Browse > Article
http://dx.doi.org/10.6109/jkiice.2016.20.8.1553

Design of the Function for User Program Execution Control in the Windows Environments  

Jang, Seung-Ju (Department of Computer Engineering, Dongeui University)
Abstract
In this paper, we design a program that controls the execution permissions for the running application in the Windows system environment. It does not allow general users to execute the program converting the specific location information of the execution program, to any of the bit values with the formal structure information in window program. The converted bit value can be returned to the original bit value in the case of an authorized user, so that the original program can be normally performed. By doing so, it can be more safely used in the risk of reverse engineering for Windows executable program. We implemented the control program for the program execution authority we proposed in this paper, and the experiment was performed. At the results of experiments, it was confirmed that the control function to permit execution for the user program was working properly in the Windows environment.
Keywords
Program Execution Rights; Program Execution Rights Access; Windows System; PE modified; PE recovery;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 B. M. Cho, J. W. Nho, H. S. Oh, "Implement and test data obfuscation tool for $C^{{+}{+}}$ language," KIISE Proceedings, pp. 292-294, 2006.
2 J. H. Lee, "Data structures reverse engineering techniques for the executable file fragmentation," Journal of Information Security and Cryptology, vol. 22. no. 3, pp. 615-619, Jun. 2012.
3 Korea Copyright Commission, "SW reverse analysis and technical protection," Korea Copyright Commission, 2009.
4 S. H. Oh, "Study on the compatibility of the virtual machine for the reverse engineering," Journal of Korea Society of Automotive Engineers, vol. 22. no. 6, pp.31-38, Sep. 2014.
5 D. S. Ha, K. H. Lee, H. K. Oh, "Anti-reverse engineering techniques for Android applications," Reviews of KIISC, Journal of Security Engineering Research Institute, vol. 25. no. 3, pp. 19-28, Jun. 2015.
6 J. H. Kim, "Robust anti-reverse engineering techniques for using the AES algorithm to protect Android applications," Journal of Information Science, vol. 42. no. 12, pp. 1611-1622, Dec. 2015.
7 K. H. Kang, "Static Code Analysis with Open Source based tool chain," Journal of Information Science, vol. 21. no. 2, pp. 148-153, Feb. 2015.   DOI
8 S. J. Cho, "Software copyright protection technology trends," Korea Society of Information Technology, vol. 11. no. 2, pp. 23-32, Dec. 2013.
9 Piao, Yuxue Jung, Jin-Hyuk Yi, Jeong Hyun , "Structural and Functional Analyses of ProGuard Obfuscation Tool," Journal of Korea Institute of Communication Sciences, vol. 38. no. 8, pp. 654-662, Aug. 2013.
10 C. S. Chun, "Dynamic analysis of executable obfuscation techniques to virtualization," Journal of Information Science, vol. 40. no. 1, pp. 61-71, Jan. 2013.
11 S. H. Lee, "The original structure and meaning extraction method of dynamic virtual machines running file-based obfuscation," Journal of Information Science, vol. 41 no. 10, pp. 859-869, Oct. 2014.
12 S. K. Jung, "protection method of applications and licenses through the executable file encryption portion," Journal of Information Science Proceedings, vol. 39. no. 2C, pp. 157-159, Nov. 2012.