Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A binary software protection method using dynamic fine-grained code hiding and obfuscation technology

A software protection, fine-grained technology, applied in program/content distribution protection, instrumentation, computing, etc., can solve problems such as difficult to hide program control flow, large plaintext window, etc., to reduce size and duration, high protection strength, Wide range of effects

Active Publication Date: 2019-12-06
NAT UNIV OF DEFENSE TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still some shortcomings in the current mainstream methods. First, the plaintext window is relatively large. Whether it is self-modifying code technology or virtual machine protection technology, in order to improve execution efficiency, it is usually dynamically generated in units of functions or a whole piece of code, and it is easy for attackers to Obtain key information such as functions directly by tracking the plaintext window of the code; second, it is difficult to hide the control flow of the program. Since the plaintext window contains complete function information, reverse tools can easily obtain the plaintext machine code of the function, and analyze the function. External function calls, to obtain the call relationship between functions, so as to build the control flow graph of the entire program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A binary software protection method using dynamic fine-grained code hiding and obfuscation technology
  • A binary software protection method using dynamic fine-grained code hiding and obfuscation technology
  • A binary software protection method using dynamic fine-grained code hiding and obfuscation technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0036] The invention is mainly used for binary software protection technology against software reverse analysis, that is, binary software anti-analysis technology. The binary software protection method (Dynamically Fine-grained Code Hiding and Obfuscation, referred to as dynFCHO) adopting dynamic fine-grained code hiding and obfuscation technology of the present invention achieves Purpose of concealment and protection. like figure 1 Shown, in specific application examples, the detailed steps of the present invention are:

[0037] S1: Select a hidden target;

[0038] In the unit of basic block, select the code block to be hidden in the target program.

[0039] The selection method is explained as follows:

[0040] Obfuscation of binary files is based on correct disassembly. DynFCHO uses basic blocks as the smallest unit for code h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a binary software protection method adopting dynamic fine-grained code hiding and obfuscation technology, the steps of which are: S1: select a hidden target; select a code block to be hidden in a target program in units of basic blocks; S2: Hide the selected basic block; for each basic block to be hidden, replace the original piece of code with an allocator function call, and fill the remaining position with other confusing instructions; S3: repackage the code; create a new code section to save All additional logic and data. The invention has the advantages of wide application range, light weight, expandability, high security and the like.

Description

technical field [0001] The invention mainly relates to the technical field of computer system security and software protection, in particular to a binary software protection method using dynamic fine-grained code hiding and obfuscation technology. Background technique [0002] Anti-reverse cracking is one of the cores of software protection. With the increasing importance of intellectual property rights, software reverse protection technology has made great progress, from packing technology, static obfuscation protection technology, to dynamic obfuscation protection and virtual With computer protection technology, the difficulty of software cracking continues to increase. On the other hand, with the vigorous development of software, various debugging software and attack software are becoming more and more advanced and intelligent, providing a more convenient way for software cracking and attacking. [0003] There are three main types of attacks faced by software: software r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14G06F21/12
CPCG06F21/125G06F21/14G06F21/1066
Inventor 张怡吴蒙糜娴雅徐彬彬唐勇杨强解炜周旭
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products