Font Size: a A A

Research And Implementation Of Packing Shared Software

Posted on:2010-12-02Degree:MasterType:Thesis
Country:ChinaCandidate:J YangFull Text:PDF
GTID:2178360272499461Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In order to obstruct internet trend of pirate, we combine law and software technology to do that, but taking protection technology as main method is a nature way of solving software's right protection. Software protection solutions can be divided into pure software protection techniques and the use of additional hardware protection technology. But, in fact, only some professional field will use the additional hardware to protect software. For sharing software and some common software those are on sale on the network, the pure software protection solution is the best option. The most fashioned technical is software packing technology.Thesis started research approach from copy protection, and systematically introduced sharing software copy protection mechanisms, anti-reverse technology and PE files such as basic concepts and basic skills on the basis of packing, and show the software design and program implementation. This paper base on injecting code into PE file and anti-reverse technology, we design packing software's the main program and the shell structure of the code with VC ++6.0.In recognition of the traditional packing software has been extensive and in-depth research, the protection is not strong on the basis of the modular structure of topics designed a simple instrument packing necessarily change the import table of original file in form and dump it, also design relevant import table structure. Confirming rough project, then basically realize the effective protection to many simple software. At the same time, starting from the angle of Anti-Debug technique, we thoroughly analyze the means how protect procedures in order to avoid cracking more rationally. Then we adopted relevant measure to realize during the design of procedure.The further study ways of the SDK shell technology. This technology is to use the SDK to be protected mode encryption key procedure code, and decryption function on the shell Lane, making the procedure followed in the shell code can not decrypt the key, then the procedure can not be normal operation, thus further strengthening of the shell more difficult.
Keywords/Search Tags:Copy protection, Reverse Engineering, The Format of PE File, Packing Technolog
PDF Full Text Request
Related items