计算机应用 ›› 2013, Vol. 33 ›› Issue (09): 2525-2528.DOI: 10.11772/j.issn.1001-9081.2013.09.2525

• 信息安全 • 上一篇    下一篇

基于分存策略的软件保护博弈模型

王蕊,杨秋翔,陈够喜,马巧梅   

  1. 中北大学 电子与计算机科学技术学院, 太原 030051
  • 收稿日期:2013-03-14 修回日期:2013-05-04 出版日期:2013-09-01 发布日期:2013-10-18
  • 通讯作者: 王蕊
  • 作者简介:王蕊(1989-),女,北京人,硕士研究生,CCF会员,主要研究方向:信息安全、软件保护;
    杨秋翔(1969-),男,山西临汾人,教授,主要研究方向:信息安全、网络拓扑;
    陈够喜(1966-),男,山西太谷人,副教授,博士,主要研究方向:信息隐藏、图像处理;
    马巧梅(1969-),女,山西灵石人,副教授,博士,主要研究方向:网络信息安全、图形图像处理。
  • 基金资助:

    山西省科技攻关项目;中北大学科学研究基金资助项目

Software protection game model based on divided-storage strategy

WANG Rui1,YANG Qiuxiang2,CHEN Gouxi1,MA Qiaomei1   

  1. 1. School of Electronics and Computer Science & Technology, North University of China,Taiyuan Shanxi 030051, China
    2. School of Electronics and Computer Science and Technology, North University of China, Taiyuan Shanxi 030051, China
  • Received:2013-03-14 Revised:2013-05-04 Online:2013-10-18 Published:2013-09-01
  • Contact: WANG Rui

摘要: 软件保护技术普遍是通过完善代码和应用加密方案来达到保护软件的目的。针对软件代码的静态授权抗攻击能力以及软件加密的加密强度是否足够抵抗攻击的问题,提出一种基于分存策略的软件保护博弈模型。该模型采用分存策略对密钥进行分段,得到多个检验与抵抗软件破解者攻击的验证函数,把它们隐藏在程序中,使得软件运行时有多个不同的验证函数对程序进行保护。从博弈论的角度分析论证该模型,并将其应用于软件注册码验证的实例中,提高了软件代码的安全性。实验结果和分析表明了该模型的正确性和有效性。

关键词: 软件保护, 博弈模型, 分存, 游击战术, 注册码验证

Abstract: Current software protection technologies generally achieve the software protection through improving the code and applying encryption scheme. To address the problem of whether the static authorized anti-attack capability of software code and the strength of the software encryption can sufficiently resist attack, the authors proposed a software protection game model based on divided-storage strategy. The strategy of divided-storage was used by the model to divide secret key into many segments, so multiple verified functions that were used to inspect and resist the cracker's attack were received. After being hidden in the program, the program was protected by multiple different verified functions during the running of the software. The model was analyzed and demonstrated from the perspective of game theory, also applied to the instances of software registration code verification. The security of the software code had been improved. The experimental results and analysis show that the proposed model is correct and effective.

Key words: software protection, game model, divided-storage, guerrilla tactics, registration code verification

中图分类号: