The Study on Software Tamper Resistance for Securing a Game Service
暂无分享,去创建一个
In this research, we improved pre-study which was necessary independent compiler and hardware, separating with game service, for prevention of game service counterfeiting, and developed technologies, which executing file itself can execute reverse-analysis by itself and prevent counterfeiting. In detail, suggested method through this research was to install two loaders which can encode and doble-code by separating data section and code section within execution file. For Anti Debugging, game service is automatically terminated when the motion of external debugger is sensed, and, the header of execution file which is referred by disassembling program is changed and made this impossible for Anti Disassembling. Lastly, the data that should be protected are copied in temporary shared memory for Anti Memory Dump as solution.
[1] Matt Bishop,et al. A Critical Analysis of Vulnerability Taxonomies , 1996 .
[2] D. L. Lough,et al. A taxonomy of computer attacks with applications to wireless networks , 2001 .