期刊文献+

一种基于虚拟机Handler动态加解密的软件保护方法及实现 被引量:5

A SOFTWARE PROTECTION METHOD BASED ON DYNAMIC ENCRYPTION AND DECRYPTION OF VIRTUAL MACHINE HANDLERS AND ITS IMPLEMENTATION
下载PDF
导出
摘要 考虑到Handler序列为逆向分析者的重点攻击对象。针对Handler指令序列的内存转储分析以及起始和终止点的断点分析,提出一种基于虚拟机Handler动态加解密的软件保护方法,在基于虚拟机的软件保护方法上,增加加密和解密代码模块,并将所有Handler进行加密保存。当程序执行到某个Handler时,先将加密过的Handler进行解密并执行,执行完成后再次对其进行加密,直到所有Handler序列执行结束。实验和分析表明:该方法能够有效防止攻击者对于Handler的起始和终止位置进行断点调试分析和内存转储分析。 Virtual instruction handlers are the core targets for reverse analyzers to be attacked. Aiming at memory dump and breakpoint analysis for handler sequences, a software protection method based dynamic encryption and decryption of virtual machine handlers is proposed. On the basis of framework of virtual machine protection, code modules of encryption and decryption are embedded into the framework, and all encrypted handlers are restored. When a Handler is executed, the encrypted Handler is decrypted and executed. After execution, it is encrypted again until all Handler sequences are finished. Experiments and analysis showed that the method effectively prevented attackers from memory dumping and breakpoint debugging.
机构地区 湖南信息学院
出处 《计算机应用与软件》 2017年第12期321-325,333,共6页 Computer Applications and Software
关键词 逆向分析 虚拟机保护 动态加密和解密 内存转储 断点调试 Reverse analysis Virtual machine protection Dynamic encryption and decryption Memory dump Breakpoint debug
  • 相关文献

参考文献9

二级参考文献138

  • 1芦斌,罗向阳,刘粉林.一种基于混沌的软件水印算法框架及实现[J].软件学报,2007,18(2):351-360. 被引量:15
  • 2郭林,严芬,黄皓.基于多维角度的攻击分类方法[J].计算机应用研究,2007,24(4):139-143. 被引量:3
  • 3李莉.软件水印攻击综述[C]//第十五届信息论学术年会.青岛:中国电子学会,2008:525-530.
  • 4Ghodke N, Figueiredo R. On the implications of machine virtualization for DRM and fair use: a case study of a virtual audio device driver[C]. Proceedings of DRM'04, ACM, 2004.
  • 5Collberg C, Thomborson C, Low D. A taxonomy of obfuscating transformations[R]. Technical Report 148, Department of Computer Science, University of Auckland, 1997.
  • 6Michael N G, Stephen T, Anup K G. Software protection through anti-debugging[ J]. IEEE Security and Privacy, 2007,5:82-84.
  • 7Collberg C, Sahoo T. Software watermarking in the frequency domain: implementation, analysis, and attacks[J]. Journal of Computer Security, 2005, 13(5) : 721-755.
  • 8Jozwiak I J, Liber A, Marczak K. A hardware-based software protection systems - analysis of security dongles[ C]. Proceedings of the 12th IEEE International Conference on Methods and Models in Automation and Robotics, 2006, 3-15.
  • 9Blunden B. Virtual machine design and implementation in C/C + + EM]. Wordwarc Publ. Plane, Texas, USA.
  • 10Mondcn A, Monsifrot A, Thomborson C. A framework for obfuscated interpretation[ C]. Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, 2004.

共引文献40

同被引文献32

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部