Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for protecting software security

A software security, source file technology, applied in the computer field, can solve the problems of relying on the software and hardware environment, poor compatibility of anti-tracking technology, and difficulty in protecting software security, etc., to achieve the effect of improving security, increasing the workload and complexity of tracking

Inactive Publication Date: 2011-03-16
HITHINK ROYALFLUSH INFORMATION NETWORK CO LTD
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of the present invention is to provide a method and device for protecting software security, so as to solve the problem that the existing anti-tracking technology has poor compatibility and relies on software and hardware environments, which makes it difficult to protect software security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting software security
  • Method and device for protecting software security
  • Method and device for protecting software security

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0049] see figure 1 , which is the flow chart of the first embodiment of the method for protecting software security in this application:

[0050] Step 101: Compile the input source file to generate an intermediate file.

[0051] Among them, the intermediate files include: symbol table, control flow and assembly instructions.

[0052] Step 102: Preprocessing the intermediate file to obtain program information of the intermediate file, and generating an obfuscation policy.

[0053] Wherein, preprocessing the intermediate file includes: performing process analysis, data flow analysis and data dependency analysis on the intermediate file.

[0054] Wherein, the obfuscation strategy may be generated according to pre-set obfuscation parameters, and the obfuscation parameters may include obfuscation strength and obfuscation elasticity. Specifically, different obfuscation strengths and confusion resiliency are obtained according to needs, and the obtained obfuscation strength and c...

no. 2 example

[0060] see figure 2 , which is the flow chart of the second embodiment of the method for protecting software security in this application:

[0061] Step 201: Evaluate the obfuscation performance in advance to obtain an evaluation index, the evaluation index includes the intensity of the obfuscation processing, the flexibility of the obfuscation processing, and the overhead of the obfuscation processing.

[0062] The technique for obfuscating code is a special compilation technique that converts a source program P into an object program O(P). 0(P) has the same external behavior as P, but the code is more secure. The requirements for obfuscation can be described as:

[0063] Let T be a transformation from the source program P to the target program 0(P), if P and 0(P) have the same observable behavior, and satisfy the following two conditions: ①If P cannot terminate or terminates with an error state , then 0(P) may or may not be terminated; ②Otherwise, 0(P) must be terminated a...

no. 1 example

[0086] see image 3 , which is a block diagram of the first embodiment of the device for protecting software security in this application:

[0087] The device includes: a compilation unit 310 , a preprocessing unit 320 , a generation unit 330 , an obfuscation unit 340 , a connection unit 350 and an output unit 360 .

[0088] Wherein, the compiling unit 310 is configured to compile the input source file to generate an intermediate file;

[0089] A preprocessing unit 320, configured to preprocess the intermediate file to obtain program information of the intermediate file;

[0090] A generating unit 330, configured to generate an obfuscation strategy;

[0091] An obfuscation unit 340, configured to obfuscate the intermediate file according to the obfuscation policy;

[0092] A connection unit 350, configured to perform connection processing on the obfuscated intermediate files when the result of the obfuscation processing reaches a preset obfuscation evaluation index;

[009...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for protecting software security. The method comprises the following steps: compiling an input source file to generate an intermediate file; preprocessing the intermediate file to acquire the program information of the intermediate file, and generating a confusion policy; carrying out confusion processing on the intermediate file according to the confusion policy; and when the result of the confusion processing reaches the preset confusion evaluation index, carrying out connection processing on the intermediate file after confusion processing, and outputting an object file after connection processing. The embodiment of the invention carries out back tracking by a code confusion technology and confuses actual information by a large amount of useless information to increase the tracking workload and complexity of a tracker, thereby achieving the purpose that the code principle of the software to be protected can not be analyzed so that the security of the software is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for protecting software security. Background technique [0002] Hackers and Trojan horse virus writers will threaten the security of software by tracking and debugging software. Taking securities trading software as an example, by tracking and debugging securities software, it is possible to analyze the key data encryption process and software protection process, so as to create an upgraded malicious code program specifically for these encryption processes and confidentiality processes, and steal user passwords , and illegally intercept the user's transaction information, thus posing a great threat to the security of the securities trading software. Therefore, it is necessary to protect the security of the software through anti-trace technology. The existing common anti-trace technology flag register anti-single step debugging (Anti-Single Step), modify int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/22G06F21/12
Inventor 易峥张宇博于浩淼王进
Owner HITHINK ROYALFLUSH INFORMATION NETWORK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products