首页 | 本学科首页   官方微博 | 高级检索  
     

基于软件多样化的拟态安全防御策略
引用本文:张宇嘉,庞建民,张铮,邬江兴.基于软件多样化的拟态安全防御策略[J].计算机科学,2018,45(2):215-221.
作者姓名:张宇嘉  庞建民  张铮  邬江兴
作者单位:数学工程与先进计算国家重点实验室 郑州450001,数学工程与先进计算国家重点实验室 郑州450001,数学工程与先进计算国家重点实验室 郑州450001,国家数字交换系统工程技术研究中心 郑州450001
基金项目:本文受国家重点基础研究发展计划(2016YFB0800104),上海市科学技术委员会科研计划(14DZ1105300),自然科学基金(61472447)资助
摘    要:随着逆向工程的不断发展,软件产业的利益在很长一段时间内受到了来自盗版产业和恶意行为的破坏。为了找到一种低成本的高效抗逆向方法,人们引入了原本为恶意软件用于隐藏自身恶意行为的混淆技术来提高逆向工程的门槛。但是,现存的大多数混淆方法都是语言相关或者依赖目标平台的,对逆向的作用往往极其有限。鉴于此,提出一种基于LLVM的新的编译时的混淆实现方法,并结合拟态防御思想提出一种新的软件防御策略,其能有效防御针对软件的多种恶意攻击。

关 键 词:混淆  软件多样化  拟态防御
收稿时间:2016/12/27 0:00:00
修稿时间:2017/3/21 0:00:00

Mimic Security Defence Strategy Based on Software Diversity
ZHANG Yu-ji,PANG Jian-min,ZHANG Zheng and WU Jiang-xing.Mimic Security Defence Strategy Based on Software Diversity[J].Computer Science,2018,45(2):215-221.
Authors:ZHANG Yu-ji  PANG Jian-min  ZHANG Zheng and WU Jiang-xing
Affiliation:State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China,State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China,State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China and National Digital Switching System Engineering & Technological R&D Center,Zhengzhou 450001,China
Abstract:With the development of reverse engineering,the software industry has suffered a great loss from the software piracy and malicious attack for a long time.Code obfuscation techniques which can hide specific function of a program from malicious analysis for malware is thus frequently employed to mitigate this risk.However,most of the exis-ting obfuscation methods are language embedded and depend on the target architecture,this paper proposed a method of compile-time obfuscation,and further presented a prototype implementedation based on the LLVM compiler infrastructure.Furthermore,this paper implemented a mimic security defence system which is free from malicious attack with the software diversity method.
Keywords:Obfuscation  Software diversity  Mimic defence
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号