Methods, devices and systems that prevent ELF programs from reverse analysis
A reverse analysis and program technology, applied in the field of information security, can solve problems such as insecurity, injury, and danger, and achieve the effect of high security, guaranteed strength, and resistance to supply chain attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] like image 3 As shown, an embodiment of the present invention provides a method for preventing an ELF program from being reversely analyzed, including the following steps:
[0060] (1) After the ELF program is compiled and generated, use its own information to generate a cascade key after transformation; use the cascade key to encrypt the key header and information of the ELF program to form an encrypted ELF program;
[0061] (2) When the encrypted ELF program is executed, it is loaded, decrypted and executed by the kernel
[0062] Described step (1) specifically comprises the following steps:
[0063] 1.1 Modify the file identification of the ELF program, and change the original '\177ELF' to '\177ENC', so that the kernel can perform different loading processing according to this mark during decryption processing, which is compatible with the original normal ELF file format.
[0064] 1.2 Using the ELF program file header information as input, after processing and tr...
Embodiment 2
[0078] An embodiment of the present invention provides a device for preventing an ELF program from being reversely analyzed, including:
[0079] The encryption module is used to generate a cascade key after the ELF program is compiled and generated by using its own information and after transformation; using the cascade key to encrypt the key header and information of the ELF program to form an encrypted the ELF program;
[0080] The decryption module is used to load, decrypt and execute the encrypted ELF program through the kernel when the encrypted ELF program is executed.
[0081] Optionally, the method for forming the encrypted ELF program comprises the following steps:
[0082] Modify the file identification of the ELF program for differential loading processing, compatible with the original normal ELF file format;
[0083] Using the ELF program file header information as input, after processing and transforming, a set of strings is obtained as the key key1 for subseque...
Embodiment 3
[0096] An embodiment of the present invention provides a system for preventing an ELF program from being reversely analyzed, including a storage medium and a processor;
[0097] the storage medium is used for storing instructions;
[0098] The processor is configured to operate in accordance with the instructions to perform the steps of the method according to any of Embodiment 1.
[0099] As will be appreciated by those skilled in the art, the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program cod...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com