Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Binary software protection method by means of dynamic fine-grained code hiding and obfuscating technology

A software protection, fine-grained technology, applied in program/content distribution protection, instruments, electronic digital data processing, etc., can solve the problems of large plaintext window, difficult to hide program control flow, etc., achieve high protection strength, reduce size and Duration, resistance to static and dynamic analysis effects

Active Publication Date: 2017-05-10
NAT UNIV OF DEFENSE TECH
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still some shortcomings in the current mainstream methods. First, the plaintext window is relatively large. Whether it is self-modifying code technology or virtual machine protection technology, in order to improve execution efficiency, it is usually dynamically generated in units of functions or a whole piece of code, and it is easy for attackers to Obtain key information such as functions directly by tracking the plaintext window of the code; second, it is difficult to hide the control flow of the program. Since the plaintext window contains complete function information, reverse tools can easily obtain the plaintext machine code of the function, and analyze the function. External function calls, to obtain the call relationship between functions, so as to build the control flow graph of the entire program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binary software protection method by means of dynamic fine-grained code hiding and obfuscating technology
  • Binary software protection method by means of dynamic fine-grained code hiding and obfuscating technology
  • Binary software protection method by means of dynamic fine-grained code hiding and obfuscating technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0036] The invention is mainly used for binary software protection technology against software reverse analysis, that is, binary software anti-analysis technology. The binary software protection method (Dynamically Fine-grained Code Hiding and Obfuscation, referred to as dynFCHO) adopting dynamic fine-grained code hiding and obfuscation technology of the present invention achieves Purpose of concealment and protection. Such as figure 1 Shown, in specific application examples, the detailed steps of the present invention are:

[0037] S1: Select a hidden target;

[0038] In the unit of basic block, select the code block to be hidden in the target program.

[0039] The selection method is explained as follows:

[0040] Obfuscation of binary files is based on correct disassembly. DynFCHO uses basic blocks as the smallest unit for cod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a binary software protection method by means of a dynamic fine-grained code hiding and obfuscating technology. The method comprises the steps that S1, a hidden target is selected, wherein a to-be-hidden code block is selected in a target program with a basic block as a unit; S2, the selected basic block is hidden, wherein according to each to-be-hidden basic block, an original code segment is replaced with a distributor function call, and other obfuscating instructions are filled in the rest positions; S3, the codes are packaged again, a new code segment is created so as to save all additional logic and data. The method has the advantages of being wide in application range, light in magnitude, extendable, high in safety and the like.

Description

technical field [0001] The invention mainly relates to the technical field of computer system security and software protection, in particular to a binary software protection method using dynamic fine-grained code hiding and obfuscation technology. Background technique [0002] Anti-reverse cracking is one of the cores of software protection. With the increasing importance of intellectual property rights, software reverse protection technology has made great progress, from packing technology, static obfuscation protection technology, to dynamic obfuscation protection and virtual With computer protection technology, the difficulty of software cracking continues to increase. On the other hand, with the vigorous development of software, various debugging software and attack software are becoming more and more advanced and intelligent, providing a more convenient way for software cracking and attacking. [0003] There are three main types of attacks faced by software: software r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14G06F21/12
CPCG06F21/125G06F21/14G06F21/1066
Inventor 张怡吴蒙糜娴雅徐彬彬唐勇杨强解炜周旭
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products