期刊文献+

融合加密与水印的移动终端代码防篡改研究 被引量:1

Research on Anti Tampering of Mobile Terminal Code Combining encryption and Watermark
下载PDF
导出
摘要 针对不法分子通过篡改移动终端设备代码获取利益的问题,提出了一种融合加密与水印的移动终端代码防篡改方法。对移动终端代码遭受篡改的原因、代码篡改攻击技术,以及风险评估方面分别进行分析,作为加密与水印算法的设计依据。修改AES算法中的轮边界,对其进行拆分和补充,将密钥信息藏于查找表中,并对乱码进行混淆处理,从而增强密钥信息的保护效果。通过代码的加密和自解密机制,将代码转换成不可阅读的密钥代码,采用自检技术检验代码是否被篡改,将加密算法与混沌序列相结合,利用不敏感段的代码哈希值,对敏感代码段进行保护,防止攻击者对移动终端代码的恶意篡改。实验结果表明,采用融合加密与水印算法处理后的程序与原始程序相似度很高,隐蔽性很好,攻击者很难对程序代码进行有效的篡改攻击。 Aiming at the problem that criminals obtain profits by tampering with the code of mobile terminal equipment, a tamper-proof method of mobile terminal code combining encryption and watermarking was proposed. The reasons for the tampering of the mobile terminal code, the tampering attack technology and the risk assessment are analyzed respectively, which serve as the design basis of the encryption and watermarking algorithms. We modified the wheel boundary in the algorithm, splitted and supplemented it, then hid the key information in the look-up table, and confused the garbled code, so as to enhance the protection effect of key information. Through the encryption and self decryption mechanism of the code, the code was converted into an unreadable key code, the self-test technology was used to check whether the code was tampered, the encryption algorithm was combined with the chaotic sequence, and the code hash value of the insensitive section was used to protect the sensitive code section, so as to prevent the attacker from malicious tampering with the mobile terminal code. The experimental results show that the program processed by the fusion encryption and watermarking algorithm has high similarity with the original program and good concealment. It is difficult for the attacker to tamper with the program code effectively.
作者 潘红改 程学军 王建平 PAN Hong-gai;CHENG Xue-jun;WANG Jian-ping(Henan University of Technology,Luohe Institute of Technology,Luohe Henan 462000,China;School of Information Engineering,Henan Institute of Science and Technology,Xinxiang Heman 453003,China)
出处 《计算机仿真》 北大核心 2022年第1期186-189,199,共5页 Computer Simulation
基金 河南省科技攻关计划项目(212102210422) 河南省高等学校重点科研项目(20A520002) 河南省高等学校青年骨干教师培养计划项目(2019GGJS172)。
关键词 移动终端软件 加密算法 水印算法 篡改攻击 Mobile terminal software Encryption algorithm Watermarking algorithm Tamper with the attack
  • 相关文献

参考文献3

二级参考文献25

  • 1ONE A. Smashing the stack for fun and profit[ J]. Phrack, 1996, 7 (49): 14-15.
  • 2ABADI M, BUDIU M, ERLINGSSON U . Control - flow integrity principles, implementations, and applications[ .1]. ACM Transac- tions on Information and System Security, 2009, 13(1) : 1 -40.
  • 3CASTRO M, COSTA M, HARRIS T. Securing software by enforcing data-flow integrity[ C]//Proceedings of the 7th Symposium on Oper- ating Systems Design and Implementation. Washington, DC: USE- NIX Association, 2006:147-160.
  • 4FORREST S. A sense of self for UNIX processes[ C]//Proceedings of the 1996 IEEE Symposium Security and Privacy. Piscataway, NJ: IEEE Press, 1996:120 - 128.
  • 5HOFMEYR S A, FORREST S, SOMAYAJI A. Intrusion detection using sequences of system calls[ J]. Journal of Computer Security, 199g, 6(3): 151-160.
  • 6SEKAR R, BENDRE M, BOLLINENI P, et al. A fast automaton- based method for detecting anomalous program behaviors[ C]//Pro- ceedings of the 2001 IEEE Symposium on Security and Privacy. Pis- caraway, NJ: IEEE Press, 2001:144-155.
  • 7MAGGI F, MATYEUCCI M, ZANERO S. Detecting intrusions through system call sequence and argument analysis [ J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(4): 381 - 395.
  • 8BLIETZ B, TYAGI A. Software tamper resistance through dynamic program monitoring[ C]// SAFAVI-NAINI R, YUNG M. Digital Rights Management: Technologies, Issues, Challenges and Sys- tems. Berlin: Springer, 2006:146-163.
  • 9KINDER J, VEITH H, ZULEGER F. An abstract interpretation- based framework for control flow reconstruction from binaries[ C]// Proceedings of the 10th International Conference on Verification, Model Checking, and Abstract Interpretation. Berlin: Springer, 2009:214-228.
  • 10XU L, SUN F Q, SU Z D. Constructing precise control flow graphs from binaries[ R]. Davis: University of Computer Science, 2009.

共引文献7

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部