Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

CPU vulnerability detection device and method based on virtual machine

A vulnerability detection, virtual machine technology, applied in the computer field

Pending Publication Date: 2020-07-24
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the inventor found in the process of implementing the present invention that the above-mentioned methods in the prior art have at least the following defects: the interception operation of malicious behavior can only be realized from the interface level provided by the operating system, once the malicious program bypasses the operation The interface provided by the system directly enters the operating system, which will lead to serious consequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CPU vulnerability detection device and method based on virtual machine
  • CPU vulnerability detection device and method based on virtual machine
  • CPU vulnerability detection device and method based on virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0024] figure 1 A schematic structural diagram of a CPU vulnerability detection device implemented based on a virtual machine according to an embodiment of the present invention is shown. Such as figure 1 As shown, the device includes: a process monitoring module 11 and a driving module 12; wherein, the process monitoring module 11 is adapted to send the process information of the unknown process to the cloud server when an unknow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a CPU vulnerability detection device and method based on a virtual machine. The CPU vulnerability detection device comprises a process monitoring module and a driving module. The process monitoring module is suitable for sending process information of an unknown process to the cloud server when monitoring the unknown process, and providing the process information of the unknown process to the driving module when determining that the unknown process is a process of a preset level according to a query result returned by the cloud server; the drive module is suitable forsending the process information of the unknown process provided by the process monitoring module to a preset host device, is used for monitoring whether an unknown process executes an instruction related to the CPU vulnerability or not by the host device and providing a monitoring result returned by the host device to the process monitoring module, so that the process monitoring module processes according to the monitoring result returned by the host device. By means of the method, instruction level monitoring can be achieved, then all instructions related to CPU vulnerabilities can be monitored, and a more comprehensive defense effect is achieved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a CPU vulnerability detection device and method based on a virtual machine. Background technique [0002] The central processing unit (CPU) vulnerability is undoubtedly a high-risk vulnerability. Once a malicious program exploits the CPU vulnerability to launch an attack, it will have an immeasurable negative impact on the user's personal device, and even cause major problems such as equipment paralysis. [0003] In the prior art, it is only possible to judge whether there is an attack on the CPU vulnerability by monitoring the interface provided by the operating system. For example, when a malicious program attempts to launch an attack on a CPU vulnerability by calling an interface provided by the operating system, the malicious behavior can be monitored and intercepted by setting a hook or other monitoring method at the interface provided by the operating system. [0004] Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 潘剑锋秦光远廖川剑
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products