Code protection method based on intermediate language
The invention provides a code protection method based on an intermediate language. The code protection method comprises the following steps: compiling a source code of a function to be protected into a first intermediate language; translating the first intermediate language into a virtualized instru...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | SHU JUNLIANG XIAO XUANGAN LI JUANRU ZHANG YUANYUAN YANG WENBO ZHOU WENJUN |
description | The invention provides a code protection method based on an intermediate language. The code protection method comprises the following steps: compiling a source code of a function to be protected into a first intermediate language; translating the first intermediate language into a virtualized instruction code; modifying a calling mode of the to-be-protected function into a mode of executing the virtualized instruction code by adopting an interpreter; compiling an interpreter function of the interpreter, and compiling the interpreter function into a second intermediate language; merging the virtualization instruction code and the second intermediate language to obtain a third intermediate language; and confusing the third intermediate language. According to the code virtualization scheme based on the intermediate language, software codes are protected through the powerful strength of code virtualization, and the reverse engineering workload of attackers is greatly increased; compared with the existing mode tha |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN113626773A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN113626773A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN113626773A3</originalsourceid><addsrcrecordid>eNrjZDB1zk9JVSgoyi9JTS7JzM9TyE0tychPUUhKLE5NUQDyM_NKUotyU1MyE0tSFXIS89JLE9NTeRhY0xJzilN5oTQ3g6Kba4izh25qQX58anFBYnJqXmpJvLOfoaGxmZGZubmxozExagBsdS1C</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Code protection method based on intermediate language</title><source>esp@cenet</source><creator>SHU JUNLIANG ; XIAO XUANGAN ; LI JUANRU ; ZHANG YUANYUAN ; YANG WENBO ; ZHOU WENJUN</creator><creatorcontrib>SHU JUNLIANG ; XIAO XUANGAN ; LI JUANRU ; ZHANG YUANYUAN ; YANG WENBO ; ZHOU WENJUN</creatorcontrib><description>The invention provides a code protection method based on an intermediate language. The code protection method comprises the following steps: compiling a source code of a function to be protected into a first intermediate language; translating the first intermediate language into a virtualized instruction code; modifying a calling mode of the to-be-protected function into a mode of executing the virtualized instruction code by adopting an interpreter; compiling an interpreter function of the interpreter, and compiling the interpreter function into a second intermediate language; merging the virtualization instruction code and the second intermediate language to obtain a third intermediate language; and confusing the third intermediate language. According to the code virtualization scheme based on the intermediate language, software codes are protected through the powerful strength of code virtualization, and the reverse engineering workload of attackers is greatly increased; compared with the existing mode tha</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2021</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20211109&DB=EPODOC&CC=CN&NR=113626773A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,309,781,886,25566,76549</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20211109&DB=EPODOC&CC=CN&NR=113626773A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SHU JUNLIANG</creatorcontrib><creatorcontrib>XIAO XUANGAN</creatorcontrib><creatorcontrib>LI JUANRU</creatorcontrib><creatorcontrib>ZHANG YUANYUAN</creatorcontrib><creatorcontrib>YANG WENBO</creatorcontrib><creatorcontrib>ZHOU WENJUN</creatorcontrib><title>Code protection method based on intermediate language</title><description>The invention provides a code protection method based on an intermediate language. The code protection method comprises the following steps: compiling a source code of a function to be protected into a first intermediate language; translating the first intermediate language into a virtualized instruction code; modifying a calling mode of the to-be-protected function into a mode of executing the virtualized instruction code by adopting an interpreter; compiling an interpreter function of the interpreter, and compiling the interpreter function into a second intermediate language; merging the virtualization instruction code and the second intermediate language to obtain a third intermediate language; and confusing the third intermediate language. According to the code virtualization scheme based on the intermediate language, software codes are protected through the powerful strength of code virtualization, and the reverse engineering workload of attackers is greatly increased; compared with the existing mode tha</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2021</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDB1zk9JVSgoyi9JTS7JzM9TyE0tychPUUhKLE5NUQDyM_NKUotyU1MyE0tSFXIS89JLE9NTeRhY0xJzilN5oTQ3g6Kba4izh25qQX58anFBYnJqXmpJvLOfoaGxmZGZubmxozExagBsdS1C</recordid><startdate>20211109</startdate><enddate>20211109</enddate><creator>SHU JUNLIANG</creator><creator>XIAO XUANGAN</creator><creator>LI JUANRU</creator><creator>ZHANG YUANYUAN</creator><creator>YANG WENBO</creator><creator>ZHOU WENJUN</creator><scope>EVB</scope></search><sort><creationdate>20211109</creationdate><title>Code protection method based on intermediate language</title><author>SHU JUNLIANG ; XIAO XUANGAN ; LI JUANRU ; ZHANG YUANYUAN ; YANG WENBO ; ZHOU WENJUN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN113626773A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2021</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>SHU JUNLIANG</creatorcontrib><creatorcontrib>XIAO XUANGAN</creatorcontrib><creatorcontrib>LI JUANRU</creatorcontrib><creatorcontrib>ZHANG YUANYUAN</creatorcontrib><creatorcontrib>YANG WENBO</creatorcontrib><creatorcontrib>ZHOU WENJUN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SHU JUNLIANG</au><au>XIAO XUANGAN</au><au>LI JUANRU</au><au>ZHANG YUANYUAN</au><au>YANG WENBO</au><au>ZHOU WENJUN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Code protection method based on intermediate language</title><date>2021-11-09</date><risdate>2021</risdate><abstract>The invention provides a code protection method based on an intermediate language. The code protection method comprises the following steps: compiling a source code of a function to be protected into a first intermediate language; translating the first intermediate language into a virtualized instruction code; modifying a calling mode of the to-be-protected function into a mode of executing the virtualized instruction code by adopting an interpreter; compiling an interpreter function of the interpreter, and compiling the interpreter function into a second intermediate language; merging the virtualization instruction code and the second intermediate language to obtain a third intermediate language; and confusing the third intermediate language. According to the code virtualization scheme based on the intermediate language, software codes are protected through the powerful strength of code virtualization, and the reverse engineering workload of attackers is greatly increased; compared with the existing mode tha</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN113626773A |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Code protection method based on intermediate language |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-17T22%3A24%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SHU%20JUNLIANG&rft.date=2021-11-09&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN113626773A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |