Font Size: a A A

Virtual Stack Of Virtual Protection Technology

Posted on:2014-05-17Degree:MasterType:Thesis
Country:ChinaCandidate:F H XuFull Text:PDF
GTID:2268330401953249Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Looking at today’s virtual protection technology, it occupies a pivotal position.It mainly divided into two parts, stack-based and register-based virtual protection, but both of these two models have their own shortcomings.Due to all data will be put on registers on register-based model, it greatly reduces the degree of flexibility, it is easier to be cracked than a stack-based virtual machine. Because of every operations are on the stack,stack-based virtual machine model analysis only need to find and lock the virtual stack, that can understand the flow of the entire program. This thesis is committed to build a new virtual protection model, The main work of this paper is as follows:First, this thesis will put forward a new virtual model of protection, and this will be named as Heap-Based Virtual Machine Model. This is fundamentally different from these two main kinds of virtual model, it will virtualize in the heap space, this virtual protection model will both virtualize the hardware and code.Second, make the virtual heap to a small top heap, because of the memory segments are not continuous, and a large quantity of data duplication, so as for hardware virtualization, heap-based virtual protection will put all registers and stack to the virtual heap, and abolish the concept of the stack and registers, so it can confusion the data operations and heap operations.Third, as for code virtualization, it also build the dispatch function table of random rotation, it will rotate all the contents of the function table several times, and then correct sequence of virtual instructions, this mechanism will make the dispatch table not same for anytime,and make the protected program more difficult to trace.Finally, this thesis builds the process architecture of the Heap-Based virtual protection model, point out every step of the key steps.In summary, the Heap-based virtual protection model is put forward by this thesis, after two main model of virtual protection model have been published. Heap-Based virtual protection model has the advantage of the both main models. this article will build the whole architecture of Heap-Based virtual protection model, and it will have a certain value in the field of software protection. In addition, in the trend of cloud and cloud computing, the protection of sharing resource rights is increasingly important. Heap-based virtural protection will brings a more secure protection for for these sharing resource, and it also has a important value in cloud and cloud computing field.
Keywords/Search Tags:Software Shell, Heap-Based, Virtual Machine Protection
PDF Full Text Request
Related items