期刊文献+

基于虚拟机代码隔离的软件保护技术研究 被引量:5

Software Protection Based on Virtual Machine Code Isolation
下载PDF
导出
摘要 软件逆向分析是软件安全威胁的重要原因.为增强软件抗逆向分析能力,提出了一种基于虚拟机代码隔离的软件保护方法.该方法将虚拟机技术和代码隔离方法相结合,从软件中提取关键数据或关键代码,设计虚拟机指令集、编译器和解释器,将关键代码转换为自定义的虚拟指令重写入软件,或转换后通过代码隔离的方法写入加密锁,设计关键代码调用算法防止动态调试.将该方法用于部分项目软件,结果证明其可以有效保证软件安全. Software reverse analysis is an important reason of software security threats.In order to make software safer,a software protection method based on virtual machine code isolation is proposed.Combining virtual machine technology with code isolation,the virtual machine instruction set,compiler and interpreter are designed.It extracts the key data or codes,and then converts the key codes to customized virtual instructions for rewriting software or writing to encryption lock through code isolation.Moreover,it designs key codes algorithm to prevent dynamic debugging.The method is used for some software projects,and the results prove that it is effective.
作者 余祥 周元璞 李强 YU Xiang;ZHOU Yuan-Pu;LI Qiang(Department of Network Engineering,Electronic Engineering Institute,Hefei Anhui 230037,China)
出处 《指挥与控制学报》 2018年第1期83-88,共6页 Journal of Command and Control
基金 技术基础条件建设项目(72161002) 电子工程学院科研基金项目(KY161002)资助~~
关键词 软件保护 虚拟机 代码隔离 加密锁 software protection virtual machine code isolation encryption lock
  • 相关文献

参考文献4

二级参考文献23

  • 1Del Grosso C, Antoniol G, et al.. Detecting buffer overflow via automatic test input data generation [J]. Computers & Operations Research, 2008, 35(10): 3125-3143.
  • 2Wang Tie-lei, Wei Tao, Zou Wei, et al.. TaintScope: a checksum-aware directed fuzzing tool for automatic software vulnerability detection [C]. 31st IEEE Symposium on Security and Privacy, Oakland, 2010: 497-512.
  • 3McCabe T J. A complexity measure [J]. IEEE Transactions on Software Engineering, 1976, SE-2(4): 308-320.
  • 4Dominguez-Jimenez J J, Estero-Botaro A, Garcia- Dominguez A, et al.. Evolutionary mutation testing[J]. Information and Software Technolo9y, 2011, 53(10):1108-1123.
  • 5KING J C. A new approach to program testing[C]. Proceedings of the International Conference on Reliable software, New York: ACM, 1975: 228-233.
  • 6崔宝江 梁晓兵 王建新.基于整数遗传算法的整数溢出漏洞检测技术研究.清华大学学报,2010,.
  • 7Gupta N, Mathur A P, and Sofia M L. Automated test data generation using an iterative relaxation method[J]. ACM SIGSOFT Software Engineering Notes, 1998, 23(6): 231-244.
  • 8Miller W and Spooner D L. Automatic generation of floating-point test data[J]. IEEE Transactions on Software Engineering, 1976, SE-2(3): 223-226.
  • 9Korel B. Automated software test data generation[J]. IEEE Transactions on Software Engineering, 1990, 16(8): 870-879.
  • 10http://www.hex-rays.com/idapro/, 2011, 7.

共引文献17

同被引文献35

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部