Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Tamper-proof response scheme of Java program

An anti-tampering and program technology, which is applied in program/content distribution protection, instruments, electrical digital data processing, etc., can solve problems such as difficult positioning and hindering the effectiveness of response schemes, and achieve the effects of easy implementation, reduced performance, and low consumption

Inactive Publication Date: 2010-10-27
李嘉 +1
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

2. The response code is hidden, the statement that makes the pointer empty is a simple assignment statement, which is not easy to be located
3. The program crash is predictable, that is, after the program is detected to be tampered with, the pointer is set to empty, and the program must be abnormal
At the same time, the response mechanism also has limitations:
This programming rule will prevent the above response scheme from taking effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tamper-proof response scheme of Java program
  • Tamper-proof response scheme of Java program
  • Tamper-proof response scheme of Java program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] in Figure 4 In the Control Flow Analysis module, the user selects the Java program path, that is, enters the path name of a Jar package; selects the folder where the program corresponds to the control flow graph information, and the control flow graph information corresponding to all methods of a class file is stored in a file in. The module analyzes each class file in turn according to the input Jar package: creates a corresponding file storing control flow graph information according to the class file name, the format of the file is *.CIF (abbreviation of control flow graphinformation file); calculates control flow Figure and save its information to the corresponding CIF file, which records the path name of the corresponding class file.

[0047] in Figure 4 In the Data FlowAnalysis module, the user selects the path name of the folder where the control flow graph information is stored. The module parses each *.CIF file in the selected folder in turn: obtains the contro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a software protection technique of a Java program, which belongs to a software tamper-proof branch in the technical field of software protection. In the technical scheme, an unconditional jump command is added to a byte code file which corresponds to the Java program after that the Java program is tampered is detected to modify a programmed control flow graph, and the unconditional jump command is used as response to disturb the normal running of the program and effectively resist the tampering behaviour of an attacker. The method is a self-response type and can influence the executing track of the program in three ways: interrupting the program in advance, lowering the performance of the program and leading the program to generate an error result. Implementing the scheme needs low consumption, and the self characteristic of the format of the Java program are utilized to control Java byte codes; and the added response codes have similarity with the Java byte codes. The scheme has high privacy.

Description

Technical field [0001] This solution is applied in the field of software security, and a method of tampering response of Java programs is proposed to protect the integrity of Java programs. Background technique [0002] With the vigorous development of the computer software industry, software security problems have become increasingly serious. The attacker embeds malicious code into the software code or modifies and deletes part of the code to achieve his own purpose, such as disrupting program functions and bypassing some functions for profit. As one of the ways to protect software, software anti-tampering technology prevents the program code from being illegally modified. According to the main body that realizes anti-tampering function, software anti-tampering technology can be divided into two categories: [0003] ·External: The anti-tampering of the software is realized by using means other than the software itself. The realization of this technology does not require the pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/22G06F21/12G06F21/55
Inventor 李嘉申晓东
Owner 李嘉
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products