期刊文献+

一种具有时间多样性的虚拟机软件保护方法 被引量:10

Software Protection Based on Virtual Machine with Time Diversity
下载PDF
导出
摘要 软件核心算法防逆向保护,是软件研发乃至软件产业发展的迫切需求,也是当前软件安全研究领域的热点之一.虚拟机软件保护作为一种保护强度高、商业应用广的技术,已被用于软件核心算法保护,并在很大程度上能够抵御攻击者的逆向分析.但这种保护方法难以抵御累积攻击,无法提供更加持久的保护.时间多样性是指一个软件在不同时间被执行时,执行路径不同,主要用于抵御累积攻击.将时间多样性与虚拟机软件保护相结合,提出了一种具有时间多样性的虚拟机软件保护方法,称为TDVMP.在TDVMP中,通过构造多条相异的执行路径,使得被保护软件在不同次执行时,能够动态选取不同执行路径,从而极大地增加了攻击者进行累积的核心算法逆向分析攻击的难度.同时,对于TDVMP设计中的关键问题,比如多执行路径的构造与选择等进行了详细讨论.此外,提出了时间多样性保护效果的评价指标,并给出了其度量及计算方法.以所实现的原型系统为基础,通过一组具有一定实用价值的实例,对所提出的方法进行了测试、实验.结果表明,TDVMP对于软件核心算法防逆向保护是有效且实用的. Anti-Reversing protection for persistent and high-insensitive software core algorithm has become an insistent demand for the research of software security and even for the whole software industry. Virtual machine based software protection has been widely used to protect the core algorithm from being reversed, but it is not sufficient for the current method to defend against cumulative attack and thus cannot provide long-term effective protection. Time diversity is used to fight against cumulative attack to allow software to execute along variant paths in different running time. A virtual machine based software protection method with time diversity, called TDVMP, is proposed in the paper. The key idea of the method is to construct multiple execution paths with equivalent semantics leading to dynamically variant execution paths in running time. Main design issues of TDVMP, such as construction and selection of multiple execution paths, are discussed in detail. Furthermore, a metric named variation of execution paths to evaluate the effectiveness of time diversity is proposed, and the methods to measure and compute the metric are also presented. A prototype of TDVMP is implemented, and upon which the experiments are carried out with a set of practical use cases. Experiment results show that TDVMP is effective and applicable for core algorithm anti-reversing protection.
出处 《软件学报》 EI CSCD 北大核心 2015年第6期1322-1339,共18页 Journal of Software
基金 国家自然科学基金(61070176 61170218 61272461) 教育部高等学校博士学科点专项科研基金(20106101110018) 陕西省科技攻关计划(2011K06-07)
关键词 时间多样性 虚拟机软件保护 累积攻击 执行路径差异 time diversity VM-based software protection cumulative attack variation of execution path
  • 相关文献

参考文献20

  • 1Chow S, Eisen P, Johnson H, van Oorschot PC. A white-box DES implementation for DRM applications. In: Feigenbaum J, ed. Proe. of the Digital Rights Management Workshop. LNCS 2696, Washington, 2002.1-15. [doi: 10.1007/978-3-540-44993-5_1 ].
  • 2Collberg C. The case for dynamic digital asset protection techniques [Ph.D. Thesis]. Department of Computer Science, University of Arizona, 2011. 1-5.
  • 3Collbcrg C, Davidson JW, Giacobazzi R, Gu YX, Hcrzberg A, Wang FY. Toward digital asset protection. Intelligent gystems, 2011,26(6):8-13. [doi: 10.1109/MIS.2011.106].
  • 4Anckaert B, de Bosschere K. Diversity for software protection [Ph.D. Thesis]. Ghent University, 2008.
  • 5O'donnell AJ, Sethu H. Software diversity as a defense against viral propagation: Models and simulations. In: Proc. of the Symp. on Measurement, Modeling and Simulation of Malware. Monterey: IEEE, 2005. 247-253. [doi: 10.1109/PADS.2005.31].
  • 6Bhatkar S. Defeating memory error exploits using automated software diversity [Ph.D. Thesis]. Stony Brook University in New York, 2007.
  • 7Yang Y, Zhu S, Cao G. Improving sensor network immunity under worm attacks: A software diversity approach. In: Proc. of the 9th ACM Int'l Symp. on Mobile Ad Hoe Networking and Computing. New York: ACM Press, 2008. 149-158. [doi: 10.1145/ 1374618.1374640].
  • 8De Sutter B, Anckaert B, Geiregat J, Chanet D, de Bosschere K. Instruction set limitation in support of software diversity. In: Lee P J, Cheon JH, eds. Proe. of the Information Security and Cryptology (ICISC 2008). Seoul: Springer-Verlag, 2009. 152-165. [doi: 10.1007/978-3-642- 00730-9_10].
  • 9Moser A, Kruegel C, Kirda E. Exploring multiple execution paths for malware analysis. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland: ACM Press, 2007.231-245. [doi: 10.1109/SP.2007.17].
  • 10Technology O. Codevirtualizer. 2009. http://oreans.corn/eodevirtualizer.php.

二级参考文献8

  • 1Ghodke N, Figueiredo R. On the implications of machine virtualization for DRM and fair use: a case study of a virtual audio device driver[C]. Proceedings of DRM'04, ACM, 2004.
  • 2Collberg C, Thomborson C, Low D. A taxonomy of obfuscating transformations[R]. Technical Report 148, Department of Computer Science, University of Auckland, 1997.
  • 3Michael N G, Stephen T, Anup K G. Software protection through anti-debugging[ J]. IEEE Security and Privacy, 2007,5:82-84.
  • 4Collberg C, Sahoo T. Software watermarking in the frequency domain: implementation, analysis, and attacks[J]. Journal of Computer Security, 2005, 13(5) : 721-755.
  • 5Jozwiak I J, Liber A, Marczak K. A hardware-based software protection systems - analysis of security dongles[ C]. Proceedings of the 12th IEEE International Conference on Methods and Models in Automation and Robotics, 2006, 3-15.
  • 6Blunden B. Virtual machine design and implementation in C/C + + EM]. Wordwarc Publ. Plane, Texas, USA.
  • 7Mondcn A, Monsifrot A, Thomborson C. A framework for obfuscated interpretation[ C]. Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, 2004.
  • 8Zhang Chen-xi, et al. Computer architecture[ M]. Beijing: Higher Education Press, 2000.

共引文献12

同被引文献46

引证文献10

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部