期刊文献+

基于代码自修改的软件反跟踪技术结构 被引量:4

Software Anti-tracking Technology Structure based on Self-modifying Code
下载PDF
导出
摘要 软件反跟踪是作为软件保护的一个附属物而产生,伴随软件技术不断进步而发展起来的。随着软件破解工具和云计算的不断应用,对软件反跟踪保护提出了更高的要求,文章设计了一种基于代码自修改的软件反跟踪技术架构,在对目标程序进行处理时把反跟踪代码、自修改代码、程序代码三者紧密结合形成更好的软件保护强度。 Software anti-tracking software as an adjunct to protect the produce, along with software technology continues to progress and develop. As software cracking tools and cloud computing continues to apply, anti-tracking software to protect a higher requirement, we designed a self-modifying code-based software anti-tracking technology architecture, when the target of the anti-tracking procedures for processing code, self-modifying code, code three closely integrated to form a better software protection strength.
出处 《信息网络安全》 2014年第5期46-51,共6页 Netinfo Security
基金 国家自然科学基金[61303263] 计算机软件新技术国家重点实验室开放基金[KFKT2012B25]
关键词 软件反跟踪 代码自修改 关键代码 anti-tracking software self-modifying code critical code
  • 相关文献

参考文献13

  • 1曾坷.软件知识产权保护路径研究[D].上海:同济大学,2008.
  • 2陈伍军,吕志军,刘岸,吴琨,仲海骏,曾庆凯.一种软件系统运行安全保护方法[J].计算机工程,2005,31(16):139-141. 被引量:2
  • 3苏璞睿,杨轶.基于可执行文件静态分析的入侵检测模型[J].计算机学报,2006,29(9):1572-1578. 被引量:14
  • 4Yuichiro K, Akito M, Masahide N, et al. A software protection method based on instruction camouflage[C].Electronics and Communications in Japan (Part3). Wiley Publishers, 2006, 89(1): 47-59.
  • 5Roya] P, Ha]pin M, Dagon D, et al. Poly Unpack: Automating the hidden- code extraction of unpack-executing malware[C].Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference (ACSAC'06), Washington D C.
  • 6邹宏,谢余强.混淆技术研究初探[J].信息工程大学学报,2008,9(1):97-99. 被引量:3
  • 7Linn C. Debray S. Obfuscation of executable code to improve resistance to static disassembly[C]. Proc of the 10th ACM CCS' 03. New York: ACM Press, 2003. 290-299.
  • 8Wu Y D, Zhao Z G, Chui T W. An attack on SMC based software protection[C]. Proceedings of the International Conference on Computational Science 2006 (ICCS 2006). Springer Berlin: Heidelberg, 2006, 4307: 352-368.USA: IEEE Computer Society, 2006.289-300.
  • 9Frank Tsui, Sheryl Duggins, Orlando Karam. Software protection with increased complexity and obfuscation[C]. ACM-SE '12: Proceedings of the 50th Annual Southeast Regional Conference. ACM New York, NY, USA. 2012. 341-342.
  • 10Yuichiro K, Akito M, Masahide N, et al. Program camouflage a systematic instruction hiding method for protecting secrets [C] Proceedings of World Congress on Science, Engineering and Technology Heidelberg, Germany: WASET, 2008, 33: 557-563.

二级参考文献33

  • 1史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 2高鹰,陈意云.基于抽象解释的代码迷惑有效性比较框架[J].计算机学报,2007,30(5):806-814. 被引量:16
  • 3Carla T L,Brodley E. Emporal Sequence Learning and Data Reduction for Anomaly Detection [J]. New York: ACM Press,1998
  • 4Carla T L,Broaley E. Detecting the Abnormal: Machine Learning in Computer Security[R]. West Lafayette: Purdue University,1997
  • 5Ilgun K. USTAT: A Real-time Intrusion Detection System for Unix [MS Thesis][J]. California,Santa Barbara: Department of Computer Science of California Santa Barbara University,1992
  • 6Debar H,Dacier M. Andreas Wespitowards Taxonomy of Intrusion-detection Systems [J]. Computer Networks,1999,31(8):805-822
  • 7Colllberg C., Thomborson C., Low D.. A taxonomy of obfuscating transformations. Department of Computer Science, the University of Auckland: Technical Report #148, 1996
  • 8Burke M., Carini P. R., Choi Jong-Deok. Interprocdural pointer alias analysis. IBM Research Report: RC21055, 1997
  • 9Karnik N.M., Tripathi A.R.. Security in the ajanta system. Software-Practice and Experience, 2000, 30(1): 1~29
  • 10Ghiya R.. Interprocedural analysis in the presence of function pointers. McGill University, Montreal, Quebec, Canada, ACAPS Technical Report: 62,1992

共引文献29

同被引文献20

  • 1周国祥,陆文海.基于BHO技术的数字版权保护系统的研究与设计[J].计算机研究与发展,2010,47(S1):316-320. 被引量:4
  • 2王洪锦,常鸿,温文丽.软件加密的反跟踪技术[J].河北北方学院学报(自然科学版),2005,21(3):35-38. 被引量:5
  • 3杨宏群,陈春华.结构化异常处理在软件保护中的应用[J].福建电脑,2007,23(11):78-78. 被引量:1
  • 4郑大公.软件保护中的反跟踪技术[J].现代企业教育,2007(12X):100-101. 被引量:1
  • 5360互联网中心.2013年中国手机安全状况报告[EB/OL].(2014-02-11).[2014-09-11].http://awhzfien7r.l5.yunpan.cn/lkl QPERXj6bcP GgA.
  • 6Android Police.Just How Bad Is App Piracy On Android Anyway?Hint:We’re Asking The Wrong Question[EB/OL].(2012-07-31).[2014-09-11].http://www.androidpolice.com/2012/07/31/editorial-just-how-bad-is-app-piracy-on-android-anywayshint-were-asking-the-wrong-question/.
  • 7360互联网中心.2014年第一期中国移动支付安全报告[EB/OL].(2014-03-11).[2014-9-11].http://aqvs9knlja.l5.yanpan.cn/lk/Q4Vgp LKMLV9Xq.
  • 8Kanzaki Y,Monden A.Computer Software and Applications Conference[C].Dallas,USA:COMPSAC,2003.
  • 9徐江凌.基于反跟踪和自修改代码技术的软件保护系统设计[D].成都:电子科技大学,2010.
  • 10Patrick Schulz.Android Security Analysis Challenge Tampering Dalvik Bytecode During Runtime[EB/OL].(2013-03-25).[2014-09-11].http://blog.bluebox.com/2013/03/25/android-security-analysis-challenge-tampering-dalvik-bytecode-during-runtime/.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部