Software obfuscation
First Claim
Patent Images
1. Computer-readable media having computer-executable instructions stored thereon for use by a computing system to protect software tampering, comprising:
- a protection dynamic link library containing obfuscated computer-executable instructions that monitor a database for tampering, verify the originality of a set of files, and stop unauthorized services from execution.
2 Assignments
0 Petitions
Accused Products
Abstract
Tampering with pieces of software is inhibited. Software obfuscation inhibits reverse engineering by hackers by manipulating names of functions and adding jump instructions into various pieces of software. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.
-
Citations
20 Claims
-
1. Computer-readable media having computer-executable instructions stored thereon for use by a computing system to protect software tampering, comprising:
a protection dynamic link library containing obfuscated computer-executable instructions that monitor a database for tampering, verify the originality of a set of files, and stop unauthorized services from execution. - View Dependent Claims (2, 3, 4, 5)
-
6. A computer-implemented method for producing computer-readable media having computer-executable instructions stored thereon for use by a computing system to inhibit software tampering, the method comprising:
-
forming an obfuscated protection dynamic link library that monitors a database for tampering, verifies the originality of a set of files, and stops unauthorized services from execution, in which names of classes, methods, fields, and control flows are obfuscated; and
creating a digitally signed catalog file that contains a checksum of the obfuscated protection dynamic link library. - View Dependent Claims (7, 8, 9, 10, 12, 13, 14, 15)
-
-
11. A computer-readable medium having computer-executable instructions stored thereon for implementing a method that inhibits software tampering, comprising:
-
forming an obfuscated protection dynamic link library that monitors a database for tampering, verifies the originality of a set of files, and stops unauthorized services from execution, in which names of classes, methods, fields, and control flows are obfuscated; and
creating a digitally signed catalog file that contains a checksum of the obfuscated protection dynamic link library.
-
-
16. A system for producing computer-readable media having computer-executable instructions stored thereon for use by a computing system to inhibit software tampering, the method comprising:
-
means for forming an obfuscated protection dynamic link library that monitors a database for tampering, verifies the originality of a set of files, and stops unauthorized services from execution, in which names of classes, methods, fields, and control flows are obfuscated; and
means for creating a digitally signed catalog file that contains a checksum of the obfuscated protection dynamic link library. - View Dependent Claims (17, 18, 19, 20)
-
Specification