Program protection method and device
A program protection and program technology, applied in the field of program protection methods and devices, can solve problems such as low security of software products, achieve the effect of improving security and increasing the difficulty of reverse engineering
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0087] Determine whether the size of each basic block in the basic block sequence is larger than the preset code size, determine each basic block in the basic block sequence whose size is larger than the preset code size; set the size in the basic block sequence to be larger than the preset code Each basic block of the size is determined as the target basic block.
[0088] Specifically, the size of the basic block is specifically: the number of assembly instruction lines contained in the basic block on the premise that all instructions in the basic block are converted into assembly instructions. Correspondingly, the preset code size can be set to 20 lines of assembly instructions. It is judged whether the number of assembly instruction lines of each basic block in the basic block sequence is greater than 20 lines, and each element whose assembly instruction lines in the basic block sequence is greater than 20 lines is determined. Basic block; Next, each basic block with more than...
Embodiment approach 2
[0090] The second embodiment: each basic block in the basic block sequence is determined as the target basic block. Of course, in the specific implementation process, the second embodiment is only applied to situations where the amount of code of the source program is small.
Embodiment approach 3
[0091] The third embodiment: randomly select more than one basic block from the basic block sequence and determine them as the target basic block respectively. For example, three basic blocks are randomly selected from the basic block sequence and determined as three target basic blocks.
[0092] Through the above three implementation manners, more than one target basic block can be determined from the basic block sequence.
[0093] Specifically, creating an unreachable branch in each target basic block can be implemented in multiple ways. An implementation manner may be: the jump instruction (for example, jump jump instruction) that jumps to the next basic block from the target basic block is transformed into a conditional jump instruction including reachable branches and unreachable branches, and The jump instruction (jump jump instruction) for the target basic block to jump to the next basic block is written in the reachable branch of the conditional jump instruction.
[0094] S...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com