期刊文献+

混淆技术研究初探 被引量:3

Research on Obfuscation
下载PDF
导出
摘要 混淆是一种可以用于对移动代码和软件知识产权进行保护的程序变换技术。介绍了现有的代码混淆技术,重点描述了两种较通用的混淆技术:非透明谓词和平展控制流,并对混淆技术研究的一些难点问题和趋势进行了探讨。 Obfuscation is a program transformation technology that can be used in protection of mobile code and intellectual property. The paper introduces existing code obfuscation technology first, then analyzes two popular obfuscation technologies named opaque and control flow flattening, and finally explores some open problems and research trends on obfuscation.
作者 邹宏 谢余强
出处 《信息工程大学学报》 2008年第1期97-99,共3页 Journal of Information Engineering University
关键词 混淆 非透明谓词 平展控制流 逆向工程 obfuscation opaque control flow flattening reverse engineering
  • 相关文献

参考文献10

  • 1Alfred V Aho,Ravi Sethi,Jeffrey D Ullman.Compilers,Principles,Techniques,and Tools[M].Addison-Wesley,1986.
  • 2Majumdar A,Thomborson C.Securing mobile agents control flow using opaque predication[C]∥Knowledge-based Intelligent Information and Engineering Systems:9th International Conference KES.2005:1065-1071.
  • 3Wang Chenxi,Davidon J,Hill J and Knight J.Protection of software-based survivability mechanisms[C]∥International Conference of Dependable Systems and Networks.Sweden:Goteborg,2001:193-202.
  • 4Christian Collberg,Clard Thomborson,Douglas Low.A taxonomy of obfuscating transformations[R].Technical Report 148,New Zealand:The University of Auckland,1997.
  • 5Christian Collberg,Clard Thomborson,Douglas Low.Manufacturing cheap,resilient,and stealthy opaque constructs[C]∥Principles of Programming Languages 1998.1998:184-196.
  • 6史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 7Wroblewski G.General Method of Program Code Obfuscation[D].PhD thesis,Wroclaw University of Technology,Institute of Engineering Cybernetics,2002.
  • 8Ogiso T,Sakabe Y.Software obfuscation on a theoretical basis and its implementation[J].IEEE Transactions on Fundamentals,2003,E86-A(1):176-186.
  • 9Douglas L.Protecting java code via code obfuscation[J].ACM Crossroads,1998,4(3):21-23.
  • 10高鹰,陈意云.基于抽象解释的代码迷惑有效性比较框架[J].计算机学报,2007,30(5):806-814. 被引量:16

二级参考文献42

  • 1史扬,曹立明,王小平.Java混淆器的设计与实现[J].计算机应用,2004,24(11):63-65. 被引量:5
  • 2李永祥,陈意云.基于函数指针数组的代码迷惑技术[J].计算机学报,2004,27(12):1706-1711. 被引量:14
  • 3Daemen J,Rijmen V.The block cipher rijndael,smart card research and applications[A].Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,2000.288-296.
  • 4Jansen W.Countermeasures for mobile agent security[J].Computer Communications,2000,13:1667-1676.
  • 5Sander T,Tschudin C F.Protecting mobile agents against malicious hosts[A].Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,1998.44-60.
  • 6Collberg C,Thomborson C.Software watermarking:Models and dynamic embeddings[A].Proceedings of Symposium on Principles of Programming Languages[C].New York:ACM Press,1999.311-324.
  • 7Naumovich G,Memon N.Preventing piracy,reverse engineering,and tampering[J].Source Computer Archive,2003,36(7):64-71.
  • 8Kahng A B,Lach J,Mangione-Smith W H,et al.Watermarking techniques for intellectual property protection[A].Proceedings of the 35th Annual Conference on Design Automation[C].New York:ACM Press,1999.776-781.
  • 9Lindholm T,Yellin F.The Java virtual machine specification[M].New York:Addison-Wesley,1997.
  • 10Retrologic.RetroGuard for Java[EB/OL].http://www.retrologic.com/retroguard-main.html,2004-02-10.

共引文献26

同被引文献29

  • 1李永祥,陈意云.基于函数指针数组的代码迷惑技术[J].计算机学报,2004,27(12):1706-1711. 被引量:14
  • 2史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 3陈伍军,吕志军,刘岸,吴琨,仲海骏,曾庆凯.一种软件系统运行安全保护方法[J].计算机工程,2005,31(16):139-141. 被引量:2
  • 4XIANG Guang-li,CHEN Xin-meng,ZHU Ping,MA Jie.A Method of Homomorphic Encryption[J].Wuhan University Journal of Natural Sciences,2006,11(1):181-184. 被引量:8
  • 5苏璞睿,杨轶.基于可执行文件静态分析的入侵检测模型[J].计算机学报,2006,29(9):1572-1578. 被引量:14
  • 6曾坷.软件知识产权保护路径研究[D].上海:同济大学,2008.
  • 7Yuichiro K, Akito M, Masahide N, et al. A software protection method based on instruction camouflage[C].Electronics and Communications in Japan (Part3). Wiley Publishers, 2006, 89(1): 47-59.
  • 8Roya] P, Ha]pin M, Dagon D, et al. Poly Unpack: Automating the hidden- code extraction of unpack-executing malware[C].Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference (ACSAC'06), Washington D C.
  • 9Linn C. Debray S. Obfuscation of executable code to improve resistance to static disassembly[C]. Proc of the 10th ACM CCS' 03. New York: ACM Press, 2003. 290-299.
  • 10Wu Y D, Zhao Z G, Chui T W. An attack on SMC based software protection[C]. Proceedings of the International Conference on Computational Science 2006 (ICCS 2006). Springer Berlin: Heidelberg, 2006, 4307: 352-368.USA: IEEE Computer Society, 2006.289-300.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部