Pointer protection method applied to ARM processor and computer system
The invention provides a pointer protection method applied to an ARM processor, the ARM processor comprises a common memory and an isolation memory, a protected executable file is loaded on the ARM processor, and pointer information is configured in the protected executable file. The method comprise...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention provides a pointer protection method applied to an ARM processor, the ARM processor comprises a common memory and an isolation memory, a protected executable file is loaded on the ARM processor, and pointer information is configured in the protected executable file. The method comprises the steps that when the ARM processor executes a protected executable file, a pointer verification value is calculated based on pointer information configured in the protected executable file according to a preset encryption algorithm, the pointer verification value is stored in an isolation memory, and the pointer verification value indicates whether the pointer information is tampered or not when the protected executable file is executed; and when the ARM processor executes the protected executable file, storing pointer information configured in the protected executable file into a common memory. According to the method, the information of the pointer is stored in the common memory, and the pointer verification |
---|