首页 | 本学科首页   官方微博 | 高级检索  
     

花指令模糊变换逻辑一致性研究
引用本文:曹林,孙国梓,王海平,王绍棣. 花指令模糊变换逻辑一致性研究[J]. 计算机工程, 2006, 32(20): 135-137
作者姓名:曹林  孙国梓  王海平  王绍棣
作者单位:南京邮电大学计算机科学与技术系,南京,210003
基金项目:国家科技攻关项目;南京邮电大学校科研和教改项目
摘    要:花指令模糊变换是代码模糊变换策略中的一种有效方法。在分析现有花指令加密方法的基础上,给出一种随机花指令模糊变换加密方案,并利用形式化方法对其进行了描述。通过研究花指令模糊变换各种形式化的定义,推导出若干引理,从“JMP扩展”、“JMC变换”、“JMP后添加花指令”等3个方面形式化地证明了经上述随机花指令加密算法变换的程序具有与原始程序相同的逻辑性。

关 键 词:代码模糊变换  逻辑一致性  花指令  反汇编
文章编号:1000-3428(2006)20-0135-03
收稿时间:2005-12-08
修稿时间:2005-12-08

Logic Invariability Study of Junk Code Transformation
CAO Lin,SUN Guozi,WANG Haiping,WANG Shaodi. Logic Invariability Study of Junk Code Transformation[J]. Computer Engineering, 2006, 32(20): 135-137
Authors:CAO Lin  SUN Guozi  WANG Haiping  WANG Shaodi
Affiliation:(Dept. of Computer Science & Technology, Nanjing University of Posts & Telecommunications, Nanjing 210003)
Abstract:Junk code transformation is one of effective approach of the code obfuscation technology. Based on the analysis of current junk code strategies, this paper presents a new method named stochastic junk code encryption algorithm, and depicts the algorithm with formal language. The paper studies how to prove the logic invariability of junk code transformation with formalization method. After studying the formal definition of junk code transformation, some lemmas are educed. With these lemmas, and from three aspects such as “JMP Expand”, “JMC Switch” and “Junk Code”, the paper proves that the program which transforms with stochastic junk code algorithm has the same logicality with the original program.
Keywords:Code obfuscating transformation   Logic invariability   Junk code   Disassemble
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号