Font Size: a A A

English Title Of Master Thesis With The Implementation Of The Registration Verification Design Based On HEV Technology

Posted on:2017-02-02Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y ZhengFull Text:PDF
GTID:2308330485986559Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Currently both commercial software and application software of the mainstream software vendors protect their intellectual property rights with the traditional technology based on registration verification code. Registration verification code plays an important role in protecting intellectual property rights at the early stages of software development.This mode, however, is mostly realized based on the Ring-3 layer and few based on the Ring-0 layer(hardware registration dongle). The operating system vendors reserve the anti-debugging mechanism for the R3 layer, so it is very easy for malicious codes to manipulate the Ring-3 mode. Disassembling can even restore the code reversely. For this reason, reverse modification in accordance with the corresponding anti-debugging technology has become a common practice in the industry. As a matter of fact, all the existing protection methods are subject to modification and secondary development by way of decompilation and reverse engineering. In this regard, a more reliable and safer protection method has been long wanted for software encryption and protection.Based on CPU, Hardware Enabled Virtualization(HEV) operates directly at the CPU layer and can start the virtual machine of the same level with the system. Since the virtual machine is responsible for the complete simulation of full hardware and system,there is very clear boundary with the host system. No internal modification of the virtual machine system permeates outside. Likewise, no modification of the host system works directly on the virtual machine system. The routine call in the virtual machine is safe.Traditional protection means find it difficult to prevent malicious code from illegally modification of the register. HEV installs the protection program in the virtual machine by beating to the timeline so that later programs are unable to enter the virtual machine.In this way, the virtual machine is protected from malicious codes.This study covers HEV protection and registration verifier. HEV protection primarily realizes anti-debugging and memory protection. Registered verifier includes verification and call for HEV protection module. Verification realizes the function of registration code verification and it includes a complete registration code generator and registration verifier. With HEV technology protection, the protected loading protects the registration code verifier so that the registration code validation program is protected from any third party program in terms of modification or debugging. The HEV modulecan realize anti-debugging and memory protection.Tests of code invasion and memory cheating prove that the software protection mechanism based on hardware virtualization framework can protect software effectively,hide itself, prevent the invasion of malicious code, and realize complete protection and detection of registration validation system.
Keywords/Search Tags:HEV, hardware virtualization, registration verifier, virtual machine
PDF Full Text Request
Related items