Protecting method for packing executable program

A technology for executing programs and shell programs, applied in program/content distribution protection, platform integrity maintenance, instruments, etc., can solve the problems of easy software, cracking, illegal tampering, etc., to prevent disassembly cracking and illegal tampering, and increase security. sexual effect

Active Publication Date: 2012-07-25
FEITIAN TECHNOLOGIES
View PDF4 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an executable program packing protection method, which solves the problem that the traditional packing protected software in the prior art is easy to be cracked and illegally tampered with by attackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protecting method for packing executable program
  • Protecting method for packing executable program
  • Protecting method for packing executable program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment describes in detail the process of encrypting the acquired target file with reference to the accompanying drawings. The following takes the implementation method based on the Mac.OS platform as an example to describe the packing protection method proposed by the present invention in detail. The files mentioned in this embodiment appear with common file names in the Apple system.

[0032] When the acquired target file is a Flat format file, the liposuction program lipo is first run to separate the target file, and then the separated i386 or x64 file is encrypted.

[0033] The process of running lipo to separate the Flat file is specifically, judging the file type according to the file header of the Flat file, and separating the file to be separated from the specified position according to the structural information of the file to be separated contained in the Flat file header .

[0034] Specifically, the file header of the Flat file is defined as follows...

Embodiment 2

[0105] The process of executing the above shell target file includes the following steps:

[0106] Step 201: Load the shell object file into the memory, traverse the shell object file to obtain the program entry point;

[0107] Specifically, traverse the file header of the shell object file, find the thread state command LC_UNIXTHREAD, and obtain the entry address of the program entry point.

[0108] Step 202: Jump to the program entry point, execute the shell program;

[0109] Executing the shell program specifically includes obtaining a second key from the code segment of the shell program, and using the second key to decrypt the second encrypted shell program in the shell program to obtain a new first encrypted target Executable program file, releasing other contents of the code segment of the shell program; scanning the executable code segment of the target executable program file after the new encryption for the first time, and copying all command segments to the specified...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a protecting method for packing an executable program, belonging to the technical field of computer software program protection, wherein the method comprises the following steps: firstly, adding a shell target file with fixed patches to the tail part of an executable program file so as to form a target executable program file; modifying a file head correspondingly; processing a first encryption to an executed code section; adding a key equipment drive program module to the tail part of the file which is encrypted at the first time so as to form a new target executable program file which is encrypted at the first time; constructing a shell program; processing a secondary encryption to the new target executable program file of the shell program which is encrypted at the first time; modifying the file head correspondingly; and completing a packing procedure, and storing the current shell program. According to the invention, the problems that packing-protected software is cracked by an attacker easily and distorted illegally in the prior art are effectively solved.

Description

technical field [0001] The invention belongs to the technical field of computer software program protection, and in particular relates to a software protection method for packing executable programs. Background technique [0002] Software protection is a link that cannot be ignored in software development. Since software development has to face the research of many reverse analysts, it is almost a necessary step to protect the software to add a protective shell to the released software. [0003] Computer software products are special knowledge-intensive products, and the development of a software product requires a lot of manpower and material resources, and the cost is very high. However, the copying of software products is quite easy, which has led to the proliferation of illegal copying and pirated software. In this situation, in order to protect their interests from infringement, software developers and sellers must use technical means to protect their products from inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/12G06F21/54
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products