期刊文献+

基于攻击威胁监控的软件保护方法

Software protection method based on monitoring attack threats
下载PDF
导出
摘要 为了增加软件逆向分析的难度,提高软件的安全性,提出了一种基于攻击威胁监控的软件保护方法。该方法通过在软件中部署威胁监控网,来实时检测并处理软件执行过程遇到的多种攻击威胁,确保软件处于一个相对安全的执行环境中,难以被逆向分析。对该保护方法的研究,主要分为以下三个方面:1)攻击威胁描述。分析软件面临的潜在攻击威胁,并按照〈威胁目的,实施方式,作用对象〉的表示方式对每种威胁进行描述。2)攻击威胁监控网部署。分析各种威胁的特点并设计对应的检测方法,生成节点库;根据节点自身特点,选取合理的部署方案,将节点安插到软件的不同位置。3)原型系统实现与实验设计。按照保护方案的思路实现原型系统,保护一组程序实例,对提出的方案从性能损耗和安全性影响两方面来评估,实验分析结果表明该保护方案是可行且有效的。 To increase the difficulty of software reverse analysis and improve software security, a software protection method based on monitoring attack threats was proposed. By deploying the threat-monitoring net, a variety of threats in software execution process could be real-time detected and resolved, so that the software is in a relatively safe environment and difficult to be reversely analyzed. There are three main research aspects in this protection scheme: 1 ) Attack threat description. The potential attack threats were analyzed and then they were described with a triple 〈 threat target, execution way, object 〉. 2) Deployment of threat-monitoring net. The node base was constructed after analyzing the feature of each threat and designing the corresponding detection methods. The reasonable deployment scheme based on characteristics of nodes was selected, and these nodes were deployed effectively into different places of software. 3) Prototype system implementation and experimental design. According to the idea of this protection scheme, a prototype system was implemented, and a group of test cases was protected with the system to collect the experimental data. The evaluation on the aspects of performance consumption arid security was made. The final result shows the proposed method is feasible and effective to protect software.
出处 《计算机应用》 CSCD 北大核心 2017年第1期120-127,共8页 journal of Computer Applications
基金 国家自然科学基金资助项目(61373177 61572402) 陕西省国际合作项目(2015KW-003 2016KW-034) 陕西省教育厅产业化培育项目(2013JC07) 陕西省教育厅自然科学基金资助项目(15JK1734) 西北大学自然科学基金资助项目(14NW28)~~
关键词 白盒攻击环境 软件逆向分析 攻击威胁描述 节点库 威胁监控网 white-box attack context software reverse analysis description of attack thereat node base threat- monitoring net
  • 相关文献

参考文献4

二级参考文献46

  • 1莫翾晟,林和,蔡万景,刘芳,李永礼.基于RSA算法与自修改机制的软件保护[J].计算机研究与发展,2006,43(z2):140-144. 被引量:3
  • 2程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 3曹爱娟,刘宝旭,许榕生.网络陷阱与诱捕防御技术综述[J].计算机工程,2004,30(9):1-3. 被引量:27
  • 4沈海波,史毓达.计算机软件的防篡改技术[J].现代计算机,2005,11(2):45-48. 被引量:4
  • 5孙玉霞,陈火炎.UNIX主机文件完整性校验工具的原理与实现[J].计算机应用与软件,2006,23(6):119-120. 被引量:3
  • 6CERVEN P. Crackproof your software: protect your software against crackers [ M]. San Francisco: No Starch, 2002.
  • 7JIN H X, LOTPIECH J. Proactive software tampering detection [ C]// Proceedings of the 6th International Conference on Informa- tion Security. Berlin: Springer, 2003:352-365.
  • 8WANG C X, HILL J, KNIGHT J. Software tamper resistance: ob- structing static analysis of programs, CS-2000-12 [ R]. Charlottes- ville: University of Virginia, 2000.
  • 9CHANG H, ATALLAH M J. Protecting software code by guards [ C]//Proceedings of the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management. Berlin: Springer-Verlag, 2002:160 - 175.
  • 10YUNG M. How to guard the guards themselves [ C]//FCT'09: Pro- ceedings of the 17th International Conference on Fundamentals of Computation Theory. Berlin: Springer-Verlag, 2009:1-2.

共引文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部