期刊文献+

一种软件保护虚拟机的指令解析器方案

An Instruction Interpreter Scheme of Software Protection Virtual Machine
下载PDF
导出
摘要 未经处理的传统二进制可执行代码容易遭到静态分析、动态分析、逆向工程和篡改等恶意攻击。进程级虚拟机软件技术近年来被用于软件保护领域。本文描述一种新颖的进程级软件保护虚拟机指令解释器方案,该方案使用自定义的SEH(Structured Exception Handling,结构化异常处理)控制虚拟指令的获取。结果表明,该方案为虚拟机中其他保护手段提供了平台,并能在现有基础上增加逆向分析的难度。 The traditional untreated binary executable code is vulnerable to static analysis, dynamic analysis, reverse engineer- ing, and tampering malicious attacks. In recent years, process-level virtual machine software technology has been used in the field of software protection. This paper describes a novel process-level virtual machine instruction interpreter scheme applied to software protection. This scheme uses a custom SEH ( Structured Exception Handling) to control the obtain of virtual instruction. The results show that this scheme provides a platform for other virtual machine protection methods, and can increase the difficulty of reverse analysis on the existing basis.
出处 《计算机与现代化》 2013年第8期119-121,128,共4页 Computer and Modernization
基金 国家高技术研究发展计划(863计划)资助项目(2012AA021105)
关键词 进程级虚拟机 指令解释器 SEH 软件保护 process-level virtual machine instruction interpreter SEH software protection
  • 相关文献

参考文献12

  • 1Averbuch A, Kiperberg M, Zaidenberg N J. An efficient VM- based software protection[ C]//The 5th International Confer- ence on Network and System Security. 2011:121-125.
  • 2Rolls R. Unpacking virtualization obfuscators [ C ]//Proc. of the 3rd USENIX Workshop on Offensive Technologies. 2009 : 1.
  • 3Oreans Technologies. Themida[EB/OL]. http://www, ore- ans. com, 2013-03-07.
  • 4Oreans Technologies. Code Virtualizer[ EB/OL]. http:// www. oreans, corn/products, php, 2013-03-07.
  • 5VMPSoft. VMProtect[EB/OL]. http://www, vmprotect. m/, 2013-03-07.
  • 6RolfRolles. Compiler 1, X86 Virtualizer 0 [ EB/OL ]. ht- tp ://www. openrce, org/blog/view/1110/Compiler _ 1, _ X86_Virtualizer_0, 2013-03-07.
  • 7Lau Boris. Dealing with virtualization packer[C]//Second CARO Workshop on Packers, Decryptors, and Obfusca- tors. 2008.
  • 8汤战勇,王怀军,房鼎益,陈晓江.基于精简指令集的软件保护虚拟机技术研究与实现[J].微电子学与计算机,2011,28(8):1-3. 被引量:3
  • 9张丽娜,阎文斌.基于虚拟机的软件保护研究与设计[J].计算机工程与应用,2012,48(26):66-70. 被引量:6
  • 10段钢.加密与解密(第3版)[M].北京:电子工业出版社,2009.

二级参考文献25

  • 1于淼,孙强.对超粒度混杂技术的改进:基于瘦虚拟机的指令集交替技术[J].计算机应用,2005,25(12):2808-2810. 被引量:2
  • 2Collberg Christian, Nagra Jasvir. Surreptitious soft- ware: obfuscation, watermarking, and tamper proofing for software protection [M]. New York: Addison- Wesley, 2009.
  • 3段钢.加密与解密[M].3版.北京:电子工业出版社,2009.
  • 4舒柏程 李毅超 曹跃.基于虚拟机的软件保护技术研究.计算机工程与科学,2008,30(1):97-102.
  • 5Matthias Jacob, Mariusz H. Jakubowski. The superdi- versier: peephole individualization for software protec- tion[-J]. Advances in Information and Computer Securi- ty, 2008: 100-120.
  • 6Anckaert B, Jakubowski M, Venkatesan, R. Proteus: virtualization for diversied tamper-resistance[C]// Proceedings of the ACM Workshop on Digital Rights Management, New York.. ACM Press, 2006:47-58.
  • 7Shi, Y, Casey, K, Ertl, M and Gregg, D. Virtual ma- chine showdown: stack versus registers [J]. ACM Transactions on Architecture and Code Optimization (TACO), 2008,V4(4) :1-36.
  • 8卿斯汉.恶意代码机理[Z].北京:北京大学软件学院,2004..
  • 9van Oorschot P C.Revisiting sotb~vare protection[C]//LNCS 2851:Proceedings of 6th International Information Security Conference.Bristol, UK: Springer-Verlag, 2003 : 1-13.
  • 10Kent S.Protecting externally supplied software in small computers[D].Boston:Massachusetts Institute of Technol- ogy, 1980.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部