首页 | 本学科首页   官方微博 | 高级检索  
     

基于虚拟机的软件保护研究与设计
引用本文:张丽娜,阎文斌.基于虚拟机的软件保护研究与设计[J].计算机工程与应用,2012,48(26):66-70,161.
作者姓名:张丽娜  阎文斌
作者单位:1. 西安科技大学 计算机科学与技术学院,西安,710054
2. 北京邮电大学 软件学院,北京,100876
基金项目:西安科技大学培育基金项目
摘    要:虚拟机技术一直是当今计算机安全领域研究的热点之一。从软件保护的角度出发,介绍了基于虚拟机的软件保护设计方案中的关键技术,并给出了一个范例,说明具体步骤和方法。该方法将保护对象细化为函数,给出了单函数识别的具体步骤和方法,利用基本的x86编码来构造虚拟机,对基本指令集采用基于字节码的加解密技术,此外还对各类指令进行了必要的模块化扩展以增加保护力度。目前国内对于虚拟机的保护技术处于起步阶段,因而对于虚拟机技术的理论基础研究和技术实践应用均具有较高的研究价值和发展空间。

关 键 词:虚拟机  x86体系结构  加密

Research and design of software protection based on virtual machine
ZHANG Lina , YAN Wenbin.Research and design of software protection based on virtual machine[J].Computer Engineering and Applications,2012,48(26):66-70,161.
Authors:ZHANG Lina  YAN Wenbin
Affiliation:1.School of Computer Science and Technology,Xi’an University of Science and Technology,Xi’an 710054,China 2.School of Software Engineering,Beijing University of Posts and Telecommunications,Beijing 100876,China
Abstract:Virtual machine technique is one of the hot topics in the research field of computer security.From the viewpoint of software protection,the key technologies of software protection based on virtual machine are given.In order to illustrate the specific steps and methods,an example is presented.In the design,the protection objects are defined as functions and the corresponding methods of single-function identifying are discussed.Using basic x86 codes,the virtual machine is constructed,then the basic instruction set is processed by encryption and decryption technology based on bytecode.In addition,the necessary modular expansion of instructions is given in order to increase the strength of protection.The virtual machine technique for software protection is in its infancy and growing stage.Therefore the related researches and applications based on virtual machine technique have high research value and huge developing space.
Keywords:virtual machine  x86 architecture  encryption
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号