ELF shared library protection method and system thereof

A technology for protecting systems and shared libraries, applied in the field of ELF shared library protection methods and systems thereof, can solve problems such as low security, and achieve the effects of improving protection, protecting interests and avoiding economic losses.

Active Publication Date: 2016-08-03
FUJIAN LANDI COMML EQUIP CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method mainly improves the anti-dynamic tracking ability by packing the cor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ELF shared library protection method and system thereof
  • ELF shared library protection method and system thereof
  • ELF shared library protection method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0060] Example one

[0061] Please refer to figure 2 , The first embodiment of the present invention is an ELF shared library protection method, which includes the following steps:

[0062] S1: Build a packed ELF shared library file according to the target function list of the target ELF shared library file, the packed ELF shared library file includes a proxy function associated with the target function in the target ELF shared library file; specifically according to the target ELF shared library The callable function list thrown by the file is the target function list. The proxy function is implemented in the packed ELF shared library file. The caller, that is, the third-party caller, completes the call of the target function by calling the proxy function. For example, if there is a target function target_func1() in the target ELF shared library file, the proxy function proxy_func1() is implemented in the packed ELF shared library file, and the target function target_func1() is c...

Example Embodiment

[0075] Example two

[0076] Please refer to Figure 4 , This embodiment is an ELF shared library protection system corresponding to the above method, including:

[0077] Building module 1, used to build a packed ELF shared library file according to the target function list of the target ELF shared library file;

[0078] The first reading module 2 is used to read the target ELF shared library file to the memory;

[0079] The first judgment module 3 is used to judge whether the target ELF shared library file is legal, and obtain the first judgment result;

[0080] The encryption module 4 is configured to perform encryption processing on the target ELF shared library file if the first judgment result is yes, to obtain ciphertext ELF data;

[0081] The filling module 5 is used to fill the ciphertext ELF data into the data segment of the packed ELF shared library file;

[0082] The second reading module 6 is used to read the ciphertext ELF data in the packed ELF shared library file to the mem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an ELF shared library protection method and a system thereof. The method comprises the following steps of building an add shell ELF shared library file according to a target function list of a target ELF shared library file; reading the target ELF shared library file into a memory; performing encryption processing on the legal target ELF shared library file to obtain ciphertext ELF data; filling the ciphertext ELF data into a data segment of the add shell ELF shared library file. The method and the system have the advantages that the obtaining of the program design ideas of a designer or code execution details after a decompilation reverse analysis of a dynamic shared library can be prevented; the protection of software can be improved; the economic loss of software development enterprises is avoided; the benefits of customers are protected.

Description

Technical field [0001] The invention relates to the field of computer security, in particular to an ELF shared library protection method and system. Background technique [0002] Anti-piracy and anti-modification of software has always been an important topic in the field of computer security. Illegal decipherers can analyze software through decompilation and reverse engineering, and then discover the design ideas and technical details of the software. This directly brings direct economic losses to software development companies and indirectly damages the interests of consumers. Therefore, it is particularly important to design a set of proprietary and unique software protection methods. [0003] The current method of protecting ELF in Linux is usually through an embedded method. First inject a jump code into the executable file or dynamic shared library. When the system runs the executable file or dynamic library, this part of the jump code is executed first, and then jumps to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14G06F21/62
CPCG06F21/14G06F21/6218G06F2221/2107
Inventor 刘礼建吴卫东柯婷
Owner FUJIAN LANDI COMML EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products