Interposition method and device for opaque predicate

A technology of inserting devices and predicates, applied in the field of software protection, which can solve problems such as software intellectual property damage and lack of protection of rights and interests

Active Publication Date: 2017-11-10
GUANGDONG UNIV OF TECH
View PDF1 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Software piracy is an important security issue in the development of the software industry. Software reverse engineering cracks the software illegally and steals the core algorithm and business secrets of the software, which leads to major damage to the intellectual property rights of the software and lacks due protection of rights and interests.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interposition method and device for opaque predicate
  • Interposition method and device for opaque predicate
  • Interposition method and device for opaque predicate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0039] It should be noted that, from the perspective of the attacker, the attack opaque predicate P(x 1 , x 2 ,...,x n ) process can be summarized as the following five steps:

[0040] Positioning constitutes an opaque predicate P(x 1 , x 2 ,...,x n ) instructions;

[0041] Determine the input parameters of P, namely x 1 , x 2 ,...,x n ;

[0042] Determine the value range of each input parameter R 1 , R 2 ,...,R n ;

[0043] according to x 1 , x 2 ,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an interposition method for an opaque predicate. The method comprises the steps that an expression in an original code branch statement is positioned; a first operator is utilized to segment the expression, and a segmented expression is generated; a perpetually-true chaotic opaque predicate is constructed; a second operator is utilized to segment the perpetually-true chaotic opaque predicate, and a segmented perpetually-true chaotic opaque predicate is generated; and the segmented expression and the segmented perpetually-true chaotic opaque predicate are combined according to predetermined combination rules, and an original code is interposed into the opaque predicate generated after combination to generate a mixed code. Obviously, according to the scheme, through the novel interposition and mixing method for combining the constructed perpetually-true opaque predicate with the original branch judgment statement in a program, the ability of resisting static analysis can be improved, and the security of code mixing is enhanced. The invention furthermore discloses an interposition device for the opaque predicate, and the interposition device also can achieve the technical effects.

Description

technical field [0001] The invention relates to the technical field of software protection, and more specifically, to an opaque predicate insertion method and device. Background technique [0002] As a medium of human-computer interaction, computer software greatly increases the convenience of computers and lowers the threshold for users to use computers. Commercial software with complete functions and technologies embodies the wisdom of developers, and the realization of software also contains the core business secrets of software manufacturers. Software piracy is an important security issue in the development of the software industry. Software reverse engineering cracks the software illegally, steals the core algorithm and commercial secrets of the software, and causes major damage to the intellectual property rights of the software, without the protection of due rights. As a new software protection technology, code obfuscation technology has received more and more attent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 苏庆孙金田张俊源程天艺
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products