期刊文献+

软件防反汇编技术研究 被引量:7

Research on resistance to disassembly of software
下载PDF
导出
摘要 为了保护软件所有权,根据一般的反汇编算法的特征,提出代码重叠、跳转地址重定向和控制流混淆等几种代码混淆技术。这些技术能使反汇编结果出现混淆,误导攻击者对程序理解,从而提高软件防反汇编的能力,有效地阻止对软件的逆向分析,保护了软件的知识产权。 In order to protect the property of software, according to the characteristics of general disassembly algorithms, this paper provided code overlap, jumping address redirection and obfuscation of control flow etc. several approaches in code obfuscation technologies. These approaches are able to make the disassembly process go away, and misdirect the adversaries' comprehension to programs, consequently enhance the software's resistance to disassembly, thus preventing the software from reverse analysing and protecting its property effectively.
作者 尚涛 谷大武
出处 《计算机应用研究》 CSCD 北大核心 2009年第12期4553-4557,共5页 Application Research of Computers
基金 国家"863"计划资助项目(2006AA01Z405)
关键词 软件保护 逆向分析 代码混淆 程序理解 反汇编 software protection reverse analysis code obfuscation program comprehension disassembly
  • 相关文献

参考文献17

  • 1BENJAMIN S,DEBRAY S,GREGORY A. Disassembly of executable code revisited[ C]//Proc of the 9th Working Conference on Reverse Engineering. Washington DC:IEEE Computer Society, 2002:45.
  • 2CIFUENTES C, GOUGH K J. Decompilation of binary programs[ J]. Software-Practice and Experience,1995,25(7) :811-829.
  • 3HSIEH W C, ENGLER D, BACK G. Reverse-engineering instruction encodings [ C ]//Proc of USENIX Annual Technical Conference. Berkeley : USENIX Association,2001 : 133- 145.
  • 4段钢.软件加密技术内幕[M].北京:电子工业出版社,2004,8
  • 5CIFUENTES C, FRABOULET A. Intraprocedural static slicing of binary executables [ C ]//Proc of International Conference on Software Maintenance. Washington DC:IEEE Computer Society,1997:188.
  • 6WILLIAM F Z. Concepts and techniques in software watermarking and obfuscation [ D ]. New Zealand: The University of Auckland, 2007.
  • 7BARAK B,GOLDREICH O,IMPAGLIAZZO R, et al. On the (Im) possibility of obfuscating programs [ C ]//Proc of the 21st Annual International Cryptology Conference, California. London : Springer-Verlag, 2001:1- 18.
  • 8吴金波,蒋烈辉.反静态反汇编技术研究[J].计算机应用,2005,25(3):623-625. 被引量:5
  • 9LINN C, DEBRAR S. Obfuscation of executable code to imporve resistance to static disassembly[ C ]//Proc of the 10th ACM Conference on Computer and Communications Security. New York : ACM Press, 2003:290- 299.
  • 10ZHANG Xue-song, HE Feng-ling, ZUO Wan-li. An inter-classes obfuscation method for Java program [ C ]//Proc of the 2nd International Conference on Information Security and Assurance. Washington DC: IEEE Computer Society, 2008:360- 365.

二级参考文献6

  • 1CIFUENTES C, Van EMMERIK M. Recovery of jump table case statements from binary code[J]. Science of Computer Programming, 2001,40(2/3):171-188.
  • 2COLLBERG C, THOMBORSON C, LOW D. Manufacturing cheap, resilient, and stealthy opaque[A]. Proceedings of 25th ACM Symposium on Principles of Programming Languages (POPL 1998)[C]. 1998.184-196.
  • 3OGISO T, SAKABE Y, SOSHI M, et al. Software obfuscation on a theoretical basis and its implementation[J]. IEEE Transactions on Fundamentals, 2003,E86-A(1).
  • 4SCHWARZ B, DEBRAY S, ANDREWS G. Disassembly of executable code revisited[A]. Working Conference on Reverse Engineering[C], 2002.
  • 5CHO W, LEE I, PARK S. Againt intelligent tampering: Software tamper resistance by extended control flow obfuscation[A]. Proceedings of World Multiconference on Systems, Cybernetics, and Informatics[C], 2001.
  • 6AUCSMITH D. Tamper-resistant software: An implementation[A]. Information Hiding: First International Workshop: Proceedings, LNCS1174[C]. Springer-Verlag, 1996.317-333.

共引文献8

同被引文献65

引证文献7

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部