期刊文献+

一种基于增强型调度器的虚拟机软件保护方法 被引量:3

A VIRTUAL MACHINE SOFTWARE PROTECTION METHOD BASED ON ENHANCED DISPATCHER
下载PDF
导出
摘要 考虑到现有虚拟机的软件保护方法一般是通过改进虚拟指令处理函数(Handler)来提升保护强度,而调度器(Dispatcher)是除了Handler之外构成虚拟机保护框架的重要模块,为逆向分析者的重点攻击目标。针对Dispatcher模块易受静动态逆向攻击的问题,提出一种基于增强型Dispatcher的虚拟机软件保护方法。对Dispatcher模块中的指令序列进行多样化,切分所有指令序列。随机选择不同的指令片段进行控制流迭代混淆和加密。采用随机函数对指令片段进行连接,形成新的Dispatcher模块。实验表明,该方法在给受保护程序引入部分时间和空间开销下,能有效提升整体虚拟机保护框架的安全性。 The existing software protection method for virtual machine enhances protection strength by improving the virtual instruction handler.Dispatcher is an important module in the virtual machine protection framework besides Handler,which is the key attack target for reverse analysts.Aiming at the problem that dispatcher module was vulnerable to static and dynamic reverse attacks,we proposed a software protection method for virtual machine based on enhanced dispatcher.The method diversified instruction sequences in dispatcher module.All the instruction sequences were segmented and different instruction segments were randomly selected for control flow iterative confusion and encryption.Random functions were adopted to connect the instruction segments to form a new dispatcher module.The experiment shows that the proposed method can effectively improve the security of the overall virtual machine protection framework by introducing some time and space overhead to the protected program.
作者 谢鑫 向飞 Xie Xin;Xiang Fei(Hunan Institute of Information Technology,Changsha 410151,Hunan,China;Information Engineering University,Zhengzhou 450000,Henan,China)
出处 《计算机应用与软件》 北大核心 2018年第11期8-15,48,共9页 Computer Applications and Software
基金 国家重点研发项目(2016YFB0801303 2016QY01W0105) 河南省重点技术研发项目(162102210032) 河南省科学技术研究重点项目(152102210005)
关键词 调度器 虚拟机保护 多样化 控制流迭代混淆 加解密 Dispatcher Virtual machine protection Diversification Control flow iteration confusion Encryption and decryption
  • 相关文献

参考文献12

二级参考文献138

  • 1王海平,曹林,孙国梓,陈丹伟.随机花指令加密算法研究[J].计算机应用,2006,26(2):338-340. 被引量:5
  • 2Ghodke N, Figueiredo R. On the implications of machine virtualization for DRM and fair use: a case study of a virtual audio device driver[C]. Proceedings of DRM'04, ACM, 2004.
  • 3Collberg C, Thomborson C, Low D. A taxonomy of obfuscating transformations[R]. Technical Report 148, Department of Computer Science, University of Auckland, 1997.
  • 4Michael N G, Stephen T, Anup K G. Software protection through anti-debugging[ J]. IEEE Security and Privacy, 2007,5:82-84.
  • 5Collberg C, Sahoo T. Software watermarking in the frequency domain: implementation, analysis, and attacks[J]. Journal of Computer Security, 2005, 13(5) : 721-755.
  • 6Jozwiak I J, Liber A, Marczak K. A hardware-based software protection systems - analysis of security dongles[ C]. Proceedings of the 12th IEEE International Conference on Methods and Models in Automation and Robotics, 2006, 3-15.
  • 7Blunden B. Virtual machine design and implementation in C/C + + EM]. Wordwarc Publ. Plane, Texas, USA.
  • 8Mondcn A, Monsifrot A, Thomborson C. A framework for obfuscated interpretation[ C]. Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, 2004.
  • 9Zhang Chen-xi, et al. Computer architecture[ M]. Beijing: Higher Education Press, 2000.
  • 10卿斯汉.恶意代码机理[Z].北京:北京大学软件学院,2004..

共引文献36

同被引文献19

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部