(3.235.25.169) 您好!臺灣時間:2021/04/20 02:15
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:辜女育
論文名稱:EasyLicenseServer:一個應用於軟體保護的簡單架構
論文名稱(外文):Easy license server:a simple framework for software protection
指導教授:薛智文薛智文引用關係
學位類別:碩士
校院名稱:國立中正大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:中文
中文關鍵詞:軟體保護複製保護軟體許可
相關次數:
  • 被引用被引用:0
  • 點閱點閱:366
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
由於全球軟體盜拷盛行,使得軟體的保護日趨重要。軟體盜拷不僅造成每年大量的金錢損失,也形成龐大的社會成本與經濟成本。因此,如何去改善這種情況,是一個急迫且必需的課題。傳統軟體保護的方式是在軟體中插入一些特殊的程式碼;這樣不但會增加軟體開發的負擔,這些特殊程式碼也可以透過一些工具來避過而形同虛設。為了解決這樣的問題,我們提出一個稱為 Easy License Server的架構。Easy License Server 採用主從式架構。其伺服端是一個有數個服務程式在執行的嵌入式系統;這些服務程式負責檢查客戶端是否有權限去執行該被保護的軟體。在客戶端,事先將軟體中不可或缺的元件存放在伺服端上,接著在作業系統層級自動地進行軟體保護,而不需要在被保護的軟體上作任何的修改。這個架構提供一個簡易的方法來作軟體保護並且適用在多人及多套軟體的環境。即使被保護的軟體被非法複製,要是沒有存放在伺服端中的不可或缺元件,該軟體還是沒有辦法執行。我們已在 ARM 7 平台上實作了Easy License Server 的原型;對於大部份的軟體而言,使用 Easy License Server 架構可以很容易地達成更好的軟體保護。

1 Introduction
2 Background
2.1 Hook Mechanism
2.2 Monitor API functions
2.3 Windows Driver
2.4 CreateRemoteThread
2.5 Encryption algorithms
2.5.1 Triple Data Encryption Standard
2.5.2 RSA Algorithm
3 Architecture of Easy License Server
3.1 Client/Server Architecture
3.2 Client of Easy License Server
3.3 Server of Easy License Server
3.4 Communication of Easy License Server
3.5 Other issues
4 Implementation
4.1 Client of Easy License Server
4.1.1 Detecting Process Execution
4.1.2 Checking License at Operating System Level
4.1.3 Downloading the DLL File at Operating System Level
4.1.4 Con‾gure the Hook System
4.2 Server of Easy License Server
4.3 Tools for Setting Up License Server
4.4 Communication Between Client and Server
5 System Analysis
5.1 Security Analysis
5.1.1 Protected by Hook Server
5.1.2 Protected by DLL
5.1.3 Against Tampering
5.1.4 Hardware Supported Protection
5.1.5 Has no DLL
5.1.6 Hackers and Vendors
5.2 Performance Analysis
5.2.1 Overhead of Framework
5.2.2 Promote the Security
6 Conclusion and Future Work
Bibliography

[1] 3DES and Encryption Algorithm. http://www.faqs.org/rfcs/rfc3217.html.
[2] RSA Algorithm. http://www.di-mgt.com.au/rsa alg.html. 2002.
[3] Business Software Alliance. http://www.bsaa.com.au/media/‾nal7thannualglobalsoftwarepiracystudyjune2002.pdf. June 2002.
[4] Art Baker and Jerry Lozano. The Windows 2000 Device Driver Book.Prentice Hall, 2000.
[5] Hoi Chang and Mikhail J. Atallah. Protecting software codes by guards.CERIAS Tech Report, 2001.
[6] CreateRemoteThread. http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dllproc/base/createremotethread.asp. 2004.
[7] Premkumar T. Devanbu and Stuart Stubblebine. Software engineering for security: a roadmap. Proceedings of the conference on The future of Software engineering, May 2000.
[8] James Finnegan. Nerditorium. Microsoft Systems Journal, 1999.
[9] Oded Goldeich and Rafail Ostrovsky. Software protection and simulation on oblivious rams. Journal of the ACM, 43, May 1996.
[10] Ivo Ivanov. Detecting windows nt/2k process execution. THE CODE PROJECT Your Visual Studio .NET Homepage, March 2002.
[11] Source Code Obfuscators. http://www.semanticdesigns.com/products/obfuscators/index.html?home=htmlobfuscation.
[12] National Institute of Standards and Technology. http://www.nist.gov/.
[13] Nobuo Okabe. Security requirements and impacts for embedded systems
http://www.taca.jp/docs/v6summit-20021218/ws3_okabe.pdf.
[14] Dotfuscator White Paper. http://www.preemptive.com/documentation/dotfuscator whitepaper.pdf.
[15] Je®rey Richter. Load your 32-bit dll into another process's address space using injlib. Microsoft Systems Journal, May 1994.
[16] R.L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21, February 1978.
[17] David A. Solomon and Mark Russinovich. Inside Microsoft Windows 2000, Third Edition. MicroSoft, 2002.
[18] White S.R. and Comerford L. Abyss: An architecture for software protection. IEEE Transactions on Software Engineering, pages 619{629, 1990.
[19] Introduction to the Cloakware/Transcoder. http://www.cloakware.com/downloads/introduction to application security _ pdf.
[20] Bennett Yee and J. D. Tygar. Secure coprocessors in electronic commerce applications. Proceedings of The First USENIX Workshop on Electronic Commerce, July 1995.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關論文
 
系統版面圖檔 系統版面圖檔