Font Size: a A A

Research And Implementation Of Packing Technique For Data Security Management System

Posted on:2009-09-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y J GaoFull Text:PDF
GTID:2178360278456646Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
In the internal network of military colleges and army, mobile storage devices are more and more frequently used as carriers to exchange information between internal and external network. This possibly cause some internal information to leak through mobile storage devices. The appearance of "data security management system of internet" standardizes the mobile storage device managements, prevents important internal information from leaking and enhances security. But "data security management system of internat" is an open programme, it is easy to be disassembled and modified by attackers and loses the ability to protect data.Based on the characteristic of software security protection, many kinds of software security protection technique can be adopted to "data security management system " ,including new "packing" technique, in order to resolve the problem of "data security management system" be disassembled and modified by the attacker or cracker.In this paper, firstly, the present research situation of the relevant technology at home and abroad are introduced briefly, together with the practical meaning of the research. Secondly, the paper introduces the technology of static analysis, dynamic analysis and reverse engineering, and analyzes the common attack on software through assembling and compiling, and introduces the general methods to fight static analysis, dynamic analysis and reverse engineering, which offered the theoretical basis for the implementation of the subject. In addition, the software packing technique is analyzed and further studies are discussed from PE relevant technology, PE file packing principle and other software protection technology, which offered theoretical basis and important reference value to the subject. Considered hardware encryption, the shell is studied and designed based on intelligent dongle. This paper mainly analyzes the application and function of intelligent dongle in the shell technology and the encryption and storage of the key code. This software shelling technology is an innovation on the study of software protection, neither different from the protection of the executable program provided by intelligent dongle, nor the traditional protection through adding a shell. Finally, the subject complement the pack by the means of compressing and encryption, realize the pack to the "data security management system" with the help of compiled EXE protector, compared the efficiency of compressing and uncompressing between ZIP and LZO, and encrypte the key code by dislocation exchange, and then realized the reverse software analysis technology to the common attacks based on analyzing the code of the loader.This paper has been realized the intact compressing and encryption shell, and succeed in applying in the protect of "data security management system".
Keywords/Search Tags:pack, the software analyzes, PE file, intelligence encryption dongles, reverse engineering
PDF Full Text Request
Related items