期刊文献+

目标代码混淆技术综述 被引量:10

An Overview of Object-Code Obfuscation Technologies
下载PDF
导出
摘要 逆向工程领域的进步,一方面提升了软件分析能力,另一方面,给软件安全带来更大的挑战。目标代码混淆技术是对软件进行保护的一种有力手段,能够有效地阻挡对软件的恶意分析。文中从逆向分析的角度出发介绍了目标代码混淆技术的分类及几种典型的目标代码混淆技术的实现及混淆效果。 Advancement in reverse engineering field upgrades the ability to analyze software, and on the other hand, it brings more challenge to software security. As a powerful means to protect software,object- code obfuscation can obstruct malicious software analysis effectively. From the point of reverse analysis, this article introduces classification of object- code obfuscation and some typical technologies of object - code obfuscation.
作者 李勇 左志宏
出处 《计算机技术与发展》 2007年第4期125-127,157,共4页 Computer Technology and Development
关键词 目标代码混淆 逆向工程 反汇编 object - code obfuscation reverse engineering disassembly
  • 相关文献

参考文献11

  • 1Collberg C,Thomborson C.Watermarking,tamper-proofing,and obfuscation-tools for software protection[J].IEEE Trans Software Eng,2002,28:735 -746.
  • 2Hada S.Zero Knowledge and Code Obfuscation[C]//ASIAC RYPT' 2000-Advances In Cryptology.Kyoto,Japan:International Association for Cryptologic Research,2000:443-457.
  • 3Wang C,Hill J,Knight J,et al.Software tamper resistance:Obstructing static analysis of programs[R].Technical Report CS-2000-12.Virginia:Department of Computer Science,University of Virginia,2000.
  • 4Low D.Java Control Flow Obfuscation[D].Auckland:Department of Computer Science,University of Auckland,1998.
  • 5Linn C,Debray S.Obfuscation of Executable Code to Improve Resistance to Static Disassembly[C]//In 10th ACM Conference on Computer and Communications Security(CCS).Washington DC:[s.n.],2003:290-299.
  • 6段钢.软件加密技术内幕[M].北京:电子工业出版社,2004,8
  • 7Schwarz B,Debray S K,Andrew G R.Disassembly of Executable Code Revisited[C]//In Proc.IEEE 2002 Working Conference on Reverse Engineering(WCRE).[s.l.]:IEEE Computer Society,2002:45-54.
  • 8Theiling H.Extracting safe and precise control flow from binaries[C]//In Proc.7th Conference on Real-Time Computing Systems and Applications (RTCSA).Cheju Island,South Korea:[s.n.],2000:23-30.
  • 9Szor P.The Art of Computer Virus Research and Defense[M].Boston,USA:Addison-Wesley Professional,2005.
  • 10Wroblewski G R.General Method of Program Code Obfuscation[C]// Proceedings of the International Conference on Software Engineering Research and Practice (SERP).Las Vegas,USA:[s.n.],2002:56-75.

共引文献4

同被引文献44

引证文献10

二级引证文献149

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部