CN117472762A - Method, system and storage medium for detecting unexpected loading of embedded software - Google Patents
Method, system and storage medium for detecting unexpected loading of embedded software Download PDFInfo
- Publication number
- CN117472762A CN117472762A CN202311446092.1A CN202311446092A CN117472762A CN 117472762 A CN117472762 A CN 117472762A CN 202311446092 A CN202311446092 A CN 202311446092A CN 117472762 A CN117472762 A CN 117472762A
- Authority
- CN
- China
- Prior art keywords
- software
- error
- file
- proofing
- loading
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims description 19
- 238000005192 partition Methods 0.000 claims abstract description 27
- 238000001514 detection method Methods 0.000 claims abstract description 8
- 238000004590 computer program Methods 0.000 claims description 13
- 238000012795 verification Methods 0.000 claims description 10
- 238000010586 diagram Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 239000000779 smoke Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3688—Test management for test execution, e.g. scheduling of test suites
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3696—Methods or tools to render software testable
Abstract
The invention discloses a detection method, a system and a storage medium for unexpected loading of embedded software, which are realized by the cooperation of application software, boot Loader software and an upper computer, wherein the upper computer completes the generation of an error-proof file and a partition configuration file, the Boot Loader software loads the application software to a pre-planned storage space address, through the application, a user can set a partition of a software configuration item according to the requirement, a new error-proof mechanism can prevent the application software of a non-project from being loaded into a target machine of the project, and prevent the application software of different configuration items in the project from being loaded with errors.
Description
Technical Field
The present invention relates to embedded software loading technology, and in particular, to a method, system and storage medium for detecting unexpected loading of embedded software.
Background
Because the embedded system has the conditions that the serialized products are relatively close, the deployment operation is more, and the software naturally has variability, the risk that the software is loaded to a non-corresponding hardware target machine exists in the using process. The existing solutions generally adopt methods of reading software version numbers, smoke tests and the like to judge whether loading functions are normal or not. However, there are still problems that it is impossible to determine whether the multi-configuration item software is loaded to the compatibility of the corresponding hardware, and that it is impossible to quickly and effectively determine whether the multi-configuration item software is compatible with each other. In view of the above problems, the present application proposes a solution.
Disclosure of Invention
The invention aims to: the invention aims to provide a detection method, a system and a storage medium for unexpected loading of embedded software, which have the capability of rapidly and reliably detecting whether software is compatible with hardware, whether software is compatible with software and whether software is complete or not.
The technical scheme is as follows: the invention discloses a detection method for unexpected loading of embedded software, which comprises the following steps:
s1: planning error-proofing types of each embedded software configuration item in an upper computer, and generating error-proofing files of each configuration item;
s2: planning a storage area of each embedded software configuration item in an upper computer, and generating a partition configuration file of each configuration item;
s3: respectively loading the error-proofing file and the partition configuration file into a target machine by using Boot Loader software;
s4: adding file header information for partition verification and error-proofing verification in the engineering of the application software to generate the application software;
s5: when the application software is loaded or updated, the Boot Loader software reads file header information of the application software and compares the file header information with the error-proofing file and the partition configuration file which are cured in advance in the target machine, and when the information in any error-proofing file or partition configuration file is not matched, loading is forbidden, otherwise, the application software is downloaded to a corresponding area in the target machine.
Preferably, the error-proofing file in S1 stores an error-proofing policy designed by a user according to needs, including a system identifier, a stage identifier, a hardware type and configuration item information.
Preferably, the partition configuration file in S2 includes information such as a partition identifier, a start address, and a partition size.
Preferably, the application software in S4 includes application program and header information for distinguishing between verification and error-proofing verification.
Preferably, the application software in S4 can only be modified according to the pre-authorized matching relationship between the software and the hardware.
The beneficial effects are that: according to the method and the device, a user can set the partition of the software configuration item according to the requirement, a new loading error prevention mechanism can prevent non-project application software from being loaded into the project target machine, and prevent application software loading errors of different configuration items in the project.
Detailed Description
The present application is further illustrated below in conjunction with specific embodiments.
In this embodiment, the method specifically includes the following steps:
s1: planning the error-proofing type of each embedded software configuration item in the upper computer, generating an error-proofing file of each configuration item, and storing an error-proofing strategy designed by a user according to the need in the error-proofing file, wherein the error-proofing strategy comprises a system identifier, a stage identifier, a hardware type and configuration item information;
s2: planning a storage area of each embedded software configuration item in an upper computer, and generating a partition configuration file of each configuration item, wherein the partition configuration file comprises partition identification, a starting address and partition size information;
s3: respectively loading the error-proofing file and the partition configuration file into a target machine by using Boot Loader software;
s4: adding file header information for partition verification and error proofing verification in the engineering of the application software to generate the application software, wherein the application software comprises an application program and file header information for distinguishing the verification and error proofing verification, and the application software can only be modified according to a pre-authorized software-hardware matching relationship;
s5: when the application software is loaded or updated, the Boot Loader software reads file header information of the application software and compares the file header information with the error-proofing file and the partition configuration file which are cured in advance in the target machine, and when the information in any error-proofing file or partition configuration file is not matched, loading is forbidden, otherwise, the application software is downloaded to a corresponding area in the target machine.
The embodiment also provides a detection system for unexpected loading of embedded software, which comprises a network interface, a memory and a processor, wherein the network interface is used for receiving and transmitting signals in the process of receiving and transmitting information with other external network elements; a memory storing computer program instructions executable on the processor; and the processor is used for executing the steps of the detection method for unexpected loading of the embedded software when the computer program instructions are executed.
The present embodiment also provides a computer storage medium storing a computer program which, when executed by a processor, implements the method described above. The computer-readable medium may be considered tangible and non-transitory. Non-limiting examples of non-transitory tangible computer readable media include non-volatile memory circuits (e.g., flash memory circuits, erasable programmable read-only memory circuits, or masked read-only memory circuits), volatile memory circuits (e.g., static random access memory circuits or dynamic random access memory circuits), magnetic storage media (e.g., analog or digital magnetic tape or hard disk drives), and optical storage media (e.g., CDs, DVDs, or blu-ray discs), among others. The computer program includes processor-executable instructions stored on at least one non-transitory tangible computer-readable medium. The computer program may also include or be dependent on stored data. The computer programs may include a basic input/output system (BIOS) that interacts with the hardware of the special purpose computer, device drivers that interact with particular devices of the special purpose computer, one or more operating systems, user applications, background services, background applications, and so forth.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Claims (7)
1. The method for detecting unexpected loading of embedded software is characterized by comprising the following steps: the method specifically comprises the following steps:
s1: planning error-proofing types of each embedded software configuration item in an upper computer, and generating error-proofing files of each configuration item;
s2: planning a storage area of each embedded software configuration item in an upper computer, and generating a partition configuration file of each configuration item;
s3: respectively loading the error-proofing file and the partition configuration file into a target machine by using Boot Loader software;
s4: adding file header information for partition verification and error-proofing verification in the engineering of the application software to generate the application software;
s5: when the application software is loaded or updated, the Boot Loader software reads file header information of the application software and compares the file header information with the error-proofing file and the partition configuration file which are cured in advance in the target machine, and when the information in any error-proofing file or partition configuration file is not matched, loading is forbidden, otherwise, the application software is downloaded to a corresponding area in the target machine.
2. The method for detecting unexpected loading of embedded software according to claim 1, wherein: the error-proofing file in S1 stores error-proofing strategies designed by a user according to requirements, and the error-proofing strategies comprise system identification, stage identification, hardware type and configuration item information.
3. The method for detecting unexpected loading of embedded software according to claim 1, wherein: the partition configuration file in S2 includes information such as partition identification, start address, and partition size.
4. The method for detecting unexpected loading of embedded software according to claim 1, wherein: the application software in S4 includes an application program and header information for distinguishing between the checksum and the error-proof checksum.
5. The method for detecting unexpected loading of embedded software according to claim 1, wherein: the application software in the S4 can only be modified according to the pre-authorized matching relation of the software and the hardware.
6. A detection system for unexpected loading of embedded software, characterized by: the system includes a network interface, a memory, and a processor, wherein:
the network interface is used for receiving and transmitting signals in the process of receiving and transmitting information with other external network elements;
the memory is used for storing computer program instructions capable of running on the processor;
the processor, when executing the computer program instructions, is configured to perform the method for detecting unexpected loading of embedded software according to any one of claims 1-5.
7. A computer storage medium, characterized by: the computer storage medium stores a detection method for unexpected loading of embedded software, which when executed by at least one processor implements the detection method for unexpected loading of embedded software of any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311446092.1A CN117472762A (en) | 2023-11-02 | 2023-11-02 | Method, system and storage medium for detecting unexpected loading of embedded software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311446092.1A CN117472762A (en) | 2023-11-02 | 2023-11-02 | Method, system and storage medium for detecting unexpected loading of embedded software |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117472762A true CN117472762A (en) | 2024-01-30 |
Family
ID=89634429
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311446092.1A Pending CN117472762A (en) | 2023-11-02 | 2023-11-02 | Method, system and storage medium for detecting unexpected loading of embedded software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117472762A (en) |
-
2023
- 2023-11-02 CN CN202311446092.1A patent/CN117472762A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8875165B2 (en) | Computing device having a DLL injection function, and DLL injection method | |
RU2409838C2 (en) | Archiving data in virtual application enviroinment | |
KR102192880B1 (en) | Method and device to prevent software repackaging | |
US20100058314A1 (en) | Computer System and Related Method of Logging BIOS Update Operation | |
CN102298529B (en) | Providing silicon integrated code for a system | |
US20200380150A1 (en) | Method of encoding and decoding memory data for software security, recording medium and apparatus for performing the method | |
EP3652639A1 (en) | System and method for validating in-memory integrity of executable files to identify malicious activity | |
US8473936B2 (en) | System and method for runtime class extracting | |
CN110737892B (en) | Detection method aiming at APC injection and related device | |
CN111913742B (en) | Program processing method and related equipment | |
US20150347745A1 (en) | Method for extracting executable code of application using memory dump | |
CN111046377B (en) | Method and device for loading dynamic link library, electronic equipment and storage medium | |
CN107092517B (en) | SDK tool package generation method and device | |
CN106295402B (en) | DLL file hiding method and system | |
CN117472762A (en) | Method, system and storage medium for detecting unexpected loading of embedded software | |
CN116991622A (en) | Recovery method and system for starting failure of trusted DCS controller system | |
CN110298175B (en) | DLL file processing method and related device | |
CN108647516B (en) | Method and device for defending against illegal privilege escalation | |
US20110185353A1 (en) | Mitigating Problems Arising From Incompatible Software | |
CN116126470A (en) | Method, system and medium for managing script execution in container | |
US11113392B2 (en) | Executable binary code insertion | |
CN110764782B (en) | Software protection method and device | |
US11893113B2 (en) | Return-oriented programming protection | |
CN106022125A (en) | Client repair method and device | |
CN106897588B (en) | Processing method and device of label function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |