[an error occurred while processing this directive]
���¿��ټ��� �߼�����
   ��ҳ  �ڿ�����  ��ί��  Ͷ��ָ��  �ڿ�����  ��������  �� �� ��  ��ϵ����
�������պ����ѧѧ�� 2006, Vol. 32 Issue (06) :721-724    DOI:
���� ����Ŀ¼ | ����Ŀ¼ | ������� | �߼����� << | >>
��־��, �ܲ���*
�������պ����ѧ �����ѧԺ, ���� 100083
Software encryption and just-in-time decryption for software protection
Liu Zhicheng, Zhou Bosheng*
School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China

Download: PDF (355KB)   HTML 1KB   Export: BibTeX or EndNote (RIS)      Supporting Info
ժҪ ͨ���������������,�Ƿ�ֹ������ͨ�����򹤳��������һ����Ч��ʽ.��ͳ���ܱ�����ʽ,����ʱ���ܿ�����,�����ڲ���һ���Խ��ܷ�ʽ,���ܵ�������ֱ�ӴӴ洢���л�ý��ܺ�ij���ӳ��.����˼�ʱ���ܼ���,�����˴�ͳ��һ�����ܵķ�ʽ,������ʱͨ����ʱ�������Ժ���Ϊ��λһ�����ҿ�����������е�����.����һ�������б���IJ��ֽ���,ʹ�ù��������Ի�������Ľ��ܺ����,���Դ۸IJ��ƹ�δ���ܲ����е������������,��ǿ�˿�������.������Ч����,���ڽ��ܷ�ɢ����,�ͽ����������ʱ��������.�û���һ��һ�ܼ��ܼ���,��Գ���Կ�����㷨���,��һ������������ʱ����,ʹ�øü�����Ŀǰ�������Ͽ�����������.�÷�����ǿ�˻��ڼ��ܵ����������ʵ����,�������ƽ���Ѷ�.
Email Alert
�ؼ����� �������   ���ݰ�ȫ   ����     
Abstract�� Software protection via encryption is an effective way to prevent software pirate from understanding the program by means of reverse engineering. Traditional software protection method via encryption has obvious runtime overhead and start up delay because of its one-time decryption prior to execution. Moreover, fully decrypted code can easily be obtained from memory. A novel approach, called just-in-time(JIT) decryption, was proposed. JIT decryption differs from traditional decryption method in that it decrypts only one function in a time and reveal the secret of the software step by step. The runtime JIT decipherator only decrypts called functions in a certain run of the program. The uncalled functions remain a secret for an attacker, where self-checking code can be hidden. So it is hard for an attacker to understand the entire program and thus hard to remove all the protecting code. Because decryption is scattered, the start up delay no longer exists. One-time pad based cipher further reduce the runtime overhead as compared with symmetric algorithms. JIT decryption makes encryption based software protection more applicable in practice and harder to attack.
Keywords�� software engineering   security of data   protection     
Received 2004-04-15;
About author: ��־��(1978-),��,�ӱ�������,��ʿ��, lzc@buaa.edu.cn.
��־��, �ܲ���.���ڼ��ܺͼ�ʱ���ܵ��������[J]  �������պ����ѧѧ��, 2006,V32(06): 721-724
Liu Zhicheng, Zhou Bosheng.Software encryption and just-in-time decryption for software protection[J]  JOURNAL OF BEIJING UNIVERSITY OF AERONAUTICS AND A, 2006,V32(06): 721-724
http://bhxb.buaa.edu.cn//CN/     ��     http://bhxb.buaa.edu.cn//CN/Y2006/V32/I06/721
Copyright 2010 by �������պ����ѧѧ��