Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

PE loader-based software packing protection method

A software and protected technology, applied in the field of software packing protection based on PE Loader, can solve the problems of illegal tampering, easy software, cracking, etc., and achieve the effect of increasing security, increasing difficulty, preventing disassembly and cracking and illegal tampering.

Inactive Publication Date: 2011-02-02
XIAN UNIV OF TECH
View PDF1 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a software packing protection method based on PE Loader, which solves the problem that the traditional packing protected software in the prior art is easy to be cracked and illegally tampered by attackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PE loader-based software packing protection method
  • PE loader-based software packing protection method
  • PE loader-based software packing protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0015] In the method of the present invention, the software to be protected by packing is first encrypted by AES, and the encrypted content is put into the Reloc segment in the shell template of the outer layer, and the encrypted key is obtained according to the code segment in the shell template The data is dynamically obtained through the SHA algorithm. If the reverse analyst debugs or modifies the code segment data of the shell template, the decryption of the program will fail and cannot be executed normally, thus effectively achieving the purpose of protecting the software.

[0016] The inventive method implements according to the following steps:

[0017] Step 1. Map the shell template to the memory, simulate the Windows PE loader to relocate the base address of the shell template, calculate the RVA (Relative Virtual Addresses) of the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a PE loader-based software packing protection method. The method comprises the following steps of: mapping a shell template into an internal memory, repositioning the base address of the shell template by simulating a PE loader of Windows and calculating a relative virtual address (RVA) of a segment where the entry point of the shell template is positioned and the size of the segment, wherein the calculated RVA value of the segment and the size value of the segment are taken as parameters and a hash value calculated by a secure hash algorithm (SHA) is taken as a key of an advanced encryption standard (AES) encryption algorithm; mapping protected software into the internal memory and encrypting the protected software by the AES encryption algorithm by using calculated key; adding encrypted data into a Reloc segment of the shell template; processing a special resource in the software to be protected and extracting additional data of the special resource, attaching the special resource and the additional data to the end of a shell template file respectively and modifying a corresponding data item related to the special resource in the PE structure of the shell template; and repeating the modified shell template from the internal memory to a disc so as to obtain protected software. The method remarkably enhances the safety of the software.

Description

technical field [0001] The invention belongs to the technical field of computer software program protection, aims at the problem of illegal tampering and cracking of software, and specifically relates to a software packing protection method based on PE Loader. Background technique [0002] Software protection is a link that cannot be ignored in software development. Since software development has to face the research of many reverse analysts, it is almost a necessary step to protect the software to add a protective shell to the released software. The existing packing protection technology generally points the entry point (Entry Point) of the executable file (here mainly refers to the PE file of the Win32 platform) to the shellcode of the shell, and compresses or encrypts the original executable file, and then compresses or encrypts the shellcode of the shell. The shellcode is added as a new segment of the target program. The shellcode is executed first during runtime, and is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/54
Inventor 孙钦东王倩马哲
Owner XIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products