期刊文献+

Handler混淆增强的虚拟机保护方法 被引量:9

Virtual machine protection based on Handler obfuscation enhancement
下载PDF
导出
摘要 按照一定顺序执行虚拟指令处理函数(Handler)可完成程序关键代码的保护,其为软件逆向分析者攻击的重点对象。针对"动态提取,静态分析"的Handler攻击方法,提出一种基于Handler混淆增强的虚拟机保护方法。运用等价指令替换规则生成多种等价Handler序列,对所有Handler进行变长切分和随机乱序,通过构建跳转表对乱序序列进行重组,构建随机地址数组对Handler调度地址表和执行跳转表进行隐藏。实验和分析表明:多样化Handler生成、切分和乱序增加了动态提取和分析的难度,Handler地址表和跳转表的隐藏增加了抵御静态逆向分析的难度,从而提升了虚拟机保护强度。 The combination of Handlers in virtual machine can protect key codes in the program, and these Handlers arethe main target for software reverse analysts to attack. Aiming at the reduction method for dynamic extraction and staticanalysis of Handlers, virtual machine protection method based on Handler obfuscation is proposed. Firstly, various equivalentinstruction rules are used to generate different equivalence Handlers, and then all Handlers are divided and disorderedby random scrambling algorithm, and they are restructured by constructing jump table, finally random address array isused to hide the data of Handler scheduling address table and execution jump table. Experiments and analysis show thatthe generation, segmentation and disorder of diverse Handlers increase the difficulty of dynamic extraction and analysis,the Handler address table and a jump table hidden enhances the difficulty of static reverse analysis.
作者 谢鑫 刘粉林 芦斌 向飞 XIE Xin;LIU Fenlin;LU Bin;XIANG Fei(Information Engineering University, Zhengzhou 450001, China;State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China)
出处 《计算机工程与应用》 CSCD 北大核心 2016年第15期146-152,共7页 Computer Engineering and Applications
基金 国家自然科学基金(No.61379151 No.61274189 No.61302159 No.61401512) 河南省杰出青年基金(No.14410051001)
关键词 虚拟机保护 等价指令替换 切分乱序 多样化 表隐藏 virtual machine protection equivalent instruction replacement segmentation disorder diversity table hidden
  • 相关文献

参考文献1

二级参考文献8

  • 1Ghodke N, Figueiredo R. On the implications of machine virtualization for DRM and fair use: a case study of a virtual audio device driver[C]. Proceedings of DRM'04, ACM, 2004.
  • 2Collberg C, Thomborson C, Low D. A taxonomy of obfuscating transformations[R]. Technical Report 148, Department of Computer Science, University of Auckland, 1997.
  • 3Michael N G, Stephen T, Anup K G. Software protection through anti-debugging[ J]. IEEE Security and Privacy, 2007,5:82-84.
  • 4Collberg C, Sahoo T. Software watermarking in the frequency domain: implementation, analysis, and attacks[J]. Journal of Computer Security, 2005, 13(5) : 721-755.
  • 5Jozwiak I J, Liber A, Marczak K. A hardware-based software protection systems - analysis of security dongles[ C]. Proceedings of the 12th IEEE International Conference on Methods and Models in Automation and Robotics, 2006, 3-15.
  • 6Blunden B. Virtual machine design and implementation in C/C + + EM]. Wordwarc Publ. Plane, Texas, USA.
  • 7Mondcn A, Monsifrot A, Thomborson C. A framework for obfuscated interpretation[ C]. Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, 2004.
  • 8Zhang Chen-xi, et al. Computer architecture[ M]. Beijing: Higher Education Press, 2000.

共引文献12

同被引文献32

引证文献9

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部