期刊文献+

堆栈型虚拟机代码入口点定位方法研究 被引量:1

Research on locating entry point of stack-based virtual machine
下载PDF
导出
摘要 在采用虚拟化技术保护的程序中定位x86代码和虚拟机代码的临界点是实现被虚拟机保护代码自动化提取和还原的前提,目前尚不存在能有效实现虚拟机代码入口点定位的方法。针对该问题,构建一个程序状态转移模型,并在此模型的基础上,提出基于栈监控的自建栈型虚拟机代码入口点定位方法和基于寄存器值聚类分析的复用栈型虚拟机代码入口点定位方法,有效解决了虚拟机代码入口点的定位问题。实验结果表明,该方法能有效实现堆栈型虚拟机代码入口点的准确定位。 Locating the entry point of stack-based virtual machine in the program protected by virtualization technology is the key to restore the virtual machine protection code. Currently, there was no existing methods could reliably locate the entry point of code protected by virtual machine. To solve this problem, this paper established a program state model. Based on the model, this paper presented the method of stack-based monitoring to locate the entry point of code protected by the self-building stack VM, and also presented the method of clustering register values to locate the entry point of code protected by the reusing stack virtual machine. By this way, the problem was solved efficiently. Experimental results show that the proposed method can locate the entry point of the stack-based virtual machine code.
出处 《计算机应用研究》 CSCD 北大核心 2015年第12期3688-3692,共5页 Application Research of Computers
基金 国家科技支撑计划资助项目(2012BAH47B01) 国家自然科学基金资助项目(61271252) 郑州市科技创新团队资助项目(10CXTD150) 上海市科研计划资助项目(13DZ1108800)
关键词 虚拟机保护 栈切换 寄存器值聚类 虚拟机入口点 状态转移 virtual machine protection stack swapping clustering of register values entry point of virtual machine state transition
  • 相关文献

参考文献14

  • 1黄荷洁,康绯,舒辉.基于动态数据流分析的虚拟机保护破解技术[J].计算机工程,2014,40(9):59-65. 被引量:3
  • 2Rolles R. Unpacking virtualization obfuscators[C] //Proc of WOOT. 2009.
  • 3Sharif M, Lanzi A, Giffin J. Automatic reverse engineering of malware emulators[C] //Proc of IEEE Symposium on Security and Privacy. [S. l.] :IEEE Press, 2009:94-109.
  • 4Nanda S, Chiueh T C. A survey on virtualization technologies[R] . [S. l.] :SUNY at Stong Brook, 2005.
  • 5Shi Yunhe, Casey K, Ertl M A, et al. Virtual machine showdown:stack versus registers[J] . ACM Trans on Architecture and Code Optimization, 2008, 4(4):1-36.
  • 6Gregg D, Beatty A, Casey K, et al. The case for virtual register machines[J] . Science of Computer Programming, 2005, 57(3):319-338.
  • 7Fagerholm F. Perl 6 and the parrot virtual machine[EB/OL] . (2005-04-01)[2015-01-01] . http://www. cs. helsinki. fi/u/pohjalai/k05/okk/seminar/Fagerholm-Parrot. pdf.
  • 8Ierusalimschy R, De Figueiredo L H, Celes W. The implementation of Lua 5. 0[J] . Journal of Universal Computer Science, 2005, 11(7):1159-1176.
  • 9Kerridge P W J, Barnes F. Rain VM:portable concurrency through managing code[C] //Proc of the 29th Technical Meeting on Communicating Process Architectures. [S. l.] :IOS Press, 2006:253-267.
  • 10VMProtect software[EB/OL] . (2013-05-11)[2014-11-08] . http://vmpsoft. com/.

二级参考文献18

  • 1段钢.加密与解密[M].3版.北京:电子工业出版社,2006 1-5.
  • 2Ghodke N, Figueiredo R. On the implications of machine virtualization for DRM and fair use: a case study of a virtual audio device driver[C]. Proceedings of DRM'04, ACM, 2004.
  • 3Collberg C, Thomborson C, Low D. A taxonomy of obfuscating transformations[R]. Technical Report 148, Department of Computer Science, University of Auckland, 1997.
  • 4Michael N G, Stephen T, Anup K G. Software protection through anti-debugging[ J]. IEEE Security and Privacy, 2007,5:82-84.
  • 5Collberg C, Sahoo T. Software watermarking in the frequency domain: implementation, analysis, and attacks[J]. Journal of Computer Security, 2005, 13(5) : 721-755.
  • 6Jozwiak I J, Liber A, Marczak K. A hardware-based software protection systems - analysis of security dongles[ C]. Proceedings of the 12th IEEE International Conference on Methods and Models in Automation and Robotics, 2006, 3-15.
  • 7Blunden B. Virtual machine design and implementation in C/C + + EM]. Wordwarc Publ. Plane, Texas, USA.
  • 8Mondcn A, Monsifrot A, Thomborson C. A framework for obfuscated interpretation[ C]. Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, 2004.
  • 9Zhang Chen-xi, et al. Computer architecture[ M]. Beijing: Higher Education Press, 2000.
  • 10Collberg C,Nagra J. Surreptitious Software:Obfuscation, Watermarking, and Tamperproofing for Program Protection[M]. [S. l.]:Addison-Wesley Professional,2009.

共引文献14

同被引文献11

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部