网络与信息安全学报 ›› 2018, Vol. 4 ›› Issue (5): 47-54.doi: 10.11959/j.issn.2096-109x.2018038
潘雁,林伟
修回日期:
2018-04-27
出版日期:
2018-05-01
发布日期:
2018-08-04
作者简介:
潘雁(1995-),男,安徽安庆人,信息工程大学硕士生,主要研究方向为网络与信息安全、软件保护与逆向。|林伟(1986-),男,湖南常德人,博士,信息工程大学讲师,主要研究方向为软件保护与分析、网络安全。
基金资助:
Yan PAN,Wei LIN
Revised:
2018-04-27
Online:
2018-05-01
Published:
2018-08-04
Supported by:
摘要:
为了对抗基于数据流逆向分析的语义攻击,以虚拟寄存器为切入点,提出了一种增强型虚拟寄存器轮转算法。该算法通过在解释执行中随机打乱部分虚拟寄存器与操作数的虚拟编译映射关系,有效地增加了虚拟机在解释执行过程中的数据流复杂度;同时,随机采用3种机制对轮转长度进行设定,增强了虚拟机代码保护系统的多样性。最后,设计实现了采用增强型虚拟寄存器轮转算法的虚拟机代码保护原型系统,验证了该算法的有效性。
中图分类号:
潘雁,林伟. 增强型虚拟寄存器轮转算法[J]. 网络与信息安全学报, 2018, 4(5): 47-54.
Yan PAN,Wei LIN. Enhanced method based on virtual registers rotation[J]. Chinese Journal of Network and Information Security, 2018, 4(5): 47-54.
[1] | NEWSOME J , SONG D . Dynamic taint analysis for automatic detection,analysis,and signature generation of exploits on commodity software[J]. Chinese Journal of Engineering Mathematics, 2005,29(5): 720-724. |
[2] | 徐欣 . 动态数据流分析技术在恶意软件分析中的应用研究[D]. 合肥:中国科学技术大学, 2016. |
XU X . Research of dynamic data flow analysis technology application in malware analysis[D]. Hefei:University of Science and Technology of China, 2016. | |
[3] | REDDI JANAPA V ,et al. PIN:a binary instrumentation tool for computer architecture research and education[C]// The Workshop on Computer Architecture Education, 2004:22. |
[4] | CHOW J , PFAFF B , GARFINKEL T ,et al. Understanding data lifetime via whole system simulation[C]// Usenix Security Symposium, 2004: 321-336. |
[5] | SHARIF M , LANZI A , GIFFIN J ,et al. Automatic reverse engineering of malware emulators[C]// 2009 30th IEEE Symposium on Security and Privacy. 2009: 94-109. |
[6] | 黄荷洁, 康绯, 舒辉 ,等. 基于动态数据流分析的虚拟机保护破解技术[J]. 计算机工程, 2014,40(9): 59-65. |
HUANG H J , KANG F , SHU H ,et al. Reverse technology of virtual machine protection based on dynamic dataflow analysis[J]. Computer Engineering, 2014,40(9): 59-65. | |
[7] | 徐方华 . 基于虚拟堆的虚拟保护技术的研究[D]. 昆明:云南大学, 2013. |
XU F H . Research on virtual protection technology based on virtual heap[D]. Kunming:Yunnan University, 2013. | |
[8] | WANG H , FANG D , LI G ,et al. NISLVMP:improved virtual machine-based software protection[C]// The Ninth International Conference on Computational Intelligence and Security. 2013: 479-483. |
[9] | 舒柏程, 李毅超, 曹跃 . 基于虚拟机的软件保护技术研究[J]. 计算机工程与科学, 2008,30(A1): 25-28. |
SHU B C , LI Y C , CAO Y . Research on software protection based on virtual machine[J]. Computer Engineering & Science, 2008,30(A1): 25-28. | |
[10] | GHOSH S , HISER J , DAVIDSON J W . Replacement attacks against VM-protected applications[C]// ACM Sigplan/sigops Conference on Virtual Execution Environments. 2012: 203-214. |
[11] | COOGAN K P . Deobfuscation of packed and virtualization-obfuscation protected binaries[D]. Arizona:University of Arizona, 2011. |
[12] | COOGAN K , LU G , DEBRAY S . Deobfuscation of virtualization-obfuscated software:a semantics-based approach[C]// ACM Conference on Computer and Communications Security. 2011: 275-284. |
[13] | 房鼎益, 张恒, 汤战勇 ,等. 一种抗语义攻击的虚拟化软件保护方法[J]. 四川大学学报(工程科学版), 2017,49(1): 159-168. |
FANG D Y , ZHANG H , TANG Z Y ,et al. DAS-VMP:a virtual machine-based software protection method for defending against semantic attacks[J]. Journal of Sichuan University (Advanced Engineering Sciences), 2017,49(1): 159-168. | |
[14] | 谢鑫, 刘粉林, 芦斌 ,等. Handler混淆增强的虚拟机保护方法[J]. 计算机工程与应用, 2016,52(15): 146-152. |
XIE X , LIU F L , LU B ,et al. Virtual machine protection based on Handler obfuscation enhancement[J]. Computer Engineering and Applications, 2016,52(15): 146-152. | |
[15] | 谢鑫, 刘粉林, 芦斌 ,等. 一种基于代码并行化和虚拟机多样化的软件保护方法[J]. 小型微型计算机系统, 2015,36(11): 2588-2593. |
XIE X , LIU F L , LU B ,et al. Software protection scheme based on code parallelization and virtual machine diversity[J]. Journal of Chinese Computer Systems, 2015,36(11): 2588-2593. | |
[16] | 房鼎益, 赵媛, 王怀军 ,等. 一种具有时间多样性的虚拟机软件保护方法[J]. 软件学报, 2015,26(6): 1322-1339. |
FANG D Y , ZHAO Y , WANG H J ,et al. Software protection based on virtual machine with time diversity[J]. Journal of Software, 2015,26(6): 1322-1339. | |
[17] | WANG H J , FANG D Y , LI G ,et al. TDVMP:Improved virtual machine-based software protection with time diversity[C]// ACM Sigplan on Program Protection and Reverse Engineering Workshop. 2014: 1-9. |
[18] | WANG H J , FANG D Y , LI G ,et al. NISLVMP:improved virtual machine-based software protection[C]// The Ninth International Conference on Computational Intelligence and Security. 2013: 479-483. |
[19] | KUANG K , TANG Z , GONG X ,et al. Exploiting dynamic scheduling for vm-based code obfuscation[C]// IEEE Trustcom/bigdatase/ispa. 2017: 489-496. |
[20] | KUANG K , TANG Z , GONG X ,et al. Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling[J]. Computers & Security, 2018,74: 202-220. |
[21] | TANG Z , LI G , FANG D ,et al. Code virtualized protection system with instruction set randomization[J]. Journal of Huazhong University of Science & Technology, 2016. |
[22] | XU J F , ZHANG W , SUN B . Research on software protection based on virtual machine[J]. Journal of China Universities of Posts &Telecommunications, 2012,19(S1): 122-126. |
[1] | 陈晓姣, 林宪正, 俞能海. 比特币区块链的数据压缩[J]. 网络与信息安全学报, 2021, 7(1): 76-83. |
[2] | 耿普,祝跃飞. 分支混淆中的条件异常代码构造研究[J]. 网络与信息安全学报, 2020, 6(6): 25-34. |
[3] | 张效林,谷大武,张驰. 移动平台典型应用的身份认证问题研究[J]. 网络与信息安全学报, 2020, 6(6): 137-151. |
[4] | 耿普,祝跃飞. 路径分支混淆研究综述[J]. 网络与信息安全学报, 2020, 6(2): 12-18. |
[5] | 雷凯,束方兴,黄磊,章奇超. 面向跨域可信的泛中心化区块链DNS架构研究[J]. 网络与信息安全学报, 2020, 6(2): 19-34. |
[6] | 包子健,王庆豪,张永欣,王斌,鲁宁,史闻博. 可监管的比特币隐私保护混淆服务[J]. 网络与信息安全学报, 2019, 5(4): 40-51. |
[7] | 丁庆洋, 朱建明, 张瑾, 宋彪, 许艳静, 贾传昌, 高政. 基于双层架构的溯源许可链共识机制[J]. 网络与信息安全学报, 2019, 5(2): 1-12. |
[8] | 陈晓,吕欣冉,刘志. 基于隐私保护的法定“数字货币”激励机制[J]. 网络与信息安全学报, 2019, 5(2): 30-39. |
[9] | 赵昊,林伟,刘胜利. P2P网络顽健性增强的方法[J]. 网络与信息安全学报, 2019, 5(2): 88-94. |
[10] | 李毅鹏,阮叶丽,张杰. 基于融合GMM聚类与FOA-GRNN模型的推荐算法[J]. 网络与信息安全学报, 2018, 4(12): 25-31. |
[11] | 朱智强,苏航,孙磊,李作辉. 云存储中基于属性的关键词搜索加密方案研究[J]. 网络与信息安全学报, 2017, 3(11): 1-11. |
[12] | 高元照,李学娟,李炳龙,吴熙曦. 云计算取证模型[J]. 网络与信息安全学报, 2017, 3(9): 13-23. |
[13] | 张磊,马春光,杨松涛,李增鹏. 面向关联攻击的轨迹匿名方法[J]. 网络与信息安全学报, 2017, 3(6): 8-20. |
[14] | 徐军. 基于生物特性可信接入协议的可信计算移动终端的应用研究[J]. 网络与信息安全学报, 2017, 3(2): 66-76. |
[15] | 张毅凡,董笑菊. 分布式拒绝服务的可视分析[J]. 网络与信息安全学报, 2017, 3(2): 53-65. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|