Checking method, checking system and checking device for processor security
First Claim
1. A method for checking a processor security, comprising:
- acquiring a recording information of a data read and write operation between a processor and a peripheral, wherein the data read and write operation is a data read and write operation initiated by the processor or and a data read and write operation initiated by the peripheral;
acquiring a log information of the data read and write operation initiated by the peripheral, when the data read and write operation is a data read and write operation initiated by the peripheral, so that a checking device analyzes the data read and write operation initiated by the peripheral according to the log information, wherein the log information comprises an instruction position and the data read and write operation initiated by the peripheral, and the instruction position is an instruction position at which the processor suspends execution of an instruction and processes the data read and write operation initiated by the peripheral; and
determining whether the processor is secure according to the recording information of the data read and write operation and an analysis result on the data read and write operation by the checking device.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure discloses a processor security checking method, system and checking device. The processor security checking method includes: acquiring recording information of data read and write operations between a processor and a peripheral device, where the data read and write operation is a data read and write operation initiated by the processor or a data read and write operation initiated by the peripheral; and determining whether the processor is secure according to the recording information of the data read and write operation and an analysis result on the data read and write operation by the checking device. The embodiments of the present disclosure may detect hardware vulnerabilities and improve the security of hardware usage.
-
Citations
16 Claims
-
1. A method for checking a processor security, comprising:
-
acquiring a recording information of a data read and write operation between a processor and a peripheral, wherein the data read and write operation is a data read and write operation initiated by the processor or and a data read and write operation initiated by the peripheral; acquiring a log information of the data read and write operation initiated by the peripheral, when the data read and write operation is a data read and write operation initiated by the peripheral, so that a checking device analyzes the data read and write operation initiated by the peripheral according to the log information, wherein the log information comprises an instruction position and the data read and write operation initiated by the peripheral, and the instruction position is an instruction position at which the processor suspends execution of an instruction and processes the data read and write operation initiated by the peripheral; and determining whether the processor is secure according to the recording information of the data read and write operation and an analysis result on the data read and write operation by the checking device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 15)
-
-
8. A checking device for a processor security, comprising a microprocessor configured to:
-
acquire a recording information of a data read and write operation between a processor and a peripheral, wherein the data read and write operation is a data read and write operation initiated by the processor and a data read and write operation initiated by the peripheral; acquire a log information of a data read and write operation initiated by the peripheral, when the data read and write operation is a data read and write operation initiated by the peripheral, so that the checking device analyzes the data read and write operation initiated by the peripheral according to the log information, wherein the log information comprises an instruction position and the data read and write operation initiated by the peripheral, and the instruction position is an instruction position at which the processor suspends execution of an instruction and processes the data read and write operation initiated by the peripheral; and determine whether the processor is secure according to the recording information of the data read and write operation and an analysis result on the data read and write operation by the checking device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
16. A non-transitory computer-readable storage medium having stored thereon a computer program comprising instructions which, when being executed on a processor, causes the processor to:
-
acquire a recording information of a data read and write operation between a processor and a peripheral, wherein the data read and write operation is a data read and write operation initiated by the processor or and a data read and write operation initiated by the peripheral; acquire a log information of the data read and write operation initiated by the peripheral, when the data read and write operation is a data read and write operation initiated by the peripheral, so that a checking device analyzes the data read and write operation initiated by the peripheral according to the log information, wherein the log information comprises an instruction position and the data read and write operation initiated by the peripheral, and the instruction position is an instruction position at which the processor suspends execution of an instruction and processes the data read and write operation initiated by the peripheral; and determine whether the processor is secure according to the recording information of the data read and write operation and an analysis result on the data read and write operation by the checking device.
-
Specification