Unlock instant, AI-driven research and patent intelligence for your innovation.

A Software Protection Method Based on Intermediary Results of Compilation

A software protection and intermediate result technology, applied in the direction of program/content distribution protection, etc., can solve the problems of limited language processing capability, few types of packers, program exposure, etc., to improve the obfuscation effect and quality, prevent illegal cracking and Analyze and avoid errors

Active Publication Date: 2017-02-15
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above two methods have their own advantages and disadvantages. The protection at the source code level is very limited, and the processing ability for lower-level languages ​​is limited. However, there are not many types of packing based on executable files, which are easy to be unpacked, thereby exposing the original program. to the analyst

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Software Protection Method Based on Intermediary Results of Compilation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] The present invention is aimed at compiling the software confusion protection method of intermediate result OBJ file, comprises the following steps:

[0067] Step S1 may directly use a Microsoft compiler or a GCC compiler to compile the source code.

[0068] Step S2 mainly includes some basic analysis and processing work, and splits the OBJ file according to a certain data structure. The later processing is carried out for this part of split data, therefore, this step is the first step to realize the main function.

[0069] The processing process of the compiler provided by Microsoft or GCC is similar. The generation of intermediate files is carried out according to the COFF standard, and there are very few differences between them. These differences can be processed by some compatible modules to ensure later analysis and confusion. can execute normally. This method is only applicable to C / C++ language, you can find the official documents provided by Microsoft and som...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software protection method for compiling intermediate results, comprising the following steps: S1: compiling the software source code to obtain the original target OBJ file; S2: analyzing the original OBJ file to obtain split data for the original OBJ file ;S3: Preprocess the analysis results of S2; S4: Conceal the system function calls and insert redundant functions, and encrypt the global strings used by the system; S5: Transform ordinary instructions; S6: Convert The scattered data obtained after the above-mentioned process is reorganized into an OBJ file, and then linked into an executable file through a linker. The invention realizes instruction-level obfuscation and protection for OBJ files, can avoid errors, improves obfuscation effect and quality, and prevents software from being illegally cracked and analyzed.

Description

technical field [0001] The invention belongs to the field of software protection, and in particular relates to a software protection method based on compiling intermediate results. Background technique [0002] The development of the application program includes: the writing of the source code, the OBJ file compiled by the compiler, and the linking of the OBJ file by the linker. Each source file corresponds to an OBJ file. The OBJ file is the product of high-level language assembly, symbol processing, and string processing by the system compiler. The OBJ file conforms to the document standards of the corresponding platform, such as Microsoft COFF file standards. Compared with the linked executable file, the OBJ file has a simpler structure, more flexible data index and code calling method, so it is more flexible to handle and can be confused in many ways, including confusing function import and export. Tables, string references, increased redundancy, and more. This operati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 张小松张艺峰牛伟纳陈瑞东王东杨高明于洲白金漆艳梅樊添
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA