CN105354009A - 一种用于固件的保护方法 - Google Patents
一种用于固件的保护方法 Download PDFInfo
- Publication number
- CN105354009A CN105354009A CN201510662037.5A CN201510662037A CN105354009A CN 105354009 A CN105354009 A CN 105354009A CN 201510662037 A CN201510662037 A CN 201510662037A CN 105354009 A CN105354009 A CN 105354009A
- Authority
- CN
- China
- Prior art keywords
- instruction
- firmware
- lists
- offset
- code segment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000009191 jumping Effects 0.000 claims description 5
- 238000005336 cracking Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/3005—Arrangements for executing specific machine instructions to perform operations for flow control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510662037.5A CN105354009B (zh) | 2015-10-14 | 2015-10-14 | 一种用于固件的保护方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510662037.5A CN105354009B (zh) | 2015-10-14 | 2015-10-14 | 一种用于固件的保护方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105354009A true CN105354009A (zh) | 2016-02-24 |
CN105354009B CN105354009B (zh) | 2021-01-01 |
Family
ID=55329986
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510662037.5A Active CN105354009B (zh) | 2015-10-14 | 2015-10-14 | 一种用于固件的保护方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105354009B (zh) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529225A (zh) * | 2016-10-27 | 2017-03-22 | 努比亚技术有限公司 | 一种应用程序源代码保护装置及方法 |
CN106951744A (zh) * | 2017-03-15 | 2017-07-14 | 北京深思数盾科技股份有限公司 | 可执行程序的保护方法及装置 |
CN106951745A (zh) * | 2017-03-31 | 2017-07-14 | 北京深思数盾科技股份有限公司 | 一种指令重组方法和装置 |
CN108334756A (zh) * | 2017-01-20 | 2018-07-27 | 武汉斗鱼网络科技有限公司 | 一种对递归下降式分析器反编译的干扰方法及装置 |
CN108363911A (zh) * | 2018-02-11 | 2018-08-03 | 西安四叶草信息技术有限公司 | 一种Python脚本混淆、水印的方法及装置 |
CN111783162A (zh) * | 2020-06-30 | 2020-10-16 | 联想(北京)有限公司 | 数据保护实现方法、装置及计算机设备 |
CN113541922A (zh) * | 2021-07-20 | 2021-10-22 | 山东大学 | 交换网络和跳转算法指令化的侧信道攻击抵抗方法及系统 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6779114B1 (en) * | 1999-08-19 | 2004-08-17 | Cloakware Corporation | Tamper resistant software-control flow encoding |
CN101939749A (zh) * | 2008-02-11 | 2011-01-05 | Nxp股份有限公司 | 程序模糊方法和用于执行模糊程序的处理设备 |
CN101939724A (zh) * | 2008-02-06 | 2011-01-05 | Nxp股份有限公司 | 数据处理设备及用于执行混淆程序的方法 |
CN103279693A (zh) * | 2013-05-30 | 2013-09-04 | 付弦 | 一种文件加密方法 |
US20130232343A1 (en) * | 1999-07-29 | 2013-09-05 | Intertrust Technologies Corporation | Software self-defense systems and methods |
CN104517044A (zh) * | 2013-09-27 | 2015-04-15 | 腾讯科技(深圳)有限公司 | 一种防止二进制文件被反编译的方法和装置 |
-
2015
- 2015-10-14 CN CN201510662037.5A patent/CN105354009B/zh active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130232343A1 (en) * | 1999-07-29 | 2013-09-05 | Intertrust Technologies Corporation | Software self-defense systems and methods |
US6779114B1 (en) * | 1999-08-19 | 2004-08-17 | Cloakware Corporation | Tamper resistant software-control flow encoding |
CN101939724A (zh) * | 2008-02-06 | 2011-01-05 | Nxp股份有限公司 | 数据处理设备及用于执行混淆程序的方法 |
CN101939749A (zh) * | 2008-02-11 | 2011-01-05 | Nxp股份有限公司 | 程序模糊方法和用于执行模糊程序的处理设备 |
CN103279693A (zh) * | 2013-05-30 | 2013-09-04 | 付弦 | 一种文件加密方法 |
CN104517044A (zh) * | 2013-09-27 | 2015-04-15 | 腾讯科技(深圳)有限公司 | 一种防止二进制文件被反编译的方法和装置 |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529225A (zh) * | 2016-10-27 | 2017-03-22 | 努比亚技术有限公司 | 一种应用程序源代码保护装置及方法 |
CN108334756A (zh) * | 2017-01-20 | 2018-07-27 | 武汉斗鱼网络科技有限公司 | 一种对递归下降式分析器反编译的干扰方法及装置 |
CN108334756B (zh) * | 2017-01-20 | 2020-05-12 | 武汉斗鱼网络科技有限公司 | 一种对递归下降式分析器反编译的干扰方法及装置 |
CN106951744A (zh) * | 2017-03-15 | 2017-07-14 | 北京深思数盾科技股份有限公司 | 可执行程序的保护方法及装置 |
CN106951744B (zh) * | 2017-03-15 | 2019-12-13 | 北京深思数盾科技股份有限公司 | 可执行程序的保护方法及装置 |
CN106951745A (zh) * | 2017-03-31 | 2017-07-14 | 北京深思数盾科技股份有限公司 | 一种指令重组方法和装置 |
CN106951745B (zh) * | 2017-03-31 | 2019-10-18 | 北京深思数盾科技股份有限公司 | 一种指令重组方法和装置 |
CN108363911A (zh) * | 2018-02-11 | 2018-08-03 | 西安四叶草信息技术有限公司 | 一种Python脚本混淆、水印的方法及装置 |
CN108363911B (zh) * | 2018-02-11 | 2021-10-29 | 西安四叶草信息技术有限公司 | 一种Python脚本混淆、水印的方法及装置 |
CN111783162A (zh) * | 2020-06-30 | 2020-10-16 | 联想(北京)有限公司 | 数据保护实现方法、装置及计算机设备 |
CN113541922A (zh) * | 2021-07-20 | 2021-10-22 | 山东大学 | 交换网络和跳转算法指令化的侧信道攻击抵抗方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN105354009B (zh) | 2021-01-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105354009A (zh) | 一种用于固件的保护方法 | |
US11113384B2 (en) | Stack overflow protection by monitoring addresses of a stack of multi-bit protection codes | |
EP2958044B1 (en) | A computer implemented method and a system for controlling dynamically the execution of a code | |
US10599820B2 (en) | Control flow flattening for code obfuscation where the next block calculation needs run-time information | |
EP3654215B1 (en) | Applying control flow integrity verification in intermediate code files | |
US20110191848A1 (en) | Preventing malicious just-in-time spraying attacks | |
CN105683990A (zh) | 用于保护动态库的方法和装置 | |
US11250110B2 (en) | Method to secure a software code | |
US10417412B2 (en) | Protecting computer code against ROP attacks | |
US20110271350A1 (en) | method for protecting software | |
US9576138B1 (en) | Mitigating ROP attacks | |
EP3035228B1 (en) | Code integrity protection by computing target addresses from checksums | |
US11269988B2 (en) | Automated software application verification system | |
US20160171213A1 (en) | Apparatus and method for controlling instruction execution to prevent illegal accesses to a computer | |
EP2937803B1 (en) | Control flow flattening for code obfuscation where the next block calculation needs run-time information | |
US20200074077A1 (en) | Method for Providing a Security-Critical Software Application on a Computer Unit | |
Ahmadvand et al. | Practical integrity protection with oblivious hashing | |
CN107209815B (zh) | 用于使用返回导向编程的代码混淆的方法 | |
EP3574425B1 (en) | Method to secure a software code | |
CN107545174B (zh) | 一种基于llvm的抵御控制流劫持的系统和方法 | |
JP2009104589A (ja) | 情報処理装置及びその方法、プログラム、記録媒体 | |
US11783013B2 (en) | Protected processing of operations | |
WO2017030548A1 (en) | Loading custom code into binary code | |
KR20150003451A (ko) | 메모리 데이터 보호 시스템 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing Applicant before: BEIJING SHENSI SHUDUN TECHNOLOGY Co.,Ltd. |
|
COR | Change of bibliographic data | ||
CB02 | Change of applicant information |
Address after: 100193 Beijing, Haidian District, East West Road, No. 10, East Hospital, building No. 5, floor 5, layer 510 Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing Applicant before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. |
|
COR | Change of bibliographic data | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee after: Beijing Shendun Technology Co.,Ltd. Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. |