基于壳技术的软件保护方法
Software Protection Method Based on Shell Technology
DOI: 10.12677/SEA.2012.12009, PDF, HTML, XML,  被引量 下载: 3,729  浏览: 10,958 
作者: 孙元鹏:深圳市振华微电子有限公司,深圳;陈文宇, 李 文, 郭凌立, 李维顺:电子科技大学计算机学院,成都
关键词: 软件保护PE文件融合 Software Protection; PE Files; Shell; Integration
摘要: 壳技术是软件加密中最常见、最安全的一种技术。本文提出了新的基于壳技术的软件保护模型:基于融合的软件壳保护模型,即将外壳程序与原程序相互结合在一起,当破解者将外壳脱掉的同时,也除去了部分的原程序,从而到达保护软件的目的。本文同时提出了该模型的实现方案:基于代码乱序的机制,该机制将原程序与外壳程序代码进行乱序来到达融合的目的,并且在代码乱序的同时加入了花指令来防御静态反编译;在外壳程序中使用了SHE技术来反动态跟踪。通过实例验证了基于融合的壳软件保护模型具有很强的软件保护能力。
Abstract: Shell encryption is the most common and safest software encryption technology. The thesis propose new software protection model based on shell technology which is based on the integration of software shell protection model, the so-called “integration” is making the shell program and the original program combined together. When the shell is taken off by cracker, then the part of the original program was also given away, thus reach the purpose of protection software. This thesis also puts forward the solution implementing the model which is based on the code-of-unordered mechanism which means that the original program with shell code are out of order for reaching the goal of integration, at the same time for defensing static recompilation we will add junk code and use SHE technology for anti-dynamic tracking. Ultimately we will implement packing based on the integration of software shell protection model by this solution. The software shell protection model based on the integration has strong software protection ability.

文章引用:孙元鹏, 陈文宇, 李文, 郭凌立, 李维顺. 基于壳技术的软件保护方法[J]. 软件工程与应用, 2012, 1(2): 47-53. http://dx.doi.org/10.12677/SEA.2012.12009

参考文献

[1] 赵东方. 基于壳技术的软件保护技术研究[D]. 同济大学, 2009.
[2] 锻钢. 加密与解密(第三版)[M]. 北京: 电子工业出版社, 2008.
[3] Portable executable. http://en.wikipedia.org/wiki/Portable_Executalbe
[4] 秦杰. 基于IAT加密的加壳程序研究[D]. 电子科技大学, 2009.
[5] 张跃洋. 基于软件壳的研究与实现[D]. 电子科技大学, 2008.
[6] 姚为光. 软件加壳技术的研究[D]. 电子科技大学, 2011.
[7] 徐武华. 软件保护与分析技术的研究与实现[D]. 北京邮电大学, 2011.
[8] J. Wang. Hardware-assisted protection and isolation. Virginia: George Mason University, 2011.
[9] C. S. Collberg, C. Thomborson. Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Transactions on Software Engineering, 2002, 28(8): 735-746.
[10] Microsoft. Microsoft portable executable and common object file format specification revision8.2_September21, 2010@2005-2010 Microsoft Corporation.
[11] 微软. Windows IFS kit and DDK 3700. Microsoft Corporation, 2003
[12] H. Yin, C. Lin, F. Qiu, et al. A survey of digital watermarking. Journal of Computer Research and Development, 2005, 42(7): 1093-1099.