CN103699820B - 用于相对跳转指令的混淆方法 - Google Patents
用于相对跳转指令的混淆方法 Download PDFInfo
- Publication number
- CN103699820B CN103699820B CN201310727164.XA CN201310727164A CN103699820B CN 103699820 B CN103699820 B CN 103699820B CN 201310727164 A CN201310727164 A CN 201310727164A CN 103699820 B CN103699820 B CN 103699820B
- Authority
- CN
- China
- Prior art keywords
- code
- jump
- jump instruction
- relatively
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000004088 simulation Methods 0.000 claims description 20
- 238000006243 chemical reaction Methods 0.000 claims description 6
- 230000009191 jumping Effects 0.000 claims description 3
- 230000017105 transposition Effects 0.000 claims description 3
- 230000003068 static effect Effects 0.000 abstract description 3
- 230000007547 defect Effects 0.000 abstract 1
- 238000004458 analytical method Methods 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 238000005336 cracking Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310727164.XA CN103699820B (zh) | 2013-12-25 | 2013-12-25 | 用于相对跳转指令的混淆方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310727164.XA CN103699820B (zh) | 2013-12-25 | 2013-12-25 | 用于相对跳转指令的混淆方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103699820A CN103699820A (zh) | 2014-04-02 |
CN103699820B true CN103699820B (zh) | 2017-02-15 |
Family
ID=50361347
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310727164.XA Active CN103699820B (zh) | 2013-12-25 | 2013-12-25 | 用于相对跳转指令的混淆方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103699820B (zh) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104318134B (zh) * | 2014-11-05 | 2017-06-06 | 北京深思数盾科技股份有限公司 | 一种数据保护方法 |
CN106096338B (zh) * | 2016-06-07 | 2018-11-23 | 西北大学 | 一种具有数据流混淆的虚拟化软件保护方法 |
CN107480479B (zh) * | 2017-08-15 | 2020-08-07 | 北京奇虎科技有限公司 | 应用程序的加固方法及装置、计算设备、计算机存储介质 |
CN108021790B (zh) * | 2017-12-28 | 2020-09-08 | 江苏通付盾信息安全技术有限公司 | 文件保护方法、装置、计算设备及计算机存储介质 |
CN110210190A (zh) * | 2019-05-30 | 2019-09-06 | 中国科学院信息工程研究所 | 一种基于二次汇编的代码混淆方法 |
CN110717150A (zh) * | 2019-10-08 | 2020-01-21 | 北京顶象技术有限公司 | 代码保护方法、装置、保护设备及可读存储介质 |
CN112528241B (zh) * | 2020-11-27 | 2021-09-14 | 北京深思数盾科技股份有限公司 | 一种代码混淆方法、代码混淆器以及计算机可读存储介质 |
CN112905242B (zh) | 2021-03-23 | 2022-12-06 | 浙江大华技术股份有限公司 | 分支路径跳转方法、装置、存储介质及电子装置 |
CN113569269B (zh) * | 2021-09-23 | 2022-12-27 | 苏州浪潮智能科技有限公司 | 一种代码混淆的加密方法、装置、设备及可读介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101872393A (zh) * | 2009-04-23 | 2010-10-27 | 李嘉 | 一种Java程序防篡改响应方案 |
CN102047261A (zh) * | 2008-05-30 | 2011-05-04 | Nxp股份有限公司 | 改编和执行计算机程序的方法及其计算机体系结构 |
CN102930204A (zh) * | 2012-09-20 | 2013-02-13 | 北京深思洛克软件技术股份有限公司 | 基于软件保护装置的软件加壳方法、系统及软件保护方法 |
CN103065069A (zh) * | 2013-01-28 | 2013-04-24 | 电子科技大学 | 一种基于壳技术的软件保护方法 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102005001679B4 (de) * | 2005-01-13 | 2008-11-13 | Infineon Technologies Ag | Mikroprozessor-Einrichtung, und Verfahren zur Branch-Prediktion für conditional Branch-Befehle in einer Mikroprozessor-Einrichtung |
-
2013
- 2013-12-25 CN CN201310727164.XA patent/CN103699820B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102047261A (zh) * | 2008-05-30 | 2011-05-04 | Nxp股份有限公司 | 改编和执行计算机程序的方法及其计算机体系结构 |
CN101872393A (zh) * | 2009-04-23 | 2010-10-27 | 李嘉 | 一种Java程序防篡改响应方案 |
CN102930204A (zh) * | 2012-09-20 | 2013-02-13 | 北京深思洛克软件技术股份有限公司 | 基于软件保护装置的软件加壳方法、系统及软件保护方法 |
CN103065069A (zh) * | 2013-01-28 | 2013-04-24 | 电子科技大学 | 一种基于壳技术的软件保护方法 |
Also Published As
Publication number | Publication date |
---|---|
CN103699820A (zh) | 2014-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103699820B (zh) | 用于相对跳转指令的混淆方法 | |
Yadegari et al. | Symbolic execution of obfuscated code | |
CN105787305B (zh) | 一种抵抗符号执行和污点分析的软件保护方法 | |
Xu et al. | VMHunt: A verifiable approach to partially-virtualized binary code simplification | |
US20050028002A1 (en) | Method and apparatus to detect malicious software | |
Yadegari et al. | Bit-level taint analysis | |
TW200837604A (en) | Obfuscating computer program code | |
CN105912305A (zh) | 微处理器以及相关的操作方法、以及加密方法 | |
Kuang et al. | Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling | |
CN107408072A (zh) | 用于随机化计算机指令集、存储器寄存器和指针的方法和装置 | |
CN101866406A (zh) | 一种栈溢出攻击防御方法 | |
Cojocar et al. | Instruction duplication: Leaky and not too fault-tolerant! | |
CN110050258A (zh) | 具有自动模块化功能的安全专区保护的应用程序盗版防止 | |
CN105843776A (zh) | 微处理器与其中安全执行指令的方法 | |
CN106055343A (zh) | 一种基于程序演进模型的目标代码逆向工程系统 | |
Kollenda et al. | An exploratory analysis of microcode as a building block for system defenses | |
Lin et al. | A value set analysis refinement approach based on conditional merging and lazy constraint solving | |
Wang et al. | OFFDTAN: a new approach of offline dynamic taint analysis for binaries | |
CN106126225A (zh) | 一种基于程序演进模型的目标代码逆向工程方法 | |
Lee et al. | VODKA: Virtualization obfuscation using dynamic key approach | |
Joshi et al. | Trading off a vulnerability: does software obfuscation increase the risk of rop attacks | |
Yujia et al. | A new compile-time obfuscation scheme for software protection | |
Jeong et al. | A data type inference method based on long short-term memory by improved feature for weakness analysis in binary code | |
Zhu et al. | Determining the image base of arm firmware by matching function addresses | |
Coleman et al. | Malware Detection by Merging 1D CNN and Bi-directional LSTM Utilizing Sequential Data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing Applicant before: BEIJING SHENSI SHUDUN TECHNOLOGY Co.,Ltd. |
|
COR | Change of bibliographic data | ||
CB02 | Change of applicant information |
Address after: 100193 Beijing, Haidian District, East West Road, No. 10, East Hospital, building No. 5, floor 5, layer 510 Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing Applicant before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. |
|
COR | Change of bibliographic data | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee after: Beijing Shendun Technology Co.,Ltd. Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder |