Verification method, device and system for virtual machine instruction
A virtual machine and instruction technology, applied in computer security devices, instruments, computing, etc., can solve problems such as inability to effectively prevent software piracy, inability to implement code block protection, etc., to solve integrity protection, improve protection accuracy, and improve security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] According to an embodiment of the present application, a system for verifying virtual machine instructions is provided, and the system is used to implement a verification process for virtual machine instructions. figure 1 It is a structural block diagram of a verification system of a virtual machine instruction according to Embodiment 1 of the present application, such as figure 1 As shown, the system includes: a virtual machine interpretation engine 10 and a virtual machine protection compiler 12; wherein,
[0036] About the virtual machine protection compiler (VMP Compiler) 12:
[0037] A virtual machine protection compiler 12 is used to compile the program to be tested into a bytecode file;
[0038]Optionally, the virtual machine protection compiler 12 is also configured to determine the second check value in the following manner, so as to compare with the check value generated in real time during program execution: in the source bytecode file of the above-mentioned...
Embodiment 2
[0075] According to the embodiment of the present application, an embodiment of a method for verifying virtual machine instructions is also provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions , and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0076] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, Figure 7 It is a block diagram of the hardware structure of a computer terminal according to a verification method of a virtual machine instruction according to an embodiment of the present application. Such as Figure 7 As shown, the computer terminal 70 may ...
Embodiment 3
[0096] According to the embodiment of the present application, there is also provided a device for implementing the verification method of virtual machine instructions. It should be noted that the device can run on the computer terminal shown in Embodiment 2, but is not limited to The computer terminal in Embodiment 2, for example, may have more or fewer structural features than the computer terminal in Embodiment 2. Figure 9 It is a schematic structural diagram of an optional verification device for virtual machine instructions according to an embodiment of the present application. Such as Figure 9 As shown, the device includes the following modules:
[0097]The obtaining module 90 is used to obtain the intermediate instructions in the current bytecode file of the program to be tested when the program to be tested is executed, wherein the intermediate instructions are instructions between specified types of instructions that appear in pairs, and the above paired The instr...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com