Computer and Modernization ›› 2012, Vol. 1 ›› Issue (1): 161-165,.doi: 10.3969/j.issn.1006-2475.2012.01.042

• 信息安全 • Previous Articles     Next Articles

Study of Software Protection Method Based on Cyclical Guards

WU Shao-jie1, HE Rong-yu1, XUE Chang-song2, XIE Hong-tao1   

  1. 1. Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004, China;2. Unit 95879, Chinese People’s Liberation Army, Chengdu 610081, China
  • Received:2011-08-19 Revised:1900-01-01 Online:2012-01-10 Published:2012-01-10

Abstract: Protecting software codes from illegal tampers is a severe problem for software developers. Based on the idea of guards, this paper proposes a cycling guards model which can protect the integrity of the program with more flexible way. All the guards form cycle chain to ensure that each guard is protected by other guards, to protect the integrity of the software itself, at the same time ensuring the security of guards. Meanwhile, the paper proposes a protocol of data integrity check to check integrity of checking guards real-time and proves the protocol’s security.

Key words: software protection, integrity checking, guard, cyclical guard

CLC Number: