Software self-defense systems and methods
First Claim
1. A method for obfuscating a computer program, the computer program containing a sequence of programming instructions, the method including:
- incorporating one or more programming constructs into the computer program, the programming constructs being operable to designate one or more memory locations for storage of data, and wherein the one or more memory locations are logically located between a first memory location and a second memory location, the first memory location containing at least part of a programming instruction from the sequence of programming instructions, and the second memory location containing at least part of a programming instruction from the sequence of programming instructions;
incorporating one or more memory allocation statements into the computer program, the memory allocation statements being operable to allocate memory for storage of data, and wherein at least a portion of the memory allocated for storage of data includes one or more of the memory locations designated by the programming constructs for storage of data;
storing data within the memory allocated for storage of data,whereby the distinction between an area of memory primarily containing programming instructions and an area of memory primarily containing data is at least somewhat obscured.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program'"'"'s local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program'"'"'s operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program'"'"'s source code, object code, or executable image.
-
Citations
6 Claims
-
1. A method for obfuscating a computer program, the computer program containing a sequence of programming instructions, the method including:
-
incorporating one or more programming constructs into the computer program, the programming constructs being operable to designate one or more memory locations for storage of data, and wherein the one or more memory locations are logically located between a first memory location and a second memory location, the first memory location containing at least part of a programming instruction from the sequence of programming instructions, and the second memory location containing at least part of a programming instruction from the sequence of programming instructions; incorporating one or more memory allocation statements into the computer program, the memory allocation statements being operable to allocate memory for storage of data, and wherein at least a portion of the memory allocated for storage of data includes one or more of the memory locations designated by the programming constructs for storage of data; storing data within the memory allocated for storage of data, whereby the distinction between an area of memory primarily containing programming instructions and an area of memory primarily containing data is at least somewhat obscured. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification