期刊文献+

应用变形引擎实现的软件动态保护方法研究 被引量:1

Research on the Software Dynamic Protection by Using Metamorphic Engine
下载PDF
导出
摘要 通过对软件动态保护的研究,提出了应用变形引擎实现的软件动态保护方法.将待保护软件的重要代码片段从软件中删除,利用自修改变形技术构造这些重要代码片段的变形引擎,在软件执行过程中,将它们依次还原并执行;同时,根据一些代码片段的执行时间控制变形子引擎的调度;并且利用动态加解密技术对变形子引擎进行保护.这种方法大大增加了软件攻击者成功逆向该软件所需的时间和精力.最后通过实验说明软件安全强度的提高对性能造成了一定的影响. Through researching on software dynamic protection,the metamorphic engines based method is proposed.The method deletes the important code segments from the softw are that to be protected and generates the metamorphic engines of these code segments by self-modifying technology.When protected softw are is executing,restoring them into specific location.Meanw hile,according to executing time of some code segments,controlling the dispatch of the metamorphic sub-engines.Also,dynamic encryption and decryption is used to protect the metamorphic sub-engines.The method can increase time and energy to reverse softw are for softw are attackers.By experiments,it affects the softw are's performance in some extent w hen improving softw are security strength.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第7期1462-1467,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61070176 61170218)资助 陕西省教育厅产业化示范基金项目(2010JC24)资助 西北大学-爱迪德物联网信息安全联合实验室项目(NISL-2009TR01)资助
关键词 软件动态保护 变形引擎 自修改 动态加解密 software dynamic protection metamorphic engines self-modifying dynamic encryption and decryption
  • 相关文献

参考文献19

  • 1Eilam E. Reversing: secrets of reverse engineering [ M ]. Wiley, Washington, 201 1.
  • 2Birrer B D, Raines R A, Baldwin R O, et al. Program fragmentation as a metamorphic software protection [ C ]. Third International Sym- posium on Information Assurance and Security, Manchester, Eng- land,2007:369-374.
  • 3Myers E W. An O (ND) difference algorithm and its variations [ J ]. Algorithmica, 1986,1 ( 1 ) :251-266.
  • 4Dube T E. Metamorphism as a software protection for non-mali- cious code[ D]. Air University,2006.
  • 5Chow S,Eisen P,Johnson H,et al. A white-box DES implementa- tion for DRM applications [ M ]. Digital Right Management, Spring- er, Heidelberg, 2003,2696 : 1-15.
  • 6u Y,Zhao Z,Chui T W. An attack on SMC-based software pro- tection[ C ]. Proceedings of the 8th International Conference on In- formation and Communications Security ( ICICS' 06 ), Raleigh,NC, USA, 2006 .. 352 -368.
  • 7Fang D, Gao L, Tang Z, et al. A software protection framework based on thin virtual machine using distorted encryption[ C ]. IEEE Computer Society, Cluilin, Guangxi ,2011:266-271.
  • 8Lemay E, Ford M D, Keefe K. Model-based security metrics using ADversary vlew security evaluation[ C]. 2011 Eighth International Conference on Quanttafive Evaluation of Systems, Urbana-Cham- paign, Urbana, IL, USA, 20 11 : 191-200.
  • 9Memon J, Khan A, Baig A, et al. A study of software protection techniques [ M ]. Innovations and Advanced Techniques in Comput- er and Information Sciences and Engineering,Springer ,Heidelberg, 2007 : 249 -253.
  • 10Irdeto. Sustainable security of device:destroy hacker's commercial mode with software security [ EB/OL]. http ://www. irdeto, corn/ documents/WP_CW_Sustainable_Device _ Security_CHN_ H. pdf, 2010.

同被引文献15

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部