Font Size: a A A

Research On Integrity Verification And Shell Based Software Protection Technology

Posted on:2019-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2348330545993314Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the rapid popularization of computer in all walks of life,the application of software has been greatly diffused,and the software security is a hidden danger.Now the state promoted information security to the national strategic level,and both the commercial and individual users began to pay attention to information security.As an important part of information security,software security has become a hot topic in software engineering.Software reverse engineering is an intersecting research discipline,whose core is to extract data information from software and abstract it into high-level requirements to improve program understanding.With the development of software engineering,software reverse engineering has played an important role.According to different work with the aim of the software reverse engineering analysis,there are two types of reverse analysis.The first category is to understand the implementation details of the analysis of the code from executable procedure,the second is reverse generate high-level abstractions such as design idea,system structure,etc.from the source code.This paper mainly discusses the related ideas and technologies from the perspective of software protection.This paper discusses the mechanism of integrity verification from the level of executable file in reverse engineering.The integrity verification mechanism is a very effective code protection technique,which can be used to detect the relevant information and respond to it once the program is modified.This paper analyzes the thought and implementation of the relevant integrity verification mechanism,elaborates the advantages and disadvantages from the static and dynamic perspective,and finally realizes the integrity verification.Shell is an important technology for software protection.if the attacker want to get the pure version of the executable file,they must pass a shell which is unable to bypass,so shell has important significance for the software protection.In this article,the principle of shell was analyzed to study the essence of shell under Windows PE format and illustrate the shell technology.Finally,an executable file is added through the classic compression shell UPX and then removed manually.
Keywords/Search Tags:Software reverse engineering, Integrity verification, shell
PDF Full Text Request
Related items