Code protection method based on intermediate language

The invention provides a code protection method based on an intermediate language. The code protection method comprises the following steps: compiling a source code of a function to be protected into a first intermediate language; translating the first intermediate language into a virtualized instru...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: SHU JUNLIANG, XIAO XUANGAN, LI JUANRU, ZHANG YUANYUAN, YANG WENBO, ZHOU WENJUN
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator SHU JUNLIANG
XIAO XUANGAN
LI JUANRU
ZHANG YUANYUAN
YANG WENBO
ZHOU WENJUN
description The invention provides a code protection method based on an intermediate language. The code protection method comprises the following steps: compiling a source code of a function to be protected into a first intermediate language; translating the first intermediate language into a virtualized instruction code; modifying a calling mode of the to-be-protected function into a mode of executing the virtualized instruction code by adopting an interpreter; compiling an interpreter function of the interpreter, and compiling the interpreter function into a second intermediate language; merging the virtualization instruction code and the second intermediate language to obtain a third intermediate language; and confusing the third intermediate language. According to the code virtualization scheme based on the intermediate language, software codes are protected through the powerful strength of code virtualization, and the reverse engineering workload of attackers is greatly increased; compared with the existing mode tha
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN113626773A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN113626773A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN113626773A3</originalsourceid><addsrcrecordid>eNrjZDB1zk9JVSgoyi9JTS7JzM9TyE0tychPUUhKLE5NUQDyM_NKUotyU1MyE0tSFXIS89JLE9NTeRhY0xJzilN5oTQ3g6Kba4izh25qQX58anFBYnJqXmpJvLOfoaGxmZGZubmxozExagBsdS1C</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Code protection method based on intermediate language</title><source>esp@cenet</source><creator>SHU JUNLIANG ; XIAO XUANGAN ; LI JUANRU ; ZHANG YUANYUAN ; YANG WENBO ; ZHOU WENJUN</creator><creatorcontrib>SHU JUNLIANG ; XIAO XUANGAN ; LI JUANRU ; ZHANG YUANYUAN ; YANG WENBO ; ZHOU WENJUN</creatorcontrib><description>The invention provides a code protection method based on an intermediate language. The code protection method comprises the following steps: compiling a source code of a function to be protected into a first intermediate language; translating the first intermediate language into a virtualized instruction code; modifying a calling mode of the to-be-protected function into a mode of executing the virtualized instruction code by adopting an interpreter; compiling an interpreter function of the interpreter, and compiling the interpreter function into a second intermediate language; merging the virtualization instruction code and the second intermediate language to obtain a third intermediate language; and confusing the third intermediate language. According to the code virtualization scheme based on the intermediate language, software codes are protected through the powerful strength of code virtualization, and the reverse engineering workload of attackers is greatly increased; compared with the existing mode tha</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2021</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20211109&amp;DB=EPODOC&amp;CC=CN&amp;NR=113626773A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,309,781,886,25566,76549</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20211109&amp;DB=EPODOC&amp;CC=CN&amp;NR=113626773A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SHU JUNLIANG</creatorcontrib><creatorcontrib>XIAO XUANGAN</creatorcontrib><creatorcontrib>LI JUANRU</creatorcontrib><creatorcontrib>ZHANG YUANYUAN</creatorcontrib><creatorcontrib>YANG WENBO</creatorcontrib><creatorcontrib>ZHOU WENJUN</creatorcontrib><title>Code protection method based on intermediate language</title><description>The invention provides a code protection method based on an intermediate language. The code protection method comprises the following steps: compiling a source code of a function to be protected into a first intermediate language; translating the first intermediate language into a virtualized instruction code; modifying a calling mode of the to-be-protected function into a mode of executing the virtualized instruction code by adopting an interpreter; compiling an interpreter function of the interpreter, and compiling the interpreter function into a second intermediate language; merging the virtualization instruction code and the second intermediate language to obtain a third intermediate language; and confusing the third intermediate language. According to the code virtualization scheme based on the intermediate language, software codes are protected through the powerful strength of code virtualization, and the reverse engineering workload of attackers is greatly increased; compared with the existing mode tha</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2021</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDB1zk9JVSgoyi9JTS7JzM9TyE0tychPUUhKLE5NUQDyM_NKUotyU1MyE0tSFXIS89JLE9NTeRhY0xJzilN5oTQ3g6Kba4izh25qQX58anFBYnJqXmpJvLOfoaGxmZGZubmxozExagBsdS1C</recordid><startdate>20211109</startdate><enddate>20211109</enddate><creator>SHU JUNLIANG</creator><creator>XIAO XUANGAN</creator><creator>LI JUANRU</creator><creator>ZHANG YUANYUAN</creator><creator>YANG WENBO</creator><creator>ZHOU WENJUN</creator><scope>EVB</scope></search><sort><creationdate>20211109</creationdate><title>Code protection method based on intermediate language</title><author>SHU JUNLIANG ; XIAO XUANGAN ; LI JUANRU ; ZHANG YUANYUAN ; YANG WENBO ; ZHOU WENJUN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN113626773A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2021</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>SHU JUNLIANG</creatorcontrib><creatorcontrib>XIAO XUANGAN</creatorcontrib><creatorcontrib>LI JUANRU</creatorcontrib><creatorcontrib>ZHANG YUANYUAN</creatorcontrib><creatorcontrib>YANG WENBO</creatorcontrib><creatorcontrib>ZHOU WENJUN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SHU JUNLIANG</au><au>XIAO XUANGAN</au><au>LI JUANRU</au><au>ZHANG YUANYUAN</au><au>YANG WENBO</au><au>ZHOU WENJUN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Code protection method based on intermediate language</title><date>2021-11-09</date><risdate>2021</risdate><abstract>The invention provides a code protection method based on an intermediate language. The code protection method comprises the following steps: compiling a source code of a function to be protected into a first intermediate language; translating the first intermediate language into a virtualized instruction code; modifying a calling mode of the to-be-protected function into a mode of executing the virtualized instruction code by adopting an interpreter; compiling an interpreter function of the interpreter, and compiling the interpreter function into a second intermediate language; merging the virtualization instruction code and the second intermediate language to obtain a third intermediate language; and confusing the third intermediate language. According to the code virtualization scheme based on the intermediate language, software codes are protected through the powerful strength of code virtualization, and the reverse engineering workload of attackers is greatly increased; compared with the existing mode tha</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN113626773A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Code protection method based on intermediate language
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-17T22%3A24%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SHU%20JUNLIANG&rft.date=2021-11-09&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN113626773A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true