摘要
近年来随着手游市场的高度发展,市面上诞生了很多手游模拟器,它们给使用者提供更好的体验,但是手游模拟器本身在软件安全层面的建设并不完善。针对现有的主流手游模拟器提出了两种克隆攻击的方法,一种是窃取存储在模拟器本地的用户凭证的方法,另一种是针对手游模拟器的克隆攻击方法。同时,针对所提出的攻击方法,给出基于侧信道方法检测硬件指纹的防御方案,并进行了实验验证。结果表明,即使细微的底层硬件差异也可以在应用层检测到不同的指纹信息,因而此类防御方法可以有效抵挡针对模拟器的克隆攻击。
Recent years,with the rapid development of the mobile game market,many mobile game emulators have been released.Compared with traditional mobile devices,the emulators could provide better experience.But the construction of mobile game emulators in terms of software security was not perfect.Two cloning attack methods were proposed for existing mainstream mobile game emulators.One was stealing user′s credentials stored locally in the emulator.The other was cloning attack to mobile game emulators.At the same time,for the proposed attacks,a defense scheme based on the side channel method was given to detect hardware fingerprints and conducts experimental verification.The experimental results showed that even slight differences in the underlying hardware could detect different fingerprint information at the application layer.So this kind of defense method could effectively resist the cloning attack against the emulator.
作者
韩哲昊
彭国军
HAN Zhehao;PENG Guojun(Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan University,Wuhan 430072,China;School of Cyber Science and Engineering,Wuhan University,Wuhan 430072,China)
出处
《郑州大学学报(理学版)》
CAS
北大核心
2024年第5期20-30,共11页
Journal of Zhengzhou University:Natural Science Edition
基金
国家自然科学基金项目(62172308,61972297,62172144)。