Method of Kernel Transplantation and its Protection
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    The work of kernel transplantation has practical application value and the configuration more complex tasks. So this paper comes up with a new method of kernel updates on the basis of the kernel itself characteristics. Most of the existing kernel transplantation methods need to complete with the module init-tools, mkinitrd, lvm2 and device mapper and other tools, external tools are abandoned in this paper. It is to achieve the new kernel updates and its strategy is on the basis of the kernel protection characteristics. First of all, for kernel configuration, we analyze the necessary module configuration. Then it uses the command interface to the kernel of modularization compile and grub analysis. Again, in view of the robustness requirements for the kernel, the kernel is realized with the MD5 algorithm which can improve the mechanism of protection. Finally experimental research show that the kernel transplantation method is convenient and practical, and the improved protection mechanism of the kernel has important application value.

    Reference
    Related
    Cited by
Get Citation

王俊杰,段俊瑞,朱耀麟.内核移植及其保护方法.计算机系统应用,2015,24(3):161-165

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:June 22,2014
  • Revised:July 14,2014
  • Adopted:
  • Online: March 04,2015
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063