Code virtualization software protection system realizing instruction set randomization

A virtualization software and protection system technology, applied in the field of computer software security, can solve problems such as code confusion, poor protection effect, easy to be found and removed, etc., to increase complexity, prolong analysis time, and enhance anti-reverse analysis capabilities Effect

Inactive Publication Date: 2015-11-11
NORTHWEST UNIV(CN)
View PDF3 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The principle of code obfuscation is to convert a program into an equivalent program that is functionally equivalent but has a different static representation or execution process. It mainly changes the control flow of the program through instruction replacement and sequence rearrangement, but these simple instruction compression transformations is easy to understand
And the obfuscation technology currently applied to binary code is mainly protected by waste instructions or garbage instructions, which has poor protection effect and is easy to be found and removed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code virtualization software protection system realizing instruction set randomization
  • Code virtualization software protection system realizing instruction set randomization
  • Code virtualization software protection system realizing instruction set randomization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] The present invention provides a code virtualization software protection system with instruction set randomization, said code virtualization software protection system with instruction set randomization, such as figure 1 shown, including:

[0042] 01. Build a virtual instruction set.

[0043] 02. Perform PE file detection on the program to be protected.

[0044] 03. Locate the key code segment in the program to be protected.

[0045] 04. Disassembling the key code segment to obtain a local instruction sequence.

[0046] 05. Convert the native instruction sequence into a first virtual instruction according to the designed virtual instruction set.

[0047] 06. Encode the first virtual instruction according to a preset encoding rule to obtain a bytecode instruction.

[0048] 07. Generate the auxiliary virtual machine components of the protection system.

[0049] 08. Combine the bytecode instruction and the attached virtual machine component into an additional file, fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a code virtualization software protection system realizing instruction set randomization, and belongs to the field of computer software security. According to the code virtualization software protection system, a virtual instruction set is built in the system; key code in a program to be protected is disassembled to obtain a local instruction sequence; then, the local instruction sequence is converted into a first virtual instruction according to the virtual instruction set of architecture; the first virtual instruction is coded to obtain a byte code instruction; the byte code instruction is combined with a generated attached virtual machine assembly to obtain an attached file; the attached file is combined with the program to be protected to obtain a first file; and junk data filling is performed on the first file to obtain the final protected program. The code virtualization software protection system has the advantages that the complexity of the program to be protected can be improved; and the analysis time of an analyzer on the program to be protected is prolonged, so that the protection capability of the program to be protected is enhanced.

Description

technical field [0001] The invention belongs to the field of computer software security, in particular to a code virtualization software protection system with randomized instruction set. Background technique [0002] While the wide application of software has brought huge benefits to the society, the issue of software security has become increasingly prominent, and software anti-malicious reverse engineering has become an urgent problem to be solved. The development of current software attack technology and reverse tools facilitates the reverse analysis of software by attackers. In addition, software generally runs in a "white box attack" environment, where attackers can completely control the execution process of the software and view the sequence of instruction execution. Therefore, given the attacker enough time, it should be possible to successfully reverse engineer the software. [0003] The amount of information a person can process within a certain period of time i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14G06F21/12
CPCG06F21/125G06F21/14G06F21/53
Inventor 李光辉房鼎益汤战勇匡开圆陈晓江郝朝辉祁生德樊如霞任庆峰王蕾
Owner NORTHWEST UNIV(CN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products