期刊文献+

基于三位一体协同的虚拟机隔离保护方案

Virtual Machine Isolation Protection Scheme Based on Trinity Collaboration
下载PDF
导出
摘要 针对基于虚拟机(virtual machine, VM)保护框架的代码隔离技术中所存在的单一隔离环境安全问题,提出一种三位一体协同虚拟机保护方案。基于Mealy自动机对核心代码和关键数据进行混淆转换,采用虚拟机框架进行保护,将关键数据和核心代码迁移至第三方安全环境,最后结合篡改恢复和自毁技术构建本地软硬件和远程云端三位一体协同保护方案,构建了模拟系统,并基于测试保护程序验证了该保护方案的有效性和可行性。 To address the security problem of single isolated environment in code isolation technology based on virtual machine(VM) protection framework, a trinity collaborative VM protection scheme was proposed. Firstly, the core code and critical data were obfuscated and transformed based on Mealy automata, and the virtual machine framework was used for protection. After that, the key data and core code were migrated to the third-party environment, and the tamper recovery and self-destruction techniques were combined to build the three-in-one collaborative protection scheme based on local hardware, software and remote cloud. Finally a simulation system was built to verify the effectiveness and feasibility of the protection scheme based on the test programs.
作者 谢鑫 梁卫芳 张钰莎 XIE Xin;LIANG Weifang;ZHANG Yusha(School of Computer Science and Engineering,Hunan Institute of Information Technology,Changsha 410151,China)
出处 《贵州大学学报(自然科学版)》 2023年第1期62-69,共8页 Journal of Guizhou University:Natural Sciences
基金 湖南省教育厅科学研究重点资助项目(18A512) 湖南省自然科学基金资助项目(2019JJ50413,2020JJ5397)。
关键词 虚拟机保护 代码隔离 三位一体协同 Mealy机混淆 virtual machine protection code isolation trinity collaboration mealy machine obfuscation
  • 相关文献

参考文献16

二级参考文献86

  • 1王海平,曹林,孙国梓,陈丹伟.随机花指令加密算法研究[J].计算机应用,2006,26(2):338-340. 被引量:5
  • 2李勇,左志宏.目标代码混淆技术综述[J].计算机技术与发展,2007,17(4):125-127. 被引量:10
  • 3Ghodke N, Figueiredo R. On the implications of machine virtualization for DRM and fair use: a case study of a virtual audio device driver[C]. Proceedings of DRM'04, ACM, 2004.
  • 4Collberg C, Thomborson C, Low D. A taxonomy of obfuscating transformations[R]. Technical Report 148, Department of Computer Science, University of Auckland, 1997.
  • 5Michael N G, Stephen T, Anup K G. Software protection through anti-debugging[ J]. IEEE Security and Privacy, 2007,5:82-84.
  • 6Collberg C, Sahoo T. Software watermarking in the frequency domain: implementation, analysis, and attacks[J]. Journal of Computer Security, 2005, 13(5) : 721-755.
  • 7Jozwiak I J, Liber A, Marczak K. A hardware-based software protection systems - analysis of security dongles[ C]. Proceedings of the 12th IEEE International Conference on Methods and Models in Automation and Robotics, 2006, 3-15.
  • 8Blunden B. Virtual machine design and implementation in C/C + + EM]. Wordwarc Publ. Plane, Texas, USA.
  • 9Mondcn A, Monsifrot A, Thomborson C. A framework for obfuscated interpretation[ C]. Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, 2004.
  • 10Zhang Chen-xi, et al. Computer architecture[ M]. Beijing: Higher Education Press, 2000.

共引文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部