Shell technology based software protection method

A software protection and technology technology, applied in the direction of program/content distribution protection, etc., to enhance the ability to protect software and the effect of good software protection

Inactive Publication Date: 2013-04-24
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the above-mentioned prior art, the technical problem to be solved by the present invention is: for the existing PE file with a shell, the shell loading itself provides an obvious breakpoint for the sheller, that is, the original program that no matter what shell will eventually be converted The entry address, and then successfully take off the shell; it will eventually return the control to the original program, so the boundary point of the entry address cannot be hidden, so we can only take certain protective measures for the second step of shelling. Even if the sheller gets the memory PE file image, there is no good way to restore it to the original program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shell technology based software protection method
  • Shell technology based software protection method
  • Shell technology based software protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0036] The structure of the out-of-order instructions in the out-of-order processing is as follows:

[0037] typedef struct _CODE_FLOW_NODE

[0038] {

[0039] struct _CODE_FLOW_NODE *pNext; / / next node

[0040] BOOL bGoDown; / / whether to jump down

[0041] DWORD dwBits; / / jump range

[0042] DWORD dwType; / / Instruction type

[0043] BOOL bFar; / / Whether it is a far jump

[0044]DWORD dwMemoryAddress; / / Current memory address

[0045] LPBYTE pFileAddress; / / current file address

[0046] DWORD dwGotoMemoryAddress; / / The memory address after the jump

[0047] LPBYTE pGotoFileAddress; / / The address of the file after the jump

[0048] DWORD dwInsLen; / / Instruction length

[0049] union

[0050] {

[0051] BYTE bOffset;

[0052] WORD wOffset;

[0053] DWORD dwOffset;

[0054] }; / / offset

[0055]} CODE_FLOW_NODE, *PCODE_FLOW_NODE;

[0056] Take the experimental comparison method, use other packing software to pack the PE file and the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a shell technology based software protection method, and relates to the technical field of software encryption. Based on the mechanism of code disorder, the software protection method includes the steps of resequencing codes of an original program and a shell program so as to achieve the purpose of integration, while adding junk codes to defense static decompile; and utilizing an SHE (Super Hybrid Engine) technology in the shell program to prevent dynamic trace. When a shell of the software protected by the protection method is cracked off by a cracker, part of the original program is also removed, and accordingly the object of software protection is achieved.

Description

technical field [0001] The invention relates to the technical field of software encryption, in particular to a software protection method based on shell technology. Background technique [0002] With the development of computer software technology, the enhancement of malicious software infection and destructive ability, and the substantial improvement of the level of crackers, the traditional soft encryption and hard encryption schemes have no obvious protection effect for software with high security requirements, and now they have developed to Many other mature methods: registration verification, software watermarking, anti-tracking technology, packing technology, etc. Among them, shell encryption technology is the most common and safest technology in software encryption. [0003] The protection method of packing technology refers to: using a certain algorithm to encrypt and compress the portable executable file PE, and add a shell to the PE file. The software shell is ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10
Inventor 陈文宇李文刘贵松欧睿杰符明晟袁野朱建
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products