Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device used for restoring kernel vulnerability

A kernel and vulnerability technology, applied in the field of computer and information security, can solve problems such as costing large resources, and achieve the effect of overcoming fragmentation

Active Publication Date: 2017-04-26
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF1 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When there are many kernel versions to be patched, it takes a lot of resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device used for restoring kernel vulnerability
  • Method and device used for restoring kernel vulnerability
  • Method and device used for restoring kernel vulnerability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0026] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0027] figure 1 It shows an exemplary system architecture 100 to which embodiments of the method for repairing kernel vulnerabilities or the apparatus for repairing kernel vulnerabilities of the present application can be applied.

[0028] Such as figure 1 As shown, the sy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a method and device used for restoring kernel vulnerability. The concrete embodiment of the method comprises following steps: collecting attribute information of a to-be-repaired kernel, wherein the attribute information comprises feature information used for representing a loading mode of codes supported by the to-be-repaired kernel; obtaining vulnerability restoring codes matched with the feature information, wherein the vulnerability restoring codes are used for calling a fix application programming interface which is used for enabling the vulnerability restoring codes to be adapted to kernel functions of different kernels; loading the vulnerability restoring codes and relocating instructions included in the vulnerability restoring codes; replacing addresses relocated by the fix application programming interface in the vulnerability restoring codes with addresses of the kernel functions called by the vulnerability restoring codes; and executing the vulnerability restoring codes with the addresses replaced to restore kernel vulnerability. The embodiment helps enlarge the application range of the vulnerability restoring codes such that the method and device used for restoring kernel vulnerability can be used for kernels in different models.

Description

technical field [0001] The present application relates to the field of computer technology, specifically to the field of information security technology, and in particular to a method and device for repairing kernel vulnerabilities. Background technique [0002] The kernel is the core of the operating system, responsible for managing the system's processes, memory, device drivers, files and network systems, etc., and determines the performance and stability of the system. Since the method of replacing the kernel and restarting the system can not meet the high reliability requirements, there is a need for a vulnerability repair code technology that can immediately upgrade the function of the kernel to be repaired during the operation of the kernel. The existing kernel thermal vulnerability repair code technology repairs kernel functions in the form of memory vulnerability repair codes during kernel operation without replacing the entire kernel, which is conducive to improving...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/445
CPCG06F8/656G06F8/65G06F21/57G06F9/445G06F21/577
Inventor 夏良钊郑龙日卢永强包沉浮张煜龙韦韬
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products