Tamper proofing technique based on three-thread protection and software guard
YU Yanwei1,2,ZHAO Yaxin2
1. Embedded Systems Laboratory, Suzhou Institute for Advanced Study, University of Science and Technology of China, Suzhou Jiangsu 215123, China
2. School of Software Engineering, University of Science and Technology of China, Hefei Anhui 230051, China
[1]CERVEN P. Crackproof your software: protect your software against crackers [M]. San Francisco: No Starch, 2002.[2]宋扬,李立新,周雁舟,等.软件防篡改技术研究[J].计算机安全,2009(1):34-37.[3]王朝坤,付军宁,王建民,等.软件防篡改技术综述[J].计算机研究与发展,2011,48(6):923-933.[4]JIN H X, LOTPIECH J. Proactive software tampering detection [C]// Proceedings of the 6th International Conference on Information Security. Berlin: Springer, 2003: 352-365.[5]莫翾晟,林和,蔡万景,等.基于RSA算法与自修改机制的软件保护[J].计算机研究与发展,2006,43(z2):140-144.[6]WANG C X, HILL J, KNIGHT J. Software tamper resistance: obstructing static analysis of programs, CS-2000-12 [R]. Charlottesville: University of Virginia, 2000.[7]孙玉霞,陈火炎.UNIX 主机文件完整性校验工具的原理与实现[J].计算机应用与软件,2006,23(6):119-120.[8]沈海波,史毓达.计算机软件的防篡改技术[J].现代计算机,2005(2):64-67.[9]CHANG H, ATALLAH M J. Protecting software code by guards [C]// Proceedings of the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management. Berlin: Springer-Verlag, 2002: 160-175.[10]武少杰,鹤荣育,薛长松,等.基于循环哨兵的软件保护方法研究[J].计算机与现代化,2012(1):161-165.[11]马金鑫,袁丁.基于Windows环境下的进程保护技术的研究与实现[J].计算机应用与软件,2010,27(3):18-21.[12]崔翔,季振洲,袁权.“中国黑客”病毒三线程结构分析[J].计算机工程与应用,2003,39(4):152-153.[13]何志,范明珏,罗彬杰.基于远程线程注入的进程隐藏技术研究[J].计算机应用,2008,28(S1):92-94.[14]YUNG M. How to guard the guards themselves [C]// FCT'09: Proceedings of the 17th International Conference on Fundamentals of Computation Theory. Berlin: Springer-Verlag, 2009: 1-2.