摘要 |
<P>PROBLEM TO BE SOLVED: To obtain a computer system which realizes functions to prevent a malicious third party from tampering with a dynamic shared library on a versatile OS. <P>SOLUTION: A key generation program 32 calculates a KEY 311 by a hash calculation from a CRC of a dynamic shared library 13 and a secret key 312, and embeds the KEY 311 in the dynamic shared library 13 to create a dynamic shared library 33. An application 31 using the dynamic shared library 33 detects tampering with files of the dynamic shared library 33 with a tampering detection function 301 for file bodies by using the secret key 312, and also detects tampering with an image of the dynamic shared library 33 with a tampering detection function 302 for an image in a memory space by comparing an image of the dynamic shared library 33 loaded in a memory space with an image of the dynamic shared library 13 in the memory space. <P>COPYRIGHT: (C)2012,JPO&INPIT |