117472762A - Method, system and storage medium for detecting unexpected loading of embedded software - Google Patents

Method, system and storage medium for detecting unexpected loading of embedded software Download PDF

Info

Publication number
CN117472762A
CN117472762A CN202311446092.1A CN202311446092A CN117472762A CN 117472762 A CN117472762 A CN 117472762A CN 202311446092 A CN202311446092 A CN 202311446092A CN 117472762 A CN117472762 A CN 117472762A
Authority
CN
China
Prior art keywords
software
error
file
proofing
loading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311446092.1A
Other languages
Chinese (zh)
Inventor
杨云强
胡森
杨娟
曹云飞
殷骏
胡豪东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AECC Aero Engine Control System Institute
Original Assignee
AECC Aero Engine Control System Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AECC Aero Engine Control System Institute filed Critical AECC Aero Engine Control System Institute
Priority to CN202311446092.1A priority Critical patent/CN117472762A/en
Publication of CN117472762A publication Critical patent/CN117472762A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3696Methods or tools to render software testable

Abstract

The invention discloses a detection method, a system and a storage medium for unexpected loading of embedded software, which are realized by the cooperation of application software, boot Loader software and an upper computer, wherein the upper computer completes the generation of an error-proof file and a partition configuration file, the Boot Loader software loads the application software to a pre-planned storage space address, through the application, a user can set a partition of a software configuration item according to the requirement, a new error-proof mechanism can prevent the application software of a non-project from being loaded into a target machine of the project, and prevent the application software of different configuration items in the project from being loaded with errors.

Description

Method, system and storage medium for detecting unexpected loading of embedded software
Technical Field
The present invention relates to embedded software loading technology, and in particular, to a method, system and storage medium for detecting unexpected loading of embedded software.
Background
Because the embedded system has the conditions that the serialized products are relatively close, the deployment operation is more, and the software naturally has variability, the risk that the software is loaded to a non-corresponding hardware target machine exists in the using process. The existing solutions generally adopt methods of reading software version numbers, smoke tests and the like to judge whether loading functions are normal or not. However, there are still problems that it is impossible to determine whether the multi-configuration item software is loaded to the compatibility of the corresponding hardware, and that it is impossible to quickly and effectively determine whether the multi-configuration item software is compatible with each other. In view of the above problems, the present application proposes a solution.
Disclosure of Invention
The invention aims to: the invention aims to provide a detection method, a system and a storage medium for unexpected loading of embedded software, which have the capability of rapidly and reliably detecting whether software is compatible with hardware, whether software is compatible with software and whether software is complete or not.
The technical scheme is as follows: the invention discloses a detection method for unexpected loading of embedded software, which comprises the following steps:
s1: planning error-proofing types of each embedded software configuration item in an upper computer, and generating error-proofing files of each configuration item;
s2: planning a storage area of each embedded software configuration item in an upper computer, and generating a partition configuration file of each configuration item;
s3: respectively loading the error-proofing file and the partition configuration file into a target machine by using Boot Loader software;
s4: adding file header information for partition verification and error-proofing verification in the engineering of the application software to generate the application software;
s5: when the application software is loaded or updated, the Boot Loader software reads file header information of the application software and compares the file header information with the error-proofing file and the partition configuration file which are cured in advance in the target machine, and when the information in any error-proofing file or partition configuration file is not matched, loading is forbidden, otherwise, the application software is downloaded to a corresponding area in the target machine.
Preferably, the error-proofing file in S1 stores an error-proofing policy designed by a user according to needs, including a system identifier, a stage identifier, a hardware type and configuration item information.
Preferably, the partition configuration file in S2 includes information such as a partition identifier, a start address, and a partition size.
Preferably, the application software in S4 includes application program and header information for distinguishing between verification and error-proofing verification.
Preferably, the application software in S4 can only be modified according to the pre-authorized matching relationship between the software and the hardware.
The beneficial effects are that: according to the method and the device, a user can set the partition of the software configuration item according to the requirement, a new loading error prevention mechanism can prevent non-project application software from being loaded into the project target machine, and prevent application software loading errors of different configuration items in the project.
Detailed Description
The present application is further illustrated below in conjunction with specific embodiments.
In this embodiment, the method specifically includes the following steps:
s1: planning the error-proofing type of each embedded software configuration item in the upper computer, generating an error-proofing file of each configuration item, and storing an error-proofing strategy designed by a user according to the need in the error-proofing file, wherein the error-proofing strategy comprises a system identifier, a stage identifier, a hardware type and configuration item information;
s2: planning a storage area of each embedded software configuration item in an upper computer, and generating a partition configuration file of each configuration item, wherein the partition configuration file comprises partition identification, a starting address and partition size information;
s3: respectively loading the error-proofing file and the partition configuration file into a target machine by using Boot Loader software;
s4: adding file header information for partition verification and error proofing verification in the engineering of the application software to generate the application software, wherein the application software comprises an application program and file header information for distinguishing the verification and error proofing verification, and the application software can only be modified according to a pre-authorized software-hardware matching relationship;
s5: when the application software is loaded or updated, the Boot Loader software reads file header information of the application software and compares the file header information with the error-proofing file and the partition configuration file which are cured in advance in the target machine, and when the information in any error-proofing file or partition configuration file is not matched, loading is forbidden, otherwise, the application software is downloaded to a corresponding area in the target machine.
The embodiment also provides a detection system for unexpected loading of embedded software, which comprises a network interface, a memory and a processor, wherein the network interface is used for receiving and transmitting signals in the process of receiving and transmitting information with other external network elements; a memory storing computer program instructions executable on the processor; and the processor is used for executing the steps of the detection method for unexpected loading of the embedded software when the computer program instructions are executed.
The present embodiment also provides a computer storage medium storing a computer program which, when executed by a processor, implements the method described above. The computer-readable medium may be considered tangible and non-transitory. Non-limiting examples of non-transitory tangible computer readable media include non-volatile memory circuits (e.g., flash memory circuits, erasable programmable read-only memory circuits, or masked read-only memory circuits), volatile memory circuits (e.g., static random access memory circuits or dynamic random access memory circuits), magnetic storage media (e.g., analog or digital magnetic tape or hard disk drives), and optical storage media (e.g., CDs, DVDs, or blu-ray discs), among others. The computer program includes processor-executable instructions stored on at least one non-transitory tangible computer-readable medium. The computer program may also include or be dependent on stored data. The computer programs may include a basic input/output system (BIOS) that interacts with the hardware of the special purpose computer, device drivers that interact with particular devices of the special purpose computer, one or more operating systems, user applications, background services, background applications, and so forth.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

Claims (7)

1. The method for detecting unexpected loading of embedded software is characterized by comprising the following steps: the method specifically comprises the following steps:
s1: planning error-proofing types of each embedded software configuration item in an upper computer, and generating error-proofing files of each configuration item;
s2: planning a storage area of each embedded software configuration item in an upper computer, and generating a partition configuration file of each configuration item;
s3: respectively loading the error-proofing file and the partition configuration file into a target machine by using Boot Loader software;
s4: adding file header information for partition verification and error-proofing verification in the engineering of the application software to generate the application software;
s5: when the application software is loaded or updated, the Boot Loader software reads file header information of the application software and compares the file header information with the error-proofing file and the partition configuration file which are cured in advance in the target machine, and when the information in any error-proofing file or partition configuration file is not matched, loading is forbidden, otherwise, the application software is downloaded to a corresponding area in the target machine.
2. The method for detecting unexpected loading of embedded software according to claim 1, wherein: the error-proofing file in S1 stores error-proofing strategies designed by a user according to requirements, and the error-proofing strategies comprise system identification, stage identification, hardware type and configuration item information.
3. The method for detecting unexpected loading of embedded software according to claim 1, wherein: the partition configuration file in S2 includes information such as partition identification, start address, and partition size.
4. The method for detecting unexpected loading of embedded software according to claim 1, wherein: the application software in S4 includes an application program and header information for distinguishing between the checksum and the error-proof checksum.
5. The method for detecting unexpected loading of embedded software according to claim 1, wherein: the application software in the S4 can only be modified according to the pre-authorized matching relation of the software and the hardware.
6. A detection system for unexpected loading of embedded software, characterized by: the system includes a network interface, a memory, and a processor, wherein:
the network interface is used for receiving and transmitting signals in the process of receiving and transmitting information with other external network elements;
the memory is used for storing computer program instructions capable of running on the processor;
the processor, when executing the computer program instructions, is configured to perform the method for detecting unexpected loading of embedded software according to any one of claims 1-5.
7. A computer storage medium, characterized by: the computer storage medium stores a detection method for unexpected loading of embedded software, which when executed by at least one processor implements the detection method for unexpected loading of embedded software of any one of claims 1-5.
CN202311446092.1A 2023-11-02 2023-11-02 Method, system and storage medium for detecting unexpected loading of embedded software Pending CN117472762A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311446092.1A CN117472762A (en) 2023-11-02 2023-11-02 Method, system and storage medium for detecting unexpected loading of embedded software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311446092.1A CN117472762A (en) 2023-11-02 2023-11-02 Method, system and storage medium for detecting unexpected loading of embedded software

Publications (1)

Publication Number Publication Date
CN117472762A true CN117472762A (en) 2024-01-30

Family

ID=89634429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311446092.1A Pending CN117472762A (en) 2023-11-02 2023-11-02 Method, system and storage medium for detecting unexpected loading of embedded software

Country Status (1)

Country Link
CN (1) CN117472762A (en)

Similar Documents

Publication Publication Date Title
US8875165B2 (en) Computing device having a DLL injection function, and DLL injection method
RU2409838C2 (en) Archiving data in virtual application enviroinment
KR102192880B1 (en) Method and device to prevent software repackaging
US20100058314A1 (en) Computer System and Related Method of Logging BIOS Update Operation
CN102298529B (en) Providing silicon integrated code for a system
US20200380150A1 (en) Method of encoding and decoding memory data for software security, recording medium and apparatus for performing the method
EP3652639A1 (en) System and method for validating in-memory integrity of executable files to identify malicious activity
US8473936B2 (en) System and method for runtime class extracting
CN110737892B (en) Detection method aiming at APC injection and related device
CN111913742B (en) Program processing method and related equipment
US20150347745A1 (en) Method for extracting executable code of application using memory dump
CN111046377B (en) Method and device for loading dynamic link library, electronic equipment and storage medium
CN107092517B (en) SDK tool package generation method and device
CN106295402B (en) DLL file hiding method and system
CN117472762A (en) Method, system and storage medium for detecting unexpected loading of embedded software
CN116991622A (en) Recovery method and system for starting failure of trusted DCS controller system
CN110298175B (en) DLL file processing method and related device
CN108647516B (en) Method and device for defending against illegal privilege escalation
US20110185353A1 (en) Mitigating Problems Arising From Incompatible Software
CN116126470A (en) Method, system and medium for managing script execution in container
US11113392B2 (en) Executable binary code insertion
CN110764782B (en) Software protection method and device
US11893113B2 (en) Return-oriented programming protection
CN106022125A (en) Client repair method and device
CN106897588B (en) Processing method and device of label function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination