Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and apparatus for protecting executable files

A technology for executing files and executing processes, which is applied in the field of information security, can solve problems such as limited code quantity, limited code instructions, and limited space, and achieve the effect of protecting software and increasing the difficulty of debugging

Active Publication Date: 2018-11-27
BEIJING SENSESHIELD TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The code instructions that can be transplanted by the hardware-based protection method are limited, limited by the space limitation of the hardware protection device, and the number of transplanted codes is also limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for protecting executable files
  • Method and apparatus for protecting executable files
  • Method and apparatus for protecting executable files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The method for protecting executable files of the present invention can support, for example, .NET executable files and 32-bit or 64-bit executable files compiled and generated by C / C++.

[0034] figure 1 It is a schematic flowchart of an embodiment of the method for protecting an executable file of the present invention. like figure 1 As shown, the method of this embodiment includes the following steps: running the executable file; when running to the predetermined code segment of the executable file, at least part of the execution process of the predetermined code segment is not executed at the application layer but in the The driver layer performs simulated execution; continues to run the executable file.

[0035] The predetermined code segment is a code segment to be protected in the executable file, which may include codes or instructions....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting an executable file, which includes: when running the executable file, at least part of the execution process of the predetermined code segment in the executable file is not executed at the application layer but in the driver layer for simulation execution. The invention simultaneously discloses a corresponding device for protecting executable files. Through the method of the invention, the resistance to the code protection in the software is transferred from the application layer to the driver layer, which further increases the difficulty of debugging, thereby achieving the purpose of protecting the software.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for protecting executable files. Background technique [0002] In the field of information security, software is a valuable asset, and the security of software has attracted more and more attention from units, enterprises and individuals. As a special product, software has been plagued by piracy since its inception due to its digital characteristics. The existence of piracy not only caused huge losses to software developers, but also greatly hindered the development of the entire software industry. [0003] At present, the protection of codes in software is mainly based on application-layer software protection technology and hardware-based protection methods. [0004] Common application layer protection software includes various obfuscators such as VMProtect virtual machine protection software. The analysis of the protection method of this prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
CPCG06F21/125G06F21/1062
Inventor 孙吉平朱庆芬
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products