Cargando…
A Reverse Modification Method for Binary Code and Data
This paper reveals the hidden dangers of reverse data modifications on distributed software with network synchronization, during the era of 5G, which may occur in more important domains, such as telemedicine and automatic driving. We used pseudo-codes to formally elaborate the distributed software a...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9610194/ https://www.ncbi.nlm.nih.gov/pubmed/36298062 http://dx.doi.org/10.3390/s22207714 |
_version_ | 1784819209137553408 |
---|---|
author | Yu, Lei Duan, Yucong |
author_facet | Yu, Lei Duan, Yucong |
author_sort | Yu, Lei |
collection | PubMed |
description | This paper reveals the hidden dangers of reverse data modifications on distributed software with network synchronization, during the era of 5G, which may occur in more important domains, such as telemedicine and automatic driving. We used pseudo-codes to formally elaborate the distributed software architectures and design patterns. It is necessary to deal with three challenges for the modification of binary code and data in the distributed software architectures: (1) the base virtual addresses of software objects are changed frequently for safety; (2) prior knowledge of the reverse is not considered; (3) system memory values of some target objects are changed with extreme speed. For this purpose, a novel reverse modification method for binary code and data is proposed. According to the knowledge-based rules, our method can manipulate physical data, sight data, animation data, etc., while the game synchronization mechanism cannot detect the changes. The implementation details of our method are presented using high-level programming languages (C++) and low-level programming languages (assembly), based on multiple snippets, so that readers can understand both the overall distributed software developments and the corresponding reverse processes. In particular, two network games are used for the demonstrations in this paper. The demonstration results show that our proposed methodology is efficient (as proved by formulas and practices) to manipulate the codes and data of distributed software using a synchronization mechanism. |
format | Online Article Text |
id | pubmed-9610194 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96101942022-10-28 A Reverse Modification Method for Binary Code and Data Yu, Lei Duan, Yucong Sensors (Basel) Article This paper reveals the hidden dangers of reverse data modifications on distributed software with network synchronization, during the era of 5G, which may occur in more important domains, such as telemedicine and automatic driving. We used pseudo-codes to formally elaborate the distributed software architectures and design patterns. It is necessary to deal with three challenges for the modification of binary code and data in the distributed software architectures: (1) the base virtual addresses of software objects are changed frequently for safety; (2) prior knowledge of the reverse is not considered; (3) system memory values of some target objects are changed with extreme speed. For this purpose, a novel reverse modification method for binary code and data is proposed. According to the knowledge-based rules, our method can manipulate physical data, sight data, animation data, etc., while the game synchronization mechanism cannot detect the changes. The implementation details of our method are presented using high-level programming languages (C++) and low-level programming languages (assembly), based on multiple snippets, so that readers can understand both the overall distributed software developments and the corresponding reverse processes. In particular, two network games are used for the demonstrations in this paper. The demonstration results show that our proposed methodology is efficient (as proved by formulas and practices) to manipulate the codes and data of distributed software using a synchronization mechanism. MDPI 2022-10-11 /pmc/articles/PMC9610194/ /pubmed/36298062 http://dx.doi.org/10.3390/s22207714 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Yu, Lei Duan, Yucong A Reverse Modification Method for Binary Code and Data |
title | A Reverse Modification Method for Binary Code and Data |
title_full | A Reverse Modification Method for Binary Code and Data |
title_fullStr | A Reverse Modification Method for Binary Code and Data |
title_full_unstemmed | A Reverse Modification Method for Binary Code and Data |
title_short | A Reverse Modification Method for Binary Code and Data |
title_sort | reverse modification method for binary code and data |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9610194/ https://www.ncbi.nlm.nih.gov/pubmed/36298062 http://dx.doi.org/10.3390/s22207714 |
work_keys_str_mv | AT yulei areversemodificationmethodforbinarycodeanddata AT duanyucong areversemodificationmethodforbinarycodeanddata AT yulei reversemodificationmethodforbinarycodeanddata AT duanyucong reversemodificationmethodforbinarycodeanddata |