Method and device for detecting Java agent without file injection into memory horse

The invention discloses a method and device for detecting a Java agent without file injection into a memory horse, and the method comprises the steps: analyzing a/proc/self/maps file in a JAVA system, and obtaining a loading range of libjvm.so; performing real-time detection on a/proc/sef/mem file i...

Full description

Saved in:
Bibliographic Details
Main Authors ZHANG XIAORUI, BAO CHUNJIE, JIANG XIANGQIAN
Format Patent
LanguageChinese
English
Published 03.02.2023
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The invention discloses a method and device for detecting a Java agent without file injection into a memory horse, and the method comprises the steps: analyzing a/proc/self/maps file in a JAVA system, and obtaining a loading range of libjvm.so; performing real-time detection on a/proc/sef/mem file in the JAVA system; judging whether the write-in range of the read-write operation of the/proc/self/mem file in the memory is the loading range of libjvm.so or not; if yes, the read-write operation is judged to be malicious memory operation, and interception is carried out; and if not, judging that the read-write operation is normal memory operation. Malicious shellcode writing is detected by monitoring/proc/self/mem memory operation of a Java web container program, malicious memory injection is found in time and intercepted, and safety and stability are improved. 本发明公开了一种Java agent无文件注入内存马的检测方法及装置,包括:解析JAVA系统中的/proc/self/maps文件,得到libjvm.so的加载范围;对JAVA系统中的/proc/self/mem文件进行实时检测;判断/proc/self/mem文件在内存中读写操作的写入范围是否为libjv
AbstractList The invention discloses a method and device for detecting a Java agent without file injection into a memory horse, and the method comprises the steps: analyzing a/proc/self/maps file in a JAVA system, and obtaining a loading range of libjvm.so; performing real-time detection on a/proc/sef/mem file in the JAVA system; judging whether the write-in range of the read-write operation of the/proc/self/mem file in the memory is the loading range of libjvm.so or not; if yes, the read-write operation is judged to be malicious memory operation, and interception is carried out; and if not, judging that the read-write operation is normal memory operation. Malicious shellcode writing is detected by monitoring/proc/self/mem memory operation of a Java web container program, malicious memory injection is found in time and intercepted, and safety and stability are improved. 本发明公开了一种Java agent无文件注入内存马的检测方法及装置,包括:解析JAVA系统中的/proc/self/maps文件,得到libjvm.so的加载范围;对JAVA系统中的/proc/self/mem文件进行实时检测;判断/proc/self/mem文件在内存中读写操作的写入范围是否为libjv
Author BAO CHUNJIE
ZHANG XIAORUI
JIANG XIANGQIAN
Author_xml – fullname: ZHANG XIAORUI
– fullname: BAO CHUNJIE
– fullname: JIANG XIANGQIAN
BookMark eNqNys0KgkAUhuFZ1KIf7-F0AUESiduQIoLa1F4G_dQJPUeck9HdN0EX0Op9F8_cTFgYM3O7QBspyXJJJUZXgCoZwioKdVzT2Y6WbA1WerlAn0qVa0GOH18hHE6FOnQyvKmRwWNpppVtPaJfF2Z1PNyz0xq95PC9LcDQPLvG8S5J03iT7Lf_mA9fOzn-
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
Physics
DocumentTitleAlternate 一种Java agent无文件注入内存马的检测方法及装置
ExternalDocumentID CN115688106A
GroupedDBID EVB
ID FETCH-epo_espacenet_CN115688106A3
IEDL.DBID EVB
IngestDate Fri Jul 19 14:39:12 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language Chinese
English
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_CN115688106A3
Notes Application Number: CN202211436170
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230203&DB=EPODOC&CC=CN&NR=115688106A
ParticipantIDs epo_espacenet_CN115688106A
PublicationCentury 2000
PublicationDate 20230203
PublicationDateYYYYMMDD 2023-02-03
PublicationDate_xml – month: 02
  year: 2023
  text: 20230203
  day: 03
PublicationDecade 2020
PublicationYear 2023
RelatedCompanies ANXINSEC (BEIJING) TECHNOLOGY CO., LTD
RelatedCompanies_xml – name: ANXINSEC (BEIJING) TECHNOLOGY CO., LTD
Score 3.5803552
Snippet The invention discloses a method and device for detecting a Java agent without file injection into a memory horse, and the method comprises the steps:...
SourceID epo
SourceType Open Access Repository
SubjectTerms CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
Title Method and device for detecting Java agent without file injection into memory horse
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230203&DB=EPODOC&locale=&CC=CN&NR=115688106A
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwED_m_HzTqej8IIL0rThtumYPRVy6MQbrhk7Z22jShm1gO9ZO0b_eS9jUF30LCYTk4Hcfye_uAK5jjBnUraB2Q1BlU-XV7EZMha3cxK0z11PUdGvohfXOM-2O3FEJZutcGFMn9N0UR0REScR7YfT1_OcRKzDcyvxGTHEqu28P_cBaRcfoT9_VHCto-q1BP-hzi3Ofh1b46KPjU2cM45-HDdhEN9rTaGi9NHVWyvy3SWnvw9YAd0uLAyh9Tiqwy9ed1yqw01t9eFdg2zA0ZY6TKxTmh_DUM22fSZTGJE401Am6njjUHwJoikg3eotIpJOmiH5nzZYF0fWXyDSdGeZViqMiI6-aZftBJtkiT47gqt0a8o6N5xx_C2XMw58rOcdQTrM0OQFCdfwimRcrEVEmJUNdnHgyUjUqHSbEKVT_3qf63-IZ7GkBG8aycw7lYrFMLtAgF-LSSPIL8CiQvA
link.rule.ids 230,309,783,888,25576,76876
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bT8IwFD5BvOCbokbxVhOzt0V0HSsPi5EOgsgGUTS8kXWXAIkbYUOjv97TBtQXfWvapGlP8p1L-51zAC5DjBnia0H1uqCxTmOrqtdDKvTYjMwaM62Yqm4NrldrP9PO0BwWYLrKhVF1Qt9VcUREVIB4z5W-nv08YjmKW5ldiQlOpbetge1oy-gY_embqqE5DbvZ7zk9rnFuc0_zHm10fGqMYfxztwbr6GJbEg3Nl4bMSpn9NimtHdjo425JvguFz3EZSnzVea0MW-7yw7sMm4qhGWQ4uURhtgdPrmr7TPwkJGEkoU7Q9cSh_BBAU0Q6_ptPfJk0ReQ7a7rIiay_RCbJVDGvEhzlKXmVLNsPMk7nWbQPF63mgLd1POfoWygj7v1cyTiAYpIm0SEQKuOXgFlhLHzKgoChLo6swI-rNDCYEEdQ-Xufyn-L51BqD9zuqHvvPRzDthS2Yi8bJ1DM54voFI1zLs6UVL8A5rmTrw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Method+and+device+for+detecting+Java+agent+without+file+injection+into+memory+horse&rft.inventor=ZHANG+XIAORUI&rft.inventor=BAO+CHUNJIE&rft.inventor=JIANG+XIANGQIAN&rft.date=2023-02-03&rft.externalDBID=A&rft.externalDocID=CN115688106A