期刊文献+

一种基于代码并行化和虚拟机多样化的软件保护方法 被引量:8

Software Protection Scheme Based on Code Parallelization and Virtual Machine Diversity
下载PDF
导出
摘要 考虑到并行和多虚拟机保护的程序逆向分析难度大大高于串行和单虚拟保护的程序,针对嵌套虚拟机为实现高强度保护而引入的高开销问题,提出一种基于代码并行化和虚拟机多样化的软件保护方法,基于程序依赖图运用切片技术对代码进行并行划分,设计多种虚拟指令集及其对应的编译器和解释器,将划分后的代码编译成多样化字节码序列,并和虚拟指令解释器共同嵌入程序.实验分析表明:逆向攻击者需分析不同虚拟机机制和并行代码集才能获取受保护程序语义,在降低时间开销的同时极大增加了逆向分析的难度. Programs protected by code parallelization and multiple virtual machines are reverse analyzed more difficulty than that protected by code serialization and single virtual machine. For the problem that the nested virtual machines introduce high overhead,a software protection scheme based on code parallelization and virtual machine diversity is proposed. The scheme first slices codes into parallel ones based on the program dependence graph,then designs a variety of virtual instructions and corresponding compilers and interpreters,and then compiles the parallel codes into different byte code sequences and embeds them into the program with their diverse interpreters. Experiments and analysis showthat attacker should analyze different virtual machine mechanisms and parallel code set to get the complete program semantics,so it not only reduces the high overhead but also greatly increases the difficulty of reverse analysis.
出处 《小型微型计算机系统》 CSCD 北大核心 2015年第11期2588-2593,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61379151 61272489 61302159 61401512)资助 河南省杰出青年基金项目(144100510001)资助
关键词 软件保护 代码混淆 代码并行化 虚拟机多样化 software protection code obfuscation code parallelization virtual machine diversity
  • 相关文献

参考文献5

二级参考文献97

  • 1莫翾晟,林和,蔡万景,刘芳,李永礼.基于RSA算法与自修改机制的软件保护[J].计算机研究与发展,2006,43(z2):140-144. 被引量:3
  • 2沈海波,史毓达.计算机软件的防篡改技术[J].现代计算机,2005,11(2):45-48. 被引量:4
  • 3孙玉霞,陈火炎.UNIX主机文件完整性校验工具的原理与实现[J].计算机应用与软件,2006,23(6):119-120. 被引量:3
  • 4Ghodke N, Figueiredo R. On the implications of machine virtualization for DRM and fair use: a case study of a virtual audio device driver[C]. Proceedings of DRM'04, ACM, 2004.
  • 5Collberg C, Thomborson C, Low D. A taxonomy of obfuscating transformations[R]. Technical Report 148, Department of Computer Science, University of Auckland, 1997.
  • 6Michael N G, Stephen T, Anup K G. Software protection through anti-debugging[ J]. IEEE Security and Privacy, 2007,5:82-84.
  • 7Collberg C, Sahoo T. Software watermarking in the frequency domain: implementation, analysis, and attacks[J]. Journal of Computer Security, 2005, 13(5) : 721-755.
  • 8Jozwiak I J, Liber A, Marczak K. A hardware-based software protection systems - analysis of security dongles[ C]. Proceedings of the 12th IEEE International Conference on Methods and Models in Automation and Robotics, 2006, 3-15.
  • 9Blunden B. Virtual machine design and implementation in C/C + + EM]. Wordwarc Publ. Plane, Texas, USA.
  • 10Mondcn A, Monsifrot A, Thomborson C. A framework for obfuscated interpretation[ C]. Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, 2004.

共引文献26

同被引文献33

引证文献8

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部