期刊文献+

子程序花指令加密算法研究 被引量:2

Study on encryption algorithm of sub-function junk code
下载PDF
导出
摘要 根据反汇编器原理,分析现有的花指令加密算法存在的问题,提出了一种新的花指令加密算法——子程序花指令加密算法。详细论述了子程序花指令加密的工作流程和算法描述,分析了此算法的有效性和逻辑一致性。最后,通过算法的具体实现,对其有效性和逻辑一致性进行了验证。 According to the disassembler principle,the problem of current junk code encryption strategies is analyzed.Based on these,a new junk code encryption algorithm is proposed,which is called the encryption algorithm of the sub-function junk code.The workflow and the algorithm description of the encryption for the sub-function junk code are particularly discussed.Alter this, the validity and the logic coherence of the algorithm are analyzed.Lastly,the Validity and the logic coherence of the algorithm are confirmed by the concrete implementation.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第3期130-132,共3页 Computer Engineering and Applications
基金 国家科技攻关计划项目(No.2004BA811B04) 江苏省高校自然科学研究计划项目(No.05KJD520150)~~
关键词 花指令 加密算法 代码模糊变换 反汇编 递归反汇编 junk code encryption algorithm obfuscating transformation disassemble recursive disassemble
  • 相关文献

参考文献8

  • 1沈海波,史毓达.软件代码的防篡改技术[J].武汉科技学院学报,2004,17(5):64-67. 被引量:7
  • 2王海平,曹林,孙国梓,陈丹伟.随机花指令加密算法研究[J].计算机应用,2006,26(2):338-340. 被引量:5
  • 3林宣雄,李怀祖,张文修.扰码机制在反静态分析中的运用[J].微电子学与计算机,1996,13(1):16-19. 被引量:3
  • 4Linn C,Debray S.Obfuscation of executable code to improve resistance to static disassembly[C]//Proceedings of the 10th ACM Conference on Computer and Communications Security,2003:290-299.
  • 5Griffiths A.Binary protection schemes[J].Code Breakers Journal, 2005,2( 1 ) : 1-91.
  • 6Kruegel C,Robertson W,Valeur F,et al.Static disassembly of obfuscated binaries[D].Reliable Software Group University of California Santa Barbara,2004.
  • 7Schwarz B,Debray S,Andrews G.Disassembly of executable code revisited[D].Department of Computer Science University of Arizona, 2002.
  • 8Eilam E.Reversing:secrets of reverse engineering[M].[S.l.]:Wiley,2005.

二级参考文献11

  • 1高宏.可信计算机安全技术的开发[J].中国信息导报,2004(7):58-60. 被引量:2
  • 2于淼,孙强.对加壳技术的改进:超粒度混杂技术[J].计算机应用,2004,24(8):137-139. 被引量:9
  • 3林宣雄,李怀祖,张文修.扰码机制在反静态分析中的运用[J].微电子学与计算机,1996,13(1):16-19. 被引量:3
  • 4林宣雄,磁盘加密解密实用技术,1992年
  • 5Hume.病毒和网络攻击中的多态、变形技术原理分析及对策[R/OL].http://www.xfocus.net/pro jects/Xcon/2003/Xcon2003-hume.pdf,2003,12.
  • 6卿斯汉.恶意代码机理[Z].北京:北京大学软件学院,2004..
  • 7LINN C, DEBRAY S. Obfuscation of Executable Code to Improve Resistance to Static Disassembly[A]. Proceedings of the 10th ACM conference on Computer and communications security[C]. 2003.290 - 299.
  • 8GRIFFITHS AL. Binary protection schemes [J] . CodeBreakers-Journal, 2005, 2(1): 1-91.
  • 9C.S. Collberg, C.Thomborson. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection[EB/OL]. IEEE Tans. Software Eng., 2002,(8): 735~746.
  • 10H.Chang, M.J.Atallah. Protecting Software Code by Guards[M]. Proc. ACM Workshop Security and Privacy in Digital rights management, ACM Press, 2001. 160~ 175.

共引文献12

同被引文献20

  • 1王海平,曹林,孙国梓,陈丹伟.随机花指令加密算法研究[J].计算机应用,2006,26(2):338-340. 被引量:5
  • 2卿斯汉.恶意代码机理[Z].北京:北京大学软件学院,2004..
  • 3van Oorschot P C.Revisiting sotb~vare protection[C]//LNCS 2851:Proceedings of 6th International Information Security Conference.Bristol, UK: Springer-Verlag, 2003 : 1-13.
  • 4Kent S.Protecting externally supplied software in small computers[D].Boston:Massachusetts Institute of Technol- ogy, 1980.
  • 5Collberg C, Nagra J.Surreptitious software: obfuscation, watermarking, and tamper proofing for software protec- tion[M].New York: Addison-Wesley, 2009: 6-49,60-113.
  • 6Madou M, Anckaert B,Moseley P, et al.Software protection through dynamic code mutation[C]//The 6th International Workshop on Information Security Applications(WISA). Berlin, Heidelberg: Springer, 2005: 371-385.
  • 7Aycock J, de Graaf R, Aycock J.Anti-disassembly using cryptographic hash functions[J].Journal in Computer Vi- rology, 2006,2 ( 1 ) : 79-85.
  • 8Nanda S, Chiueh T.A survey on virtualization technolo- gies[R].[S.1.]: Stony Brook University, 2005.
  • 9Smith J E,Nair R.The architecture of virtual machines[J]. IEEE Computer, 2005,38(5) : 32-38.
  • 10Smith J E.An overview of virtual machine architectures [EB/OL].http://www.ece.wisc.edu/jes/papers/vms.pdf.

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部