Verification method, device and system for virtual machine instruction

A virtual machine and instruction technology, applied in computer security devices, instruments, computing, etc., can solve problems such as inability to effectively prevent software piracy, inability to implement code block protection, etc., to solve integrity protection, improve protection accuracy, and improve security. Effect

Active Publication Date: 2017-07-18
ALIBABA GRP HLDG LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there are some shortcomings in the above-mentioned schemes. For example, for software watermarking technology, although identity verification and identification can be realized, it cannot effectively prevent software piracy. For example, although Microsoft still has copyrights to various pirated Windows systems, it still cannot prevent this Behavior; for software packing technology, all the logic of the protected software can be completely restored by unpacking and other methods; for the overall code self-verification technology, it can only be used for the integrity protection of the entire software, but not for code block level For example, crackers can intercept the core algorithm instruction sequence from the protected software, and realize software piracy without analyzing the logic of the software itself.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, device and system for virtual machine instruction
  • Verification method, device and system for virtual machine instruction
  • Verification method, device and system for virtual machine instruction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] According to an embodiment of the present application, a system for verifying virtual machine instructions is provided, and the system is used to implement a verification process for virtual machine instructions. figure 1 It is a structural block diagram of a verification system of a virtual machine instruction according to Embodiment 1 of the present application, such as figure 1 As shown, the system includes: a virtual machine interpretation engine 10 and a virtual machine protection compiler 12; wherein,

[0036] About the virtual machine protection compiler (VMP Compiler) 12:

[0037] A virtual machine protection compiler 12 is used to compile the program to be tested into a bytecode file;

[0038]Optionally, the virtual machine protection compiler 12 is also configured to determine the second check value in the following manner, so as to compare with the check value generated in real time during program execution: in the source bytecode file of the above-mentioned...

Embodiment 2

[0075] According to the embodiment of the present application, an embodiment of a method for verifying virtual machine instructions is also provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions , and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0076] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, Figure 7 It is a block diagram of the hardware structure of a computer terminal according to a verification method of a virtual machine instruction according to an embodiment of the present application. Such as Figure 7 As shown, the computer terminal 70 may ...

Embodiment 3

[0096] According to the embodiment of the present application, there is also provided a device for implementing the verification method of virtual machine instructions. It should be noted that the device can run on the computer terminal shown in Embodiment 2, but is not limited to The computer terminal in Embodiment 2, for example, may have more or fewer structural features than the computer terminal in Embodiment 2. Figure 9 It is a schematic structural diagram of an optional verification device for virtual machine instructions according to an embodiment of the present application. Such as Figure 9 As shown, the device includes the following modules:

[0097]The obtaining module 90 is used to obtain the intermediate instructions in the current bytecode file of the program to be tested when the program to be tested is executed, wherein the intermediate instructions are instructions between specified types of instructions that appear in pairs, and the above paired The instr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verification method, device and system for a virtual machine instruction. The method comprises the steps that when a to-be-tested program is executed, an intermediate instruction in a current byte code file of the to-be-tested program is acquired, wherein the intermediate instruction is located between type designated instructions appearing in a pair, and the type designated instructions appearing in a pair include a starting instruction used for instructing starting of verification of the intermediate instruction and an ending instruction used for instructing ending of verification of the intermediate instruction; the intermediate instruction is verified according to a preset algorithm to obtain a first verification value; and the first verification value is compared with a second verification value preset in the type designated instructions, and when the first verification value and the second verification value are the same, it is determined that the intermediate instruction passes verification, and the to-be-tested program continues to be executed.

Description

technical field [0001] The present invention relates to the field of software security, in particular to a method, device and system for verifying instructions of a virtual machine. Background technique [0002] With the rapid development of software industry, the security of software is becoming more and more important, how to ensure the integrity of software has become an important issue. At present, the schemes used to ensure the integrity of the code mainly include the following: digital watermarking technology, which achieves the purpose of identity authentication by embedding the identity information of the software owner into the target program; Tampering of the core logic; code overall self-verification technology, through the overall verification based on the file level at runtime, so as to discover file-based tampering. [0003] However, there are some shortcomings in the above-mentioned schemes. For example, for software watermarking technology, although identity...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/125
Inventor 马建坤
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products