Software Protection Method Based on Shell Technology
Abstract: Shell encryption is the most common and safest software encryption technology. The thesis propose new software protection model based on shell technology which is based on the integration of software shell protection model, the so-called “integration” is making the shell program and the original program combined together. When the shell is taken off by cracker, then the part of the original program was also given away, thus reach the purpose of protection software. This thesis also puts forward the solution implementing the model which is based on the code-of-unordered mechanism which means that the original program with shell code are out of order for reaching the goal of integration, at the same time for defensing static recompilation we will add junk code and use SHE technology for anti-dynamic tracking. Ultimately we will implement packing based on the integration of software shell protection model by this solution. The software shell protection model based on the integration has strong software protection ability.
文章引用: 孙元鹏 , 陈文宇 , 李 文 , 郭凌立 , 李维顺 (2012) 基于壳技术的软件保护方法。 软件工程与应用， 1， 47-53. doi: 10.12677/SEA.2012.12009
 赵东方. 基于壳技术的软件保护技术研究[D]. 同济大学, 2009.
 锻钢. 加密与解密(第三版)[M]. 北京: 电子工业出版社, 2008.
 Portable executable. http://en.wikipedia.org/wiki/Portable_Executalbe
 秦杰. 基于IAT加密的加壳程序研究[D]. 电子科技大学, 2009.
 张跃洋. 基于软件壳的研究与实现[D]. 电子科技大学, 2008.
 姚为光. 软件加壳技术的研究[D]. 电子科技大学, 2011.
 徐武华. 软件保护与分析技术的研究与实现[D]. 北京邮电大学, 2011.
 J. Wang. Hardware-assisted protection and isolation. Virginia: George Mason University, 2011.
 C. S. Collberg, C. Thomborson. Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Transactions on Software Engineering, 2002, 28(8): 735-746.
 Microsoft. Microsoft portable executable and common object file format specification revision8.2_September21, 2010@2005-2010 Microsoft Corporation.
 微软. Windows IFS kit and DDK 3700. Microsoft Corporation, 2003
 H. Yin, C. Lin, F. Qiu, et al. A survey of digital watermarking. Journal of Computer Research and Development, 2005, 42(7): 1093-1099.