Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software protection method based on intermediate result compiling

A software protection, intermediate result technology, applied in the direction of program/content distribution protection, etc., can solve problems such as program exposure, few types of packers, and limited language processing capabilities, to avoid errors, prevent illegal cracking and analysis, and improve confusion. Effects and Obfuscation Quality Effects

Active Publication Date: 2014-10-08
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF2 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above two methods have their own advantages and disadvantages. The protection at the source code level is very limited, and the processing ability for lower-level languages ​​is limited. However, there are not many types of packing based on executable files, which are easy to be unpacked, thereby exposing the original program. to the analyst

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protection method based on intermediate result compiling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] The present invention is aimed at compiling the software confusion protection method of intermediate result OBJ file, comprises the following steps:

[0067] Step S1 may directly use a Microsoft compiler or a GCC compiler to compile the source code.

[0068] Step S2 mainly includes some basic analysis and processing work, and splits the OBJ file according to a certain data structure. The later processing is carried out for this part of split data, therefore, this step is the first step to realize the main function.

[0069] The processing process of the compiler provided by Microsoft or GCC is similar. The generation of intermediate files is carried out according to the COFF standard, and there are very few differences between them. These differences can be processed by some compatible modules to ensure later analysis and confusion. able to execute normally. This method is only applicable to C / C++ language, you can find the official documents provided by Microsoft and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software protection method based on intermediate result compiling. The software protection method includes the following steps (1), software source codes are compiled to obtain an original object file (OBJ); (2), the original OBJ is analyzed to obtain partitioned data aiming at the original OBJ; (3), the analysis result of the step (2) is preprocessed; (4), system function call is concealed, redundant functions are inserted, and global character strings used for a system are encrypted; (5), deformation is performed for a common instruction; (6), the scattered data obtained through processing in the processes are recombined to form the OBJ, and then an executable file is generated through link of a linker. Confusion and protection at the instruction level for the OBJ are achieved, errors can be avoided, the confusion effect and the confusion quality are improved, and software is prevented from being illegally cracked or analyzed.

Description

technical field [0001] The invention belongs to the field of software protection, and in particular relates to a software protection method based on compiling intermediate results. Background technique [0002] The development of the application program includes: the writing of the source code, the OBJ file compiled by the compiler, and the linking of the OBJ file by the linker. Each source file corresponds to an OBJ file. The OBJ file is the product of high-level language assembly, symbol processing, and string processing by the system compiler. The OBJ file conforms to the document standards of the corresponding platform, such as Microsoft COFF file standards. Compared with the linked executable file, the OBJ file has a simpler structure, more flexible data index and code calling method, so it is more flexible to handle and can be confused in many ways, including confusing function import and export. Tables, string references, increased redundancy, and more. This operati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 张小松张艺峰牛伟纳陈瑞东王东杨高明于洲白金漆艳梅樊添
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products