Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtualization software protecting method having data stream confusion function

A technology of virtualization software and data flow, applied in the field of computer security, can solve problems such as inability to resist reverse analysis well, achieve the effect of increasing the difficulty of semantic analysis and wide applicability

Active Publication Date: 2016-11-09
NORTHWEST UNIV(CN)
View PDF5 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The various hardening methods mentioned above cannot well resist semantic-based reverse analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtualization software protecting method having data stream confusion function
  • Virtualization software protecting method having data stream confusion function
  • Virtualization software protecting method having data stream confusion function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention proposes a virtualization software protection method with data flow confusion, comprising the following steps:

[0038] Step 1, verify whether the file to be protected loaded is a PE file, if so, proceed to the next step; PE file in the present invention refers to the mainstream executable file format on the windows platform, such as: .exe file.dll file etc.

[0039] Step 2, specify the key code segment that needs to be protected on the source code segment of the file to be protected, and disassemble the key code segment to obtain the x86 instruction set of the key code segment;

[0040] The key code segment refers to the key code that needs to be protected specified by the user on the source code. The SDK start tag is embedded at the beginning of the key code segment, and the SDK end tag is embedded at the end. SDK is DFO-VMP (A Virtual Software Protection Method with Data Flow Obfuscation) defines a set of start and end markers. After the PE fil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtualization software protecting method having a data stream confusion function. The method comprises a step 1 of performing PE file detection; a step 2 of positioning a key code segment; a step 3 of converting a local x86 instruction into a virtual instruction; a step 4 of encoding the virtual instruction to generate a corresponding byte code instruction; a step 5 of performing double process design on a scheduling structure of a virtual machine; a step 6 of performing data stream confusion on a Handler in the virtual machine; a step 7 of concealing original predicate information in a program and adding new predicate information to form a false execution stream branch; and a step of reconstructing a target file. According to the method, a computer system is utilized to perform virtualization protection on an executable binary code file under a windows system, and the method is high in protection strength and has easiness in expansion.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a virtualization software protection method with data flow confusion. Background technique [0002] With the development of information science and technology, various software of computers and mobile terminals have become an indispensable part of people's daily life. Software generally refers to programs that run on computers. It is the crystallization of the wisdom of software developers, and its development process consumes a lot of manpower and financial resources. However, once the software is released, it will be threatened by various threats. Attackers steal the core algorithms and confidential information in the software through code reverse, tampering and other means, and then gain unfair advantages in product competition. And software developers have brought serious losses, seriously endangering the healthy development of the software industry. [0003] Curr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 房鼎益张恒汤战勇周祥陈晓江龚晓庆刘方圆张洁叶贵鑫陈锋
Owner NORTHWEST UNIV(CN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products