期刊文献+

一种基于二进制程序的安全加固系统设计和实现

A System for Binaries' Security Reinforcement
下载PDF
导出
摘要 随着软件加固技术的发展,如何以最小的开销换来最安全的保护,逐渐成为二进制程序安全加固技术的研究重点。论文通过分析各种安全加固技术,提出一种新的二进制程序安全加固系统,能够加大静态分析的难度,有效地阻碍对程序的动态分析。最后,通过实验证明本加固系统具有通用性、稳定性和有效性。 As the development of software reinforcement technology, how to minimize the cost in exchange of the most secure protection gradual y becomes a hot topic in binary security reinforcement researches. In this paper, we analyze various security reinforcement technologies and propose a novel binaries' security reinforcement system, which could increase the difficulty of static analysis attack and effectively impede dynamic analysis attack.Experiment results show that the reinforcement system performs satisfactory in versatility, stability and effectiveness.
出处 《信息安全与技术》 2015年第7期17-21,共5页
关键词 软件保护 二进制程序的安全加固 PE文件 software protection binaries' security reinforcement pe file
  • 相关文献

参考文献4

二级参考文献41

  • 1Ostrand T J, Weyuker E J. The Distribution of Faults in a Large Industrial Software System[C]//Proc of the ACM SIGSOFT Syrup on Software Testing and Analysis, 2002:55-64.
  • 2Ostrand T J, Weyuker E J, Bell R M. Where the Bugs Are [C]//Prco of the ACM SIGSOFT Symp on Software Testing and Analysis, 2004: 86-96.
  • 3Basili V R, Perricone B T. Software Errors and Complexity: An Empirical Investigation [J].Communications of the ACM, 1984, 21(1):42-52.
  • 4Chou A, Yang J, Chelf B, et al. An Empiracle Study of Operating System Errors[C]//Proc of the 18th SOSP, 2001:73-78.
  • 5Engler D R, Kaashoek M F, Exokernel J O Jr. An Operating System Architecture for Application-Level Resource Management[C]//Proc of the 15th Syrup on Operating System Principles, 1995:251-266.
  • 6Seltzer M, Small C. Self-Monitoring and Self-Adapting Operating Systems[C]//Proc of the 6th Workshop on Hot Topics in Operating Systems, 1997 : 124-129.
  • 7Swift M M, Martin S, Levy H M, et al. Nooks..An Architecture for Reliable Device Drivers [C]//Proc of the 10th ACM SIGOPS European Workshop, 2002:102-107.
  • 8Fraser K, Hand S, Neugebauer R, et al. Reconstructing I/O [R]. Technical Report UCAM-CL-TR-596, Computer Laboratory, University of Cambridge, 2004.
  • 9Barham P, Dragovic B, Fraser K, et al. Xen and the Art of Virtualization[C]//Proc of the 19th ACM Symp on Operating Systems Principles, 2003:164-177.
  • 10Whitaker A, Shaw M, Gribble S D. Denali: Lightweight Virtual Machines for Distributed and Networked Applications [R]. Technical Report 02-02-01, University of Washington, 2002.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部