Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for Anti-debugging

An anti-debugging and sub-process technology, applied in the field of anti-debugging, can solve the problems of not providing the same or similar API and being unusable

Inactive Publication Date: 2016-07-20
INKA ENTWORKS INC
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since Linux, Unix and OSX, etc. do not provide the same or similar API, the above method cannot be used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for Anti-debugging
  • Method for Anti-debugging
  • Method for Anti-debugging

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. The technical scope of the present invention is applicable to various systems and is not limited to specific operating systems or hardware.

[0025] figure 1 is a block diagram illustrating the configuration of a computer for providing anti-debugging.

[0026] figure 1 An example of a computer for providing anti-debugging to mutually monitor process states of whether a parent process and a child process are debugged is illustrated. When a program stored in the auxiliary memory 130 is executed, the program is loaded into the main memory 120 and processed by a central processing unit (CPU) 110 , and the processing result is displayed on the display unit 140 . When the program is executed, a child process having the same form as that of the program is created (forked), and the program itself becomes the parent process of the child process. The parent ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to an anti-debugging method employed by an anti-debugging device. The anti-debugging method includes: a child process generation step; a parent process monitoring step in which a parent process is monitored by a child process; and a child process monitoring step in which the parent process monitors the child process.

Description

technical field [0001] The invention relates to an anti-debugging method for monitoring process state. Background technique [0002] The following merely provides background information related to the present invention and does not constitute prior art. [0003] Hacking begins by analyzing programs. Only when the logic is understood through program analysis can the program be substantially cracked (cracked). There are two methods of analyzing programs. One is static analysis and the other is dynamic analysis. [0004] Static analysis analyzes only the file itself without running the program file. Static analysis analyzes binary program files by using disassembly tools or decompilation tools. The tools described above convert binary program files into assembly or other high-level language forms. The logic of the program can be understood by analyzing converted assembly language, etc. [0005] Unlike the static analysis method, the dynamic analysis method runs a program...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/14G06F11/30G06F9/44
CPCG06F11/362G06F21/14G06F21/125G06F21/1064G06F21/16G06F21/12G06F11/30G06F8/00G06F11/366
Inventor 南在玟朴正根洪晙豪吴埈硕金正洙
Owner INKA ENTWORKS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products