期刊文献+

一种基于API安全属性隐藏的软件保护方法 被引量:1

A software protection method base on concealment of API security attributes
原文传递
导出
摘要 基于三种软件攻击目的,分析了不同API(application programming interface)安全属性在软件攻击过程中的作用,确定出API安全属性集,并分析了每一种API安全属性的攻击特点。借鉴现有的API保护方法,提出了基于API安全属性隐藏的软件保护方法。该方法使安全属性以一种更加隐蔽的方式存在,以此增加攻击者动态获取它们的难度。分别从安全性和性能影响两方面进行评价,实验结果表明该方法能够抵御API安全属性的静态获取,也能在一定程度上增加动态获取的难度,同时,未对性能造成较大影响。 Based on three attacking targets of software,the role of each API security attribute was analyzed and the attributes set was collected. The attacking features( i. e. presence state and extracting ways) of each attribute were analyzed,based on which a method of concealing API security attributes was proposed. This method makes security attributes exist in a more subtle way. So it increases the difficulty of extracting them for attackers. In the end,experiments from two aspects: security effect and performance cost were conducted. And the experiment results showthat the method can resist the API static security attributes of the acquisition. To a certain extent,it can also increase the difficulty of the dynamic acquisition without causing a great influence on the system performance.
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2015年第1期12-19,共8页 Journal of Shandong University(Natural Science)
基金 国家科技支撑计划资助项目(2013BAK01B02) 国家自然科学基金资助项目(61170218,61272461,61202393) 陕西省教育厅产业化培育项目(2013JC07) 陕西省自然科学基础研究计划项目(2012JQ8049)
关键词 逆向分析 API安全属性 攻击特点 隐藏方案 reverse analysis API security attributes attacking feature concealment method
  • 相关文献

参考文献8

  • 1KLIMEK I, KELTIKA M, JAKAB F. Reverse engineer- ing as an education tool in computer science [ C ]// Pro- ceedings of 2011 IEEE 9th International Conference on Emerging Learning Technologies and Applications (ICE- TA). Piscataway: IEEE, 2011: 123-126.
  • 2EILAM E. Reversing : secrets of reverse engineering[ M]. New York: John Wiley & Sons, 2005.
  • 3CHOI S, PARK H, LIM H, et al. A static API birthmark for Windows binary executables [ J ]. Journal of Systems and Software, 2009, 82(5) :862-873.
  • 4BAYER U, COMPARETFI P M, HLAUSCHEK C. et al. Scalable, behavior-based malware clustering [ C ]// Pro- ceedings of the Network and Distributed System Security Symposium (NDSS 2009). San Diego, 2009: 1-18.
  • 5MADOU M, ANCKAERT B, DE SUTTER B, et al. Hybrid static-dynamic attacks against software protection mechanisms [C]// Proceedings of the 5th ACM Work- shop on Digital Rights Management. New York: ACM, 2010 : 75-82.
  • 6ALAZAB M, VENKATARAMAN S, WATI'ERS P. To- wards understanding malware behaviour by the extraction of API calls[ C]//Proceedings of 2010 IEEE 2nd Cyber- crime and Trustworthy Computing Workshop (CTC). Piscataway : IEEE, 2010 : 52-59.
  • 7BRAND M, VALLI C, WOODWARD A. Lessons Learned from an investigation into the analysis avoidance techniques of malicious software [J]. Australian Digital Forensics, 2010, 15 (6) : 100-106.
  • 8赵玉洁,汤战勇,王妮,房鼎益,顾元祥.代码混淆算法有效性评估[J].软件学报,2012,23(3):700-711. 被引量:33

二级参考文献20

  • 1高鹰,陈意云.基于抽象解释的代码迷惑有效性比较框架[J].计算机学报,2007,30(5):806-814. 被引量:16
  • 2Eilam E,Chikofsky E,Wrote;Han Q,Yang Y,Wang YY,Li N,Trans.Reversing:Secrets of Reverse Engineering.Beijing:ChinaMachine Press,2005(in Chinese).
  • 3Collberg C,Thomborson C,Low D.A taxonomy of obfuscating transformations.Technical Report,148,University of Auckland,1997.
  • 4Collberg C,Thomborson C,Low D.Manufacturing cheap,resilient,and stealthy opaoue constructs.In:Proc.of the 25th ACMSIGPLAN-SIGACT Symp.on Principles of Programming Languages,1998.184-196.[doi:10.1145/268946.268962].
  • 5Chow S,Gu Y,Johnson H,Zakharov VA.An approach to the obfuscation of control-flow of sequential computer programs.In:Davida G,Frankel Y,eds.Proc.of the Information Security(ISC 2001).LNCS 2200,Springer-Verlag,2001.144-155.[doi:10.1007/3-540-45439-X_10].
  • 6Barak B,Goldreich O,Impagliazzo R,Rudich S,Sahai A,Vadhan SP,Yang K.On the(im)possibility of obfuscating programs.In:Kilian J,ed.Proc.of the 21st Annual Int’l Cryptology Conf.on Advances in Cryptology(CRYPTO 2001).Santa Barbara:Springer-Verlag,2001.1-18.
  • 7Appel A.Deobfuscation is in NP.2002.http://www.cs.princeton.edu/~appel/papers/deobfus.pdf.
  • 8Preda M,Giacobazzi R.Semantic-Based code obfuscation by abstract interpretation.In:Proc.of the ICALP.2005.[doi:10.1007/11523468_107].
  • 9Preda M,Giacobazzi R.Control code obfuscation by abstract interpretation.In:Proc.of the SEFM.2005.[doi:10.1109/SEFM.2005.13].
  • 10Gao Y,Chen YY.Research on code obfuscation and its semantics[Ph.D.Thesis].Hefei:University of Science and Technology ofChina,2007.(in Chinese with English abstract).

共引文献32

同被引文献13

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部