Font Size: a A A

Design And Implementation Of Software Conformance Testing System

Posted on:2018-01-14Degree:MasterType:Thesis
Country:ChinaCandidate:H P ZhangFull Text:PDF
GTID:2348330518994416Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Along with the birth of computer networks, computer technology are more and more widely known, and has been more and more .widely used.These new upgrades of computer technology will allow us to have more computing capability, high flexibility and convenience, but there is a series of security problems, these problems will not happen in the past without a network environment. Many of the software has been tampered with by malicious users, then appeared such as sabotage, piracy and other negative phenomena. The legitimate interests of manufacturers and consumers is not well protected. Traditional software encryption, code obfuscation, digital watermarking technology has been unable to effectively protect the integrity security of the client software. For the lack of traditional software security technology, software consistency detection technology based on short message remote authentication software technology, to achieve real-time integrity protection of the client software.There are some typical software protection technologies, such as code obfuscation, software watermarking, encryption and tamper proofing.They are used to detect the integrity of the software code in the process of software implementation. These software protection techniques must be embedded into the software, which greatly reduces the practicability and flexibility of software protection. Software conformance testing technology in short message digit, self-test tamper-proof technology based on software compliance testing and other key technologies, given an existing client software conformance testing technical solutions.Software consistency detection technology using a one-way Hash function on the client summary of the periodic calculation software message. Use secure Hash functions to calculate summary of client software, the client sends a request to the monitoring module detection consistency detection module, by comparing the Hash results to determine whether the client software has been tampered with. The program applies to existing client software to protect the integrity and through periodic consistency checking, monitoring the integrity of client software on the server side security, do not need to embed code in the client software.The consistency of software tamper resistant technology program based on short message digests to protect client software, can increase the complexity and security of software protection technology itself. Compare the client software short message digit and stored in the remote reference value than to be detected, so as to realize the protection of the integrity of client software.Finally, this paper uses the software consistency tamper proofing technology to achieve the software consistency detection system. In this paper, the performance of the system is analyzed, and the results show the effectiveness of the improved method.
Keywords/Search Tags:software tamper proofing, consistency detection, short message digest, hash comparison
PDF Full Text Request
Related items