Font Size: a A A

Research And Implementation Of Encryption And Self-Checking Based Software Tamper Resistance

Posted on:2008-09-23Degree:MasterType:Thesis
Country:ChinaCandidate:J S DongFull Text:PDF
GTID:2178360272469157Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the Computer Software Industry, software security expands greatly. Traditional technologies, such as encryption,code obfuscation,software fingerprint and watermark, cannot protect software security effectively. Software tamper resistance employs self-checking to protect the security and integrity of the client software.The traditional methods of tamper resistance are dynamic self-checking, software guards, oblivious hash, Encryption based software protection. They check the integrity of software code to resistant code tampering during the software running time. For code-checking contains no information on software behavior, they are weak protection from dynamic tampering. Considering the characters above, proposed an encryption and self-checking based software tamper resistance, which contains program slicing,self-checking and encryption technology.Encryption and self-checking based software tamper resistance uses multi-blocks checking and multi-blocks encrypting. Introduce program slicing to slip the program into many blocks, and add statement checking functions to blocks for access control of blocks. Insert function of security hash into program to check the integrity of code and software behavior information, using the results as key, and compare the results with decryption keys to capture software tamper information.Encryption and self-checking based software tamper resistance technical plan applies encryption and program slicing to protect the core technologies of the client software, and it increases the software complexity, and enhances the security of itself. Use both code self-checking and behavior checking to keep the integrity. Cooperate code self-checking,behavior checking,encryption and program slicing to protect the security of client software.
Keywords/Search Tags:software tamper resistance, self-checking, encryption, program slicing
PDF Full Text Request
Related items