Supercharge Your Innovation With Domain-Expert AI Agents!

A cross-platform source code virtualization protection method based on intermediate language interpreter

An intermediate language and interpreter technology, applied in the direction of platform integrity maintenance, program/content distribution protection, instruments, etc., can solve problems such as source code leakage, execution efficiency is difficult to debug, and cannot meet the protection efforts of the software ecological field, so as to improve protection Intensity, the effect of achieving versatility

Active Publication Date: 2021-08-17
HANGZHOU ZHEXIN IT TECHNOLOGY CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For block branch obfuscation, symbolic execution can be used to identify; for string obfuscation, after decompilation and other means, the encryption and decryption logic can be extracted. At the assembly level, this obfuscation technology can still be correctly decompiled , the logic of the original code can still be analyzed by analyzing the assembly code, so this type of obfuscation technology has the risk of being cracked, and pure obfuscation cannot meet the protection required by the current software ecological field
[0003] In addition, the realization of virtual machine protection still has great limitations
For assembly language interpreters, traditional virtual machine protection technologies often need to implement different virtual instruction mappings for different CPU architectures. This method has problems such as execution efficiency and difficulty in debugging; for high-level language interpreters, it is necessary to Adjust the structure of the source code to implement a high-level language interpreter, but it will destroy the original structure of the source code. To a certain extent, there is a risk of source code leakage, and it is related to the language. Adapting to a new language also requires redesign

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cross-platform source code virtualization protection method based on intermediate language interpreter
  • A cross-platform source code virtualization protection method based on intermediate language interpreter
  • A cross-platform source code virtualization protection method based on intermediate language interpreter

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be further described in detail below through specific embodiments and in conjunction with the accompanying drawings.

[0019] like figure 1 As shown, a cross-platform source code virtualization protection method based on an intermediate language interpreter described in the embodiment of the present invention includes the following steps:

[0020] Step 101: Convert the source code into an intermediate language to generate an original intermediate file;

[0021] Step 102: Obfuscate the original intermediate language to generate an obfuscated intermediate file;

[0022] Step 103: modify the bitcode generation rule of LLVM according to the bitcode file format table of LLVM, and convert the obfuscated intermediate file into a random format bitcode file;

[0023] Step 104: modify the original bitcode interpreter according to the converted random format bitcode file, and obtain the bitcode interpreter corresponding to the converted random format b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cross-platform source code virtualization protection method based on an intermediate language interpreter. The method includes: converting the source code into an intermediate language to generate an original intermediate file; performing obfuscation processing on the original intermediate language to generate an obfuscated The intermediate file; modify the bitcode generation rules of LLVM according to the bitcode file format table of LLVM, convert the obfuscated intermediate file into a bitcode file in a random format; modify the original bitcode interpreter according to the converted bitcode file in a random format, Obtain the corresponding bitcode interpreter; output the modified bitcode interpreter according to the target compiler architecture, and embed the corresponding bitcode into the data segment, complete the compilation, and generate a protected executable file. The beneficial effects of the present invention are: the combination of obfuscation and virtual machine protection technology increases the power of source code protection; the use of LLVM characteristics makes the virtual machine irrelevant to language and platform, and has good universality.

Description

technical field [0001] The invention relates to the technical field of software security, in particular to a cross-platform source code virtualization protection method based on an intermediate language interpreter. Background technique [0002] With the rapid development of the software ecosystem, how to protect the security and integrity of software products has become an increasingly important topic. Code obfuscation and virtual machine protection, as mature software protection strategies, have been widely used in various production environments middle. Nowadays, binary analysis technologies such as symbolic execution are becoming more and more mature. The code obfuscation technology represented by OLLVM generally adopts basic block segmentation, instruction replacement, control flow flattening, forged branches and string obfuscation. Confusion with branch jumps, that is, branch forgery and control flow flattening, symbolic execution can be used to determine the real cod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14G06F21/53G06F8/41
CPCG06F8/434G06F8/447G06F21/14G06F21/53
Inventor 韩宇超姚伟涛
Owner HANGZHOU ZHEXIN IT TECHNOLOGY CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More