Software shelling method based on software protection device, software shelling system and software protection method

A software protection device and software protection technology, applied in the fields of software packing, system and software protection, can solve the problems of easy cracking of the protected software, and achieve the effect of increasing the protection strength

Active Publication Date: 2013-02-13
BEIJING SENSESHIELD TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] An object of the present invention is to provide a software packing method based on a software protection device to solve the problem of jumping to the protected software after executing the shell code when the protected software processed by the packing method in the prior art is running. The problem that the protected software is easy to crack because all the code and data of the protected software are exposed in memory after the original entry point

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software shelling method based on software protection device, software shelling system and software protection method
  • Software shelling method based on software protection device, software shelling system and software protection method
  • Software shelling method based on software protection device, software shelling system and software protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] Such as figure 1 and figure 2 As shown, the software packing method based on the software protection device in Embodiment 1 includes the following steps:

[0055] S1: Find the target code segment C in all code segments A of the protected software;

[0056] Since the target code segment C will be replaced with a section of other codes in the subsequent steps, the target code segment C will meet the following requirements: the protected software cannot jump to the inside of the target code segment C outside the target code segment C ( i.e. somewhere in the middle);

[0057] Since the target code segment C is to be extracted into the software protection device E, the target code segment C can only be executed from the first instruction. Therefore, in all the code segments A of the protected software, except for the target code segment C, no There are other codes that can jump directly to the middle of the target code section C. Limited to this condition, using the ent...

Embodiment 2

[0073] Such as Figure 4 As shown, the software packing method based on the software protection device of the second embodiment includes the following steps:

[0074] S1: Find the target code segment C in all code segments A of the protected software;

[0075] S2: Extract the target code segment C into the dongle E for storage;

[0076] S311: In all code segments A of the protected software, replace the target code segment C with a code segment D for extracting the target code segment C from the software protection device E and restoring it to the original position;

[0077] S312: Inject shell code B into the protected software;

[0078] S313: Encrypt or compress all code segments A of the protected software.

[0079] It can be seen that the difference between the software packing method in Embodiment 2 and the software packing method in Embodiment 1 is that the execution order of the third and fourth steps is swapped.

[0080] The steps during the operation of the softwar...

Embodiment 3

[0085] Such as Figure 5 and Figure 6 As shown, the software packing method based on the software protection device of the third embodiment includes the following steps:

[0086] S1: Find the target code segment C in all code segments A of the protected software;

[0087] Since the target code segment C will be replaced with a section of other codes in the subsequent steps, the target code segment C will meet the following requirements: the protected software cannot jump to the inside of the target code segment C outside the target code segment C ( i.e. somewhere in the middle);

[0088] Since the target code segment C is to be extracted into the software protection device E, the target code segment C can only be executed from the first instruction. Therefore, in all the code segments A of the protected software, except for the target code segment C, no There are other codes that can jump directly to the middle of the target code section C. Limited to this condition, usin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software shelling method based on a software protection device, and the software shelling method comprises the following steps of S1 searching a target code segment in all code segments of protected software; S2, extracting the target code segment to be stored in the software protection device; and S3, replacing the target code segment with a code segment comprising a jump instruction or extracting the target code segment from the software protection device, restoring the target code segment to the code segment of an original position in all code segments of the protected software, and shelling the protected software. The invention also discloses a software shelling system and a software protection method. When the shelled software is run, since the target code segment is stored in the software protection device, all codes and data of the protected software are not exposed in an internal memory, and the protection strength of the software is enhanced.

Description

technical field [0001] The invention relates to the technical field of computer software protection, in particular to a software packing method, system and software protection method based on a software protection device. Background technique [0002] In the prior art, packing protection for software is to insert a piece of code (namely shell code) into the protected software, point the entry point of the protected software, that is, the first instruction executed by the software, to the shell code, and then insert the protected software The code and data of the software are protected by methods such as encryption or compression. Packed software will first enter the shell code during operation, restore the encrypted or compressed original code in the shell code, and then jump to the original entry point of the protected software to continue execution. [0003] The prior art also provides a way to protect software based on a software protection device, that is, adding access...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/54
Inventor 孙吉平韩勇
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products