期刊文献+

白盒环境中防动态攻击的软件保护方法研究 被引量:10

Research on Software Protection Defending Dynamic Attack in White-Box Environment
在线阅读 下载PDF
导出
摘要 运行态软件常常面临着核心算法被逆向和机密信息被泄漏的严峻威胁,急需研究有效的防动态攻击的软件保护方法.本文包含两方面研究内容:(1)对现有防动态攻击的软件保护方法进行深入分析和综合比较,针对当前主流的防动态攻击的四类保护方法,从实现难度,性能影响和安全性三个指标进行综合对比;(2)通过实例介绍我们在防动态攻击的软件保护方面两项研究工作.分别研究了基于变形引擎的动态软件保护方法和一种安全性增强的虚拟机软件保护方法. Running software often faces serious threats,for example,the core algorithm is reversed or confidential informa- tion is leaked. So, it is needed to study effective protection methods against dynamic attack. The paper includes two aspects. First, do in-depth analysis and comprehensive comparison of the existing method of software protection against dynamic attacks. According to four mainstream software protection methods against anti-dynamic attack, we do comprehensive comparison of these four protection methods from three indicators of implementation difficulty, performance impact and security. Second, Introduce the work of our two studies in software protection against anti-dynamic attacks through examples. They are a software protection method based on dy- namic deformation engine and a security-enhanced software protection based on virtual machine.
出处 《电子学报》 EI CAS CSCD 北大核心 2014年第3期529-537,共9页 Acta Electronica Sinica
基金 教育部科学技术研究重点项目(No.21181) 教育部博士点基金(No.20106101110018) 国家科技支撑计划课题(No.2013BAK02B02) 国家自科学基金(No.61070176,No.61170218,No.61272461,No.61202393) 陕西省科技攻关(No.2011K06-07,No.2012K06-17) 陕西省科技计划(No.2011K06-09) 陕西省教育厅产业化培育项目(No.2011jg06) 陕西省自然科学基础研究计划(No.2012JQ8049)
关键词 白盒环境 防动态攻击 软件保护 虚拟机软件保护 white-box attack enviromnent anti-dynamic attack software protection virtual machine based software ptotection
  • 相关文献

参考文献49

  • 1Chow S,Eisen P,Johnson H,Van Oorschot P.A white-box DES implementation for DRM applications[A].Revised Papers of ACM CCS-9 Workshop,DRM[C].Berlin,Heidelberg:Springer-Verlag,2003,2696:1-15.
  • 2Madou M,Anckaert B,De Sutter B,De Bosschere K.Hybrid static-dynamic attacks against software protection mechanisms[A].Proceedings of the 5th ACM Workshop on Digital Rights Managemen[C].New York,US:ACM,2005.75-82.
  • 3Gu Y X,Larose G,Liem C.Software protection patterns:A new language of security[A].Proceedings of ACM SIGPLAN Software Security and Protection Workshop[C].Beijing,China:ACM,2011.1-5.
  • 4Dube T E,Birrer B D,Raines R A,Baldwin R O,Mullins B E,Bennington R W,Reuter C E.Hindering reverse engineering:Thinking outside the box[J].IEEE Security & Privacy,2008,6(2):58-65.
  • 5Collberg C,Nagra J,Myilibrary.Surreptitious Software:Obfuscation,Watermarking,and Tamperproofing for Software Protection[M].USA:Addison-Wesley Professional,2010.
  • 6Suzaki K,Iijima K,Yagi T,Artho C.Software side channel attack on memory deduplication[A].Proceedings of the 23rd ACM Symposium on Operating Systems Principles,Poster[C].Cascais,Portugal:ACM,2011.1-5.
  • 7Kanzaki Y,Monden A,Nakamura M,Matsumoto K.Exploiting self-modification mechanism for program protection[A].Proceedings of the 27th IEEE Computer Software and Applications Conference[C].Dallas,USA:IEEE,2003.170-179.
  • 8Kanzaki Y,Monden A,Nakamura M,Matsumoto K.Program camouflage:A systematic instruction hiding method for protecting secrets[A].Proceedings of World Academy of Science,Engineering and Technology[C].Heidelberg,Germany:WASET,2008.557-563.
  • 9Kanzaki Y,Monden A.A software protection method based on time-sensitive code and self-modification mechanism[A].Proceedings of the IASTED International Conferences on Informatics Software Engineering and Applications (SEA)[C].Marina Del Rey,USA:EBSCO,2010.325-331.
  • 10Madou M,Anckacrt B,Moseley P,Debray S,De Sutter B,De Bosschere K.Software protection through dynamic code mutaion[A].Proceedings of the 6th International Conference on Information Security Applications[C].Berlin,Heidelberg:Springer-Verlag,2006.194-206.

二级参考文献87

  • 1彭宏,王军.基于支持向量机的病毒程序检测方法[J].电子学报,2005,33(2):276-278. 被引量:4
  • 2Shun-DongLi Yi-QiDai.Secure Two-Party Computational Geometry[J].Journal of Computer Science & Technology,2005,20(2):258-263. 被引量:37
  • 3李顺东,戴一奇,游启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):769-773. 被引量:44
  • 4Hoi C, Atallah J M. Protecting software code by guards [G]//LNCS 2320: Proc of DRM Workshop. Berlin: Springer, 2001: 125-141.
  • 5Business Software Alliance. Fifth Annual BSA and IDC Global Software Piracy Study [R/OL]. Washington, DC: Business Software Alliance, 2008. [2010-01-16]. http:// portal. bsa. org/ideglobalstudy2007/studies/2007_global_piracy_ study. pdf.
  • 6Business Software Alliance. Sixth Annual BSA and IDC Global Software Piracy Study [R/OL]. Washington, DC: Business Software Alliance, 2009. [2010-01-16]. http:// portal. bsa. org/globalpiracy2008/studies/globalpiracy2008. pdf.
  • 7David L, Thekkath C, Mitchell M, et al. Architectural support for copy and tamper resistant software [C] //Proc of the 9th Int Conf on Architectural Support for Programming Languages and Operating Systems, New York: ACM, 2000: 168-177.
  • 8Aucsmith D. Tamper Resistant Software : An implementation [G]//LNCS 1174: Proc of the 1st Int Workshop on Information Hiding. Berlin: Springer, 1996: 317-333.
  • 9Bryant E D, Atallah M J, Stytz M R. A Survey of Anti-tamper Technologies [J]. CrossTalk: The Journal of Defense Software Engineering, 2004, 17(11): 12-16.
  • 10Gleb N, Nasir M. Preventing piracy, reverse engineering, and tampering[J]. IEEE Computer, 2003, 36(7): 64-71.

共引文献79

同被引文献66

引证文献10

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部