期刊文献+

基于同余方程和中国剩余定理的混淆算法 被引量:6

Obfuscation algorithms based on congruence equation and Chinese remainder theorem
下载PDF
导出
摘要 在介绍了代码混淆技术和中国剩余定理的基础上,利用密钥和一组同余方程解的状态构造了一种参数化的不透明谓词,并采用一元多项式环上的中国剩余定理判断不透明谓词的输出。理论分析表明构造的不透明谓词由若干多项式组成,对密钥敏感,具有单向性、随机性和较高的隐蔽性,密码安全性高,能抵抗静态和动态攻击。测试实验表明,混淆程序增加了混淆后程序的复杂度,保证了混淆后程序的正确性,且混淆变换不会给程序带来太大的空间和时间开销。 Based on introduction of the code obfuscation technology and Chinese remainder theorem, this paper used the key and the state for a group of congruence equations' solution to construct a parametric opaque predicate, and used Chinese remainder theorem of polynomial ring to judge opaque predicates' output. Theoretical analysis shows that the opaque predicate composed of several polynomials, is sensitive to the key, unidirectional, random and has higher concealment, the security of password is high, can resist static and dynamic attack. Experimental tests show that the change increases the complexity of the program after confusion, ensure the correctness and not to bring too much overhead of space and time.
出处 《计算机应用研究》 CSCD 北大核心 2015年第2期485-488,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61170252)
关键词 代码混淆 谓词 同余方程 多项式 中国剩余定理 code obfuscation predicate congruence equation multinomial Chinese remainder theorem
  • 相关文献

参考文献11

  • 1苏庆,吴伟民,李忠良,李景樑,陈为德.混沌不透明谓词在代码混淆中的研究与应用[J].计算机科学,2013,40(6):155-159. 被引量:16
  • 2COLLBERG C, THOMBORSON C, LOW D. A taxonomy of obfusca- ting transformations[ R ]. [ S. 1. ] : University of Ancklmad, 1997.
  • 3COLLBERG C, THOMBORSON C, LOW D. Manufacturing cheap, resilient and stealthy opaque constructs[ C ]//Proc of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Langua- ges. New York : ACM Press, 1998 : 184-197.
  • 4ARBOIT G. A method for watermarking Java programs via opaque predicates[ C]//Pmc nf International Conference on Electronic Com- merce Resem'ch. 2002 : 124-131.
  • 5MYLES G, COLLBERG C. Software watermarking via opaque predi- cates: implementation, analysis, and attacks [ J ]. Electron Com- merce Reserch,2006,4 ( 6 ) : 155-171.
  • 6蒋华,刘勇,王鑫.基于控制流的代码混淆技术研究[J].计算机应用研究,2013,30(3):897-899. 被引量:9
  • 7王建民,余志伟,王朝坤,付军宁.Java程序混淆技术综述[J].计算机学报,2011,34(9):1578-1588. 被引量:15
  • 8赵玉洁,汤战勇,王妮,房鼎益,顾元祥.代码混淆算法有效性评估[J].软件学报,2012,23(3):700-711. 被引量:33
  • 9贾春福.信息安全数学基础[M].天津:南开大学出版社,2005.
  • 10王继成.一元多项式环中的孙子定理[J].杭州师范学院学报(自然科学版),2006,5(4):313-314. 被引量:2

二级参考文献79

  • 1史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 2孙光,孙星明,杨蓉,黄华军.可嵌入水印的混淆编译框架[J].科学技术与工程,2005,5(10):656-660. 被引量:4
  • 3李长青,李晓勇,韩臻.基于控制转换的软件保护[J].信息安全与通信保密,2006,28(10):146-149. 被引量:8
  • 4高鹰,陈意云.基于抽象解释的代码迷惑有效性比较框架[J].计算机学报,2007,30(5):806-814. 被引量:16
  • 5Van V H. Mocha, the Java Decompiler. http://www, brou haha. com/-eric/so{tware/mocha/, 1996.
  • 6Collberg C, Thomborson C, Low D. A Taxonomy of Obfus- cating Transformations. Department of Computer Science, University of Auckland: Technical Report 10, 1997.
  • 7Sosonkin M, Naumovich G, Memon N. Obfuscation of de sign intent in object oriented applieations//Proceedings of the Digital Rights Management Workshop. Washington, DC, USA, 2003:142 -153.
  • 8Chan J T, Yang W. Advanced obfuscation techniques for Java bytecode. Journal of Systems and Software, 2004, 71(1 2): 1-10.
  • 9De A R, Van L O. Stealthy obfuscation techniques: Mislead- ing the pirates. Department of Computer Science University of Twente Enschede, The Netherlands, 2003.
  • 10Majumdar A, Thomborson C. Manufacturing opaque predi cates in distributed systems for code obfuscation//Proceed ings of the 4th International Conference on Information Secu rity. Hobart, Tasmania, Australia, 2006:187-196.

共引文献56

同被引文献24

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部