期刊文献+

基于循环哨兵的软件保护方法研究 被引量:5

Study of Software Protection Method Based on Cyclical Guards
下载PDF
导出
摘要 保护软件代码不被非法修改是软件开发者面临的严峻问题。本文基于哨兵的思想提出一种循环哨兵模型,能以更灵活的方式保护哨兵的完整性。哨兵之间形成循环链,保证每个哨兵都受到其他哨兵的保护,在保护软件完整性的同时能够确保哨兵本身的安全性。同时,提出数据完整性校验协议实时检测哨兵的完整性,并证明协议的安全性。 Protecting software codes from illegal tampers is a severe problem for software developers. Based on the idea of guards, this paper proposes a cycling guards model which can protect the integrity of the program with more flexible way. All the guards form cycle chain to ensure that each guard is protected by other guards, to protect the integrity of the software itself, at the same time ensuring the security of guards. Meanwhile, the paper proposes a protocol of data integrity check to check integrity of checking guards real-time and proves the protocol' s security.
出处 《计算机与现代化》 2012年第1期161-165,169,共6页 Computer and Modernization
关键词 软件保护 完整性校验 哨兵 循环哨兵 software protection integrity checking guard cyclical guard
  • 相关文献

参考文献19

二级参考文献67

共引文献33

同被引文献30

  • 1莫翾晟,林和,蔡万景,刘芳,李永礼.基于RSA算法与自修改机制的软件保护[J].计算机研究与发展,2006,43(z2):140-144. 被引量:3
  • 2沈海波,史毓达.计算机软件的防篡改技术[J].现代计算机,2005,11(2):45-48. 被引量:4
  • 3孙玉霞,陈火炎.UNIX主机文件完整性校验工具的原理与实现[J].计算机应用与软件,2006,23(6):119-120. 被引量:3
  • 4CERVEN P. Crackproof your software: protect your software against crackers [ M]. San Francisco: No Starch, 2002.
  • 5JIN H X, LOTPIECH J. Proactive software tampering detection [ C]// Proceedings of the 6th International Conference on Informa- tion Security. Berlin: Springer, 2003:352-365.
  • 6WANG C X, HILL J, KNIGHT J. Software tamper resistance: ob- structing static analysis of programs, CS-2000-12 [ R]. Charlottes- ville: University of Virginia, 2000.
  • 7CHANG H, ATALLAH M J. Protecting software code by guards [ C]//Proceedings of the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management. Berlin: Springer-Verlag, 2002:160 - 175.
  • 8YUNG M. How to guard the guards themselves [ C]//FCT'09: Pro- ceedings of the 17th International Conference on Fundamentals of Computation Theory. Berlin: Springer-Verlag, 2009:1-2.
  • 9StytzM R,Whittaker JA.“Software protection:security’s last stand”[J].IEEE Magazine on Security&Privacy,2003,1(1):95-98.
  • 10ZambrenoJ,ChoudharyA,SimhaR,etal“.Flexible software protec-tion using hardware/software codesign techniques”[A].In:Proc of2004 Europe Conf and Exhibition on Design,Automation and Test[C].Paris:IEEE Press,2004,636-641.

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部