Cargando…

A Reverse Modification Method for Binary Code and Data

This paper reveals the hidden dangers of reverse data modifications on distributed software with network synchronization, during the era of 5G, which may occur in more important domains, such as telemedicine and automatic driving. We used pseudo-codes to formally elaborate the distributed software a...

Descripción completa

Detalles Bibliográficos
Autores principales: Yu, Lei, Duan, Yucong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9610194/
https://www.ncbi.nlm.nih.gov/pubmed/36298062
http://dx.doi.org/10.3390/s22207714
_version_ 1784819209137553408
author Yu, Lei
Duan, Yucong
author_facet Yu, Lei
Duan, Yucong
author_sort Yu, Lei
collection PubMed
description This paper reveals the hidden dangers of reverse data modifications on distributed software with network synchronization, during the era of 5G, which may occur in more important domains, such as telemedicine and automatic driving. We used pseudo-codes to formally elaborate the distributed software architectures and design patterns. It is necessary to deal with three challenges for the modification of binary code and data in the distributed software architectures: (1) the base virtual addresses of software objects are changed frequently for safety; (2) prior knowledge of the reverse is not considered; (3) system memory values of some target objects are changed with extreme speed. For this purpose, a novel reverse modification method for binary code and data is proposed. According to the knowledge-based rules, our method can manipulate physical data, sight data, animation data, etc., while the game synchronization mechanism cannot detect the changes. The implementation details of our method are presented using high-level programming languages (C++) and low-level programming languages (assembly), based on multiple snippets, so that readers can understand both the overall distributed software developments and the corresponding reverse processes. In particular, two network games are used for the demonstrations in this paper. The demonstration results show that our proposed methodology is efficient (as proved by formulas and practices) to manipulate the codes and data of distributed software using a synchronization mechanism.
format Online
Article
Text
id pubmed-9610194
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96101942022-10-28 A Reverse Modification Method for Binary Code and Data Yu, Lei Duan, Yucong Sensors (Basel) Article This paper reveals the hidden dangers of reverse data modifications on distributed software with network synchronization, during the era of 5G, which may occur in more important domains, such as telemedicine and automatic driving. We used pseudo-codes to formally elaborate the distributed software architectures and design patterns. It is necessary to deal with three challenges for the modification of binary code and data in the distributed software architectures: (1) the base virtual addresses of software objects are changed frequently for safety; (2) prior knowledge of the reverse is not considered; (3) system memory values of some target objects are changed with extreme speed. For this purpose, a novel reverse modification method for binary code and data is proposed. According to the knowledge-based rules, our method can manipulate physical data, sight data, animation data, etc., while the game synchronization mechanism cannot detect the changes. The implementation details of our method are presented using high-level programming languages (C++) and low-level programming languages (assembly), based on multiple snippets, so that readers can understand both the overall distributed software developments and the corresponding reverse processes. In particular, two network games are used for the demonstrations in this paper. The demonstration results show that our proposed methodology is efficient (as proved by formulas and practices) to manipulate the codes and data of distributed software using a synchronization mechanism. MDPI 2022-10-11 /pmc/articles/PMC9610194/ /pubmed/36298062 http://dx.doi.org/10.3390/s22207714 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Yu, Lei
Duan, Yucong
A Reverse Modification Method for Binary Code and Data
title A Reverse Modification Method for Binary Code and Data
title_full A Reverse Modification Method for Binary Code and Data
title_fullStr A Reverse Modification Method for Binary Code and Data
title_full_unstemmed A Reverse Modification Method for Binary Code and Data
title_short A Reverse Modification Method for Binary Code and Data
title_sort reverse modification method for binary code and data
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9610194/
https://www.ncbi.nlm.nih.gov/pubmed/36298062
http://dx.doi.org/10.3390/s22207714
work_keys_str_mv AT yulei areversemodificationmethodforbinarycodeanddata
AT duanyucong areversemodificationmethodforbinarycodeanddata
AT yulei reversemodificationmethodforbinarycodeanddata
AT duanyucong reversemodificationmethodforbinarycodeanddata