CN105426708A - Reinforcing method of application program of Android system - Google Patents

Reinforcing method of application program of Android system Download PDF

Info

Publication number
CN105426708A
CN105426708A CN201610034627.8A CN201610034627A CN105426708A CN 105426708 A CN105426708 A CN 105426708A CN 201610034627 A CN201610034627 A CN 201610034627A CN 105426708 A CN105426708 A CN 105426708A
Authority
CN
China
Prior art keywords
encryption
file
key
application program
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610034627.8A
Other languages
Chinese (zh)
Other versions
CN105426708B (en
Inventor
文伟平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Devsource Technology Co Ltd
Original Assignee
Beijing Devsource Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Devsource Technology Co Ltd filed Critical Beijing Devsource Technology Co Ltd
Priority to CN201610034627.8A priority Critical patent/CN105426708B/en
Publication of CN105426708A publication Critical patent/CN105426708A/en
Application granted granted Critical
Publication of CN105426708B publication Critical patent/CN105426708B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a reinforcing method of an application program of an Android system. The method comprises: reinforcing a key code in the Android application program by binary system flow encryption and protecting a code of the application program; comprising: analyzing a classes.dex file; positioning to a key method; performing primary encryption to obtain intermediate data; performing secondary encryption on the intermediate data; calculating a new Hash value of the dex file, and storing into a so file after the encryption; calculating to obtain new checksum and signature values of the dex file, and updating the dex file; regenerating an apk, thus finishing the encryption process. During decryption, the Hash value of the dex file is calculated, and the Hash value obtained by encryption is compared with the value in the so file; secondary decryption is performed to obtain the key code. Due to the reinforcing method, an Android source code cannot be checked by a decompilation tool, only the key code is protected by encryption, completeness of the code is protected, a static analysis is effectively resisted, the code of the Android program is prevented from being tampered, and operation efficiency of the program is ensured.

Description

A kind of reinforcement means of application program of android system
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of reinforcement means of application program of android system.
Background technology
Android (Android) operating system, by the open source operating system of Google company and OHA member's joint development, is mainly used in mobile device, as smart mobile phone, panel computer etc.Since releasing from 2007, Android operation system obtains rapidly the support of numerous developers and many manufacturers based on the feature such as linux kernel, open source code with it.Meanwhile, the number of applications based on Android platform rapidly increases.In July, 2013, Google company announces that the number of applications in GooglePlay shop is more than 1,000,000, becomes the application shop that the whole world is maximum.
At present, most Android program all only uses AndroidSDK to write, but the program that traditional Java language is write is easy to suffer reverse cracking.Android system is pirate application and Malware in the subject matter that secure context faces.Interests and the enthusiasm greatly compromising numerous developers prevailing of pirate application, and the implantation of malicious code makes Android user face the risk of privacy compromise and property loss.In Android industrial chain, pirate tissue abnormalities enlivens.They tightly follow Android application, and which applies fire, just " mountain vallage " what application." packing party " the lighter implants malice ad plug-in in mountain vallage application, is ejected make profit by advertisement; Android wooden horse, back door are implanted wherein by severe one, carry out Long-distance Control to customer mobile terminal.
The Software Protection Technique of windows platform, owing to use widely and Security Officer studies for many years, has defined the protect system of complete set.But due to the difference of Android platform and windows platform bottom layer realization, cause effectively to be transplanted to Android platform in a series of theory for software protection of windows platform and mechanism.Simultaneously; because the Android platform birth time is shorter; the research of software protection aspect is still in the starting stage, and can not provide for more and more ripe breaking techniques and more effectively protect, the event that the intellecture property of software developer is invaded is of common occurrence.
More existing Android application program reinforcement means, adopt the method for static treatment mostly, namely carry out to dex file the difficulty that some amendments increase attack.This reinforcement means only increases code reading difficulty, but its protection effect is limited, and assailant still can obtain the code of program, cannot ensure the security of application program.
Summary of the invention
In order to overcome above-mentioned the deficiencies in the prior art; the invention provides a kind of reinforcement means of application program of android system; the method utilizes binary stream encryption method to reinforce based on android system; key code in Android application program is encrypted, to reach the object of protection Android application program.
Technical scheme provided by the invention is:
A reinforcement means for the application program of android system, is reinforced the key code in Android application program by binary stream encryption method, and Android application code is protected; Described reinforcement means comprises ciphering process and decrypting process, specifically comprises the steps:
A. for the Android application program needing protection, key code is encrypted, performs and operate as follows:
A1. first to the Android application program decompress(ion) needing protection, obtain the classes.dex file in Android application program, described dex file is resolved;
A2. setting needs the key method of the certain kinds of encryption, navigates to the key method of the certain kinds needing encryption;
A3. set key key1, use key key1 to carry out first time encryption to the instruction of key method described in steps A 2, obtain the intermediate data after first time encryption;
A4. set key key2, use key key2 to carry out second time encryption to intermediate data described in steps A 3;
A5. by obtaining Data Update after superencipher in dex file, new dex file is obtained;
The hash value of A6. new described in calculation procedure A5 dex file, this value is for verifying the integrality of dex; Be deposited in so file after hash value is encrypted;
A7. for dex file new described in steps A 5, recalculate the value obtaining checksum and signature, upgrade dex file;
A8. compression regenerates apk, namely completes ciphering process; Comprise the dex file of key code encryption in the described apk regenerated and comprise so file of deciphering and dex check information;
When B. starting to perform Android application program, the Android application program of encryption is decrypted and obtains key code, perform and operate as follows:
After B1.Android application program is written into internal memory, perform the program in so file;
B2. in internal memory, dex file is found;
B3. for the dex file obtained, calculate the hash value of dex file, then Hash is encrypted, obtain the hash value after encrypting;
B4. the value of preserving in so file described in the hash value after encryption described in step B3 and steps A 6 is compared; If consistent, then perform step B5, otherwise return error code, program stopped runs;
When B5. performing key code, from so file, obtain key key2, key code is decrypted, obtain intermediate code;
B6. for the intermediate code that step B5 obtains, from so file, obtain key key1, carry out second time deciphering, obtain final key code;
B7. the method call of key code is carried out.
The reinforcement means of the application program of above-mentioned android system, further, setting described in steps A 2 needs the key method of certain kinds of encryption, and what specifically comprise in important algorithm method, checking login method, system core flow and method is one or more.
The reinforcement means of the application program of above-mentioned android system, further, first time described in steps A 3 encrypts or described in steps A 4, second time encryption all can adopt AES encryption method, and described AES encryption method comprises the AES encryption program that employing is write voluntarily or the Encryption Tool using AES.
The reinforcement means of the application program of above-mentioned android system, further, is encrypted as md5 encryption method described in steps A 6.
The reinforcement means of the application program of above-mentioned android system, further, performs the program in so file, calls the method in so file specifically by JNI call-by mechanism described in step B1.
Compared with prior art, the invention has the beneficial effects as follows:
Existing Android application program reinforcement means, adopts the method for static treatment mostly, namely carries out to dex file the difficulty that some amendments increase attack.This reinforcement means only increases code reading difficulty, but its protection effect is limited, and assailant still can obtain the code of program.Utilize technical scheme provided by the invention, can dynamically decrypted program.Reinforcement means provided by the invention carries out double layer encryption protection to Key Functions; and add the safety check of dex; assailant is allowed not get code; and the program of amendment also cannot be run, and can realize protecting the integrality of code, effectively resist static analysis; the code of Android application program is prevented to be tampered; and make hacker not check Android source code by instruments such as decompilings, and only protection is encrypted to key code, ensure that the operational efficiency of program.
Accompanying drawing explanation
Fig. 1 is the FB(flow block) that the invention provides method.
Fig. 2 is the file composition structural drawing of the dex file in Android application program.
Embodiment
Below in conjunction with accompanying drawing, further describe the present invention by embodiment, but the scope do not limited the present invention in any way.
The invention provides a kind of reinforcement means based on android system binary stream encryption technology, Fig. 1 is the FB(flow block) that the invention provides method, comprises the steps:
A. key code is encrypted, performs and operate as follows:
A1. classes.dex file is resolved;
A2. specific class and method is navigated to;
A3. key key1 is used to carry out first time encryption;
A4. key key2 is used to carry out second time encryption;
A5. dex file is upgraded;
A6. calculate the hash value of classes.dex file and hash value is encrypted, being stored in so file;
B. the code of encryption is decrypted, performs and operate as follows:
B1. the start address of dex is found;
B2. hash value computing is carried out to dex file, the result obtained is encrypted, and the value of preserving in so file compares;
B3. key key1 is used to carry out first time deciphering;
B4. key key2 is used to carry out second time deciphering;
B5 carries out the method call of key code.
Reinforcement means based on android system binary stream encryption technology provided by the invention comprises ciphering process and decrypting process; The concrete enforcement of the inventive method is described by the following examples:
Ciphering process:
For the Android application program (apk) needing protection, first decompress(ion) obtains the classes.dex file in apk, then resolves dex file;
Developer sets needs the key method of the certain kinds of encryption (to need the certain kinds key method of encryption to carry out judgement setting according to the demand of developer, such as, some important algorithm method, or checking login method, or some system core flow processs), then navigate to the key method of the certain kinds needing encryption;
Key key1 (reinforcing person's need to be keep secret is set by reinforcing person, need to be decrypted by this double secret key ciphertext when deciphering), first use key key1 to carry out first time encryption to the instruction of key method and (adopt AES encryption, the AES encryption program of writing voluntarily can be adopted, also the Encryption Tool of AES can be used), obtain the intermediate data after first time encryption;
Then set key key2, use key key2 to carry out second time encryption (also adopting AES encryption) to intermediate data; Double AES encryption, can increase security;
Upgrade dex file: by obtaining Data Update after superencipher in dex file, obtain new dex file;
Calculate the hash value of new dex file, this value is for verifying the integrality of dex; Be deposited into after (md5 encryption) is encrypted to hash value in so file; Namely in so file, add the School Affairs deciphering parameter to dex file;
For amended dex file, recalculate the value obtaining checksum and signature, upgrade dex file;
Compression regenerates apk, namely completes ciphering process.
In the apk regenerated, comprise the dex file of Partial key code encryption, so file (be one section of program c program that reinforcing person provides, acquiescence is safe), in so file, comprise the checking procedure of decrypting process and dex.
Decrypting process:
Start executive routine (the apk program of AES encryption), first perform the program in so file:
Particularly, after AES encryption program is written into internal memory, when program starts to perform first by JNI (JavaNativeInterface) call-by mechanism, perform the School Affairs deciphering in so file and recovery code, particular by the method in Java code call so file (so storehouse), first search utility internal memory, finds after encryption, need reduction corresponding class and method.During searching can more prefabricated labels in a program, help find need deciphering part;
Then, dex file is found: Fig. 2 is the composition structural drawing of dex file in internal memory, dex file mainly comprise dex file header, character string identification symbol list, type identification item, function prototype label table, zone identifier list, function identification table, class label table, data field (data that namely each tabular goes out above are kept at data field), static linkage data segment (can be sky), finding method specifically:
Dex file is found from odex file, the initial magic field of dex file is for representing dex version, its value is fixed as " 6465780a30333500 " at present, be converted to character string " dex.035 ", therefore forward lookup page can be passed through, until find the magic field of dex file, be the start address of dex file herein; After finding dex file, according to the dex file structure in Fig. 2, dex file header (dexheader) can be resolved.Dex file header have recorded the skew of other parts of dex file in dex file, thus can navigate to the region at other part places of dex, for further parsing.
Dex top of file (Dex file header) mainly comprises offset address and the length information of School Affairs and other structures, specifically in table 1:
The information of table 1Dex file header record and corresponding meaning
For the dex file obtained, calculate the hash value of dex file, then Hash is encrypted ((md5 encryption)), compare with the value of preserving in so file, if unanimously, then read-me is not modified, otherwise return error code, program stopped runs.
When performing key code, from so file, obtaining key key2, key code is decrypted, obtaining intermediate code.For the intermediate code obtained, from so file, obtain key key1, carry out second time deciphering and obtain final key code; Twice decrypting process corresponding twice ciphering process respectively, to guarantee the safety of application program.
Finally, the method correctly calling key code is safely realized.
It should be noted that the object publicizing and implementing example is to help to understand the present invention further, but it will be appreciated by those skilled in the art that: in the spirit and scope not departing from the present invention and claims, various substitutions and modifications are all possible.Therefore, the present invention should not be limited to the content disclosed in embodiment, and the scope that the scope of protection of present invention defines with claims is as the criterion.

Claims (5)

1. a reinforcement means for the application program of android system, is reinforced the key code in Android application program by binary stream encryption method, and Android application code is protected; Described reinforcement means comprises ciphering process and decrypting process, specifically comprises the steps:
A. for the Android application program needing protection, key code is encrypted, performs and operate as follows:
A1. first to the Android application program decompress(ion) needing protection, obtain the classes.dex file in Android application program, described dex file is resolved;
A2. setting needs the key method of the certain kinds of encryption, navigates to the key method of the certain kinds needing encryption;
A3. set key key1, use key key1 to carry out first time encryption to the instruction of key method described in steps A 2, obtain the intermediate data after first time encryption;
A4. set key key2, use key key2 to carry out second time encryption to intermediate data described in steps A 3;
A5. by obtaining Data Update after superencipher in dex file, new dex file is obtained;
The hash value of A6. new described in calculation procedure A5 dex file, this value is for verifying the integrality of dex; Be deposited in so file after hash value is encrypted;
A7. for dex file new described in steps A 5, recalculate the value obtaining checksum and signature, upgrade dex file;
A8. compression regenerates apk, namely completes ciphering process; Comprise the dex file of key code encryption in the described apk regenerated and comprise so file of deciphering and dex check information;
When B. starting to perform Android application program, the Android application program of encryption is decrypted and obtains key code, perform and operate as follows:
After B1.Android application program is written into internal memory, perform the program in so file;
B2. in internal memory, dex file is found;
B3. for the dex file obtained, calculate the hash value of dex file, then Hash is encrypted, obtain the hash value after encrypting;
B4. the value of preserving in so file described in the hash value after encryption described in step B3 and steps A 6 is compared; If consistent, then perform step B5, otherwise return error code, program stopped runs;
When B5. performing key code, from so file, obtain key key2, key code is decrypted, obtain intermediate code;
B6. for the intermediate code that step B5 obtains, from so file, obtain key key1, carry out second time deciphering, obtain final key code;
B7. the method call of key code is carried out.
2. the reinforcement means of the application program of android system as claimed in claim 1, it is characterized in that, setting described in steps A 2 needs the key method of certain kinds of encryption, and what specifically comprise in important algorithm method, checking login method, system core flow and method is one or more.
3. the reinforcement means of the application program of android system as claimed in claim 1, it is characterized in that, first time described in steps A 3 encrypts or described in steps A 4, second time encryption all can adopt AES encryption method, and described AES encryption method comprises the AES encryption program that employing is write voluntarily or the Encryption Tool using AES.
4. the reinforcement means of the application program of android system as claimed in claim 1, is characterized in that, be encrypted as md5 encryption method described in steps A 6.
5. the reinforcement means of the application program of android system as claimed in claim 1, is characterized in that, perform the program in so file described in step B1, call the method in so file specifically by JNI call-by mechanism.
CN201610034627.8A 2016-01-19 2016-01-19 A kind of reinforcement means of the application program of android system Expired - Fee Related CN105426708B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610034627.8A CN105426708B (en) 2016-01-19 2016-01-19 A kind of reinforcement means of the application program of android system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610034627.8A CN105426708B (en) 2016-01-19 2016-01-19 A kind of reinforcement means of the application program of android system

Publications (2)

Publication Number Publication Date
CN105426708A true CN105426708A (en) 2016-03-23
CN105426708B CN105426708B (en) 2018-08-21

Family

ID=55504916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610034627.8A Expired - Fee Related CN105426708B (en) 2016-01-19 2016-01-19 A kind of reinforcement means of the application program of android system

Country Status (1)

Country Link
CN (1) CN105426708B (en)

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106326694A (en) * 2016-08-30 2017-01-11 北京鼎源科技有限公司 Android application reinforcing method baed on C source code mixing
CN106355081A (en) * 2016-09-07 2017-01-25 深圳市新国都支付技术有限公司 Android program start verification method and device
CN106529222A (en) * 2016-12-09 2017-03-22 北京智游网安科技有限公司 Protection method and protection system for preventing secondary packaging and cracking of application program
CN106650327A (en) * 2016-11-24 2017-05-10 湖南鼎源蓝剑信息科技有限公司 so file dynamic recovery-based Android application reinforcement method
CN106709286A (en) * 2016-11-30 2017-05-24 江苏神州信源系统工程有限公司 Method for performing security reinforcement on apk resource package
CN106843853A (en) * 2016-12-28 2017-06-13 北京五八信息技术有限公司 The method and apparatus for protecting user profile
CN106934260A (en) * 2017-03-14 2017-07-07 北京深思数盾科技股份有限公司 Code protection method, device, server and storage medium
CN107122632A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The encryption method and device of software installation bag
CN107122634A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The method for reinforcing and protecting and device of software installation bag
CN107122635A (en) * 2017-04-27 2017-09-01 北京洋浦伟业科技发展有限公司 A kind of reinforcement means of the reinforcement means of SO files, device and APK
CN107169324A (en) * 2017-05-12 2017-09-15 北京理工大学 A kind of Android application reinforcement means based on dynamic encryption and decryption
CN107977553A (en) * 2017-12-25 2018-05-01 中国电子产品可靠性与环境试验研究所 The method and device of the security hardening of mobile applications
CN108377185A (en) * 2018-03-14 2018-08-07 四川长虹电器股份有限公司 A kind of weak resource endpoint key method for managing security of Internet of Things
CN108460276A (en) * 2016-12-09 2018-08-28 北京奇虎科技有限公司 A kind for the treatment of method and apparatus of the dynamic link library SO files of Android installation kit
CN108932436A (en) * 2018-07-06 2018-12-04 四川长虹电器股份有限公司 A kind of software security reinforcement means of APP specification based on android system
CN109005184A (en) * 2018-08-17 2018-12-14 上海小蚁科技有限公司 File encrypting method and device, storage medium, terminal
CN109005196A (en) * 2018-09-10 2018-12-14 北京旷视科技有限公司 Data transmission method, data decryption method, device and electronic equipment
CN109344574A (en) * 2018-09-19 2019-02-15 四川长虹电器股份有限公司 A kind of adaptive Android reinforcement means based on specification
CN109981283A (en) * 2019-02-28 2019-07-05 西安理工大学 Android platform message-driven core code integrity detection system and method
CN110046504A (en) * 2019-04-22 2019-07-23 北京智游网安科技有限公司 SO file hiding method, storage medium and device based on Linker
CN110502874A (en) * 2019-07-19 2019-11-26 西安理工大学 A kind of Android App reinforcement means based on file self-modifying
CN110598402A (en) * 2019-09-09 2019-12-20 杭州天宽科技有限公司 Operation security system based on android application
CN110610097A (en) * 2019-09-09 2019-12-24 杭州天宽科技有限公司 File transmission security system based on android application
CN110609789A (en) * 2019-08-29 2019-12-24 烽火通信科技股份有限公司 Method and system for software License verification
CN111259370A (en) * 2020-01-13 2020-06-09 苏州浪潮智能科技有限公司 FPGA program security verification method, system, terminal and storage medium
CN112052461A (en) * 2020-08-05 2020-12-08 北京智游网安科技有限公司 Code processing method based on instruction injection, terminal and storage medium
CN112084469A (en) * 2020-08-06 2020-12-15 华帝股份有限公司 Encryption method for preventing application program from being reverse engineered
US10929153B2 (en) 2018-10-26 2021-02-23 International Business Machines Corporation Bidirectional protection of application package
CN112613037A (en) * 2020-12-29 2021-04-06 北京永新视博数字电视技术有限公司 Code checking method and device
CN113094666A (en) * 2021-04-09 2021-07-09 每日互动股份有限公司 System for preventing java program from being decompiled
CN113419734A (en) * 2021-06-17 2021-09-21 网易(杭州)网络有限公司 Application program reinforcing method and device and electronic equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110147655A (en) * 2019-03-28 2019-08-20 江苏通付盾信息安全技术有限公司 The security protection system and method for application program

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117851A (en) * 2011-11-17 2013-05-22 银视通信息科技有限公司 Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI)
CN104317625A (en) * 2014-11-09 2015-01-28 刘鹏 Dynamic loading method for APK files
CN104462883A (en) * 2014-11-09 2015-03-25 刘鹏 APK file strengthening method
KR101521765B1 (en) * 2015-01-08 2015-05-20 숭실대학교산학협력단 Apparatus For Code Obfuscation Using Indistinguishable Identifier Conversion and Method Thereof
CN104866739A (en) * 2015-06-04 2015-08-26 上海斐讯数据通信技术有限公司 Application program encryption method and application program encryption system in Android system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117851A (en) * 2011-11-17 2013-05-22 银视通信息科技有限公司 Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI)
CN104317625A (en) * 2014-11-09 2015-01-28 刘鹏 Dynamic loading method for APK files
CN104462883A (en) * 2014-11-09 2015-03-25 刘鹏 APK file strengthening method
KR101521765B1 (en) * 2015-01-08 2015-05-20 숭실대학교산학협력단 Apparatus For Code Obfuscation Using Indistinguishable Identifier Conversion and Method Thereof
CN104866739A (en) * 2015-06-04 2015-08-26 上海斐讯数据通信技术有限公司 Application program encryption method and application program encryption system in Android system

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106326694A (en) * 2016-08-30 2017-01-11 北京鼎源科技有限公司 Android application reinforcing method baed on C source code mixing
CN106355081A (en) * 2016-09-07 2017-01-25 深圳市新国都支付技术有限公司 Android program start verification method and device
CN106650327A (en) * 2016-11-24 2017-05-10 湖南鼎源蓝剑信息科技有限公司 so file dynamic recovery-based Android application reinforcement method
CN106709286A (en) * 2016-11-30 2017-05-24 江苏神州信源系统工程有限公司 Method for performing security reinforcement on apk resource package
CN106529222A (en) * 2016-12-09 2017-03-22 北京智游网安科技有限公司 Protection method and protection system for preventing secondary packaging and cracking of application program
CN108460276A (en) * 2016-12-09 2018-08-28 北京奇虎科技有限公司 A kind for the treatment of method and apparatus of the dynamic link library SO files of Android installation kit
CN106843853A (en) * 2016-12-28 2017-06-13 北京五八信息技术有限公司 The method and apparatus for protecting user profile
CN106934260A (en) * 2017-03-14 2017-07-07 北京深思数盾科技股份有限公司 Code protection method, device, server and storage medium
CN106934260B (en) * 2017-03-14 2020-03-17 北京深思数盾科技股份有限公司 Code protection method, device, server and storage medium
CN107122634A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The method for reinforcing and protecting and device of software installation bag
CN107122632A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The encryption method and device of software installation bag
CN107122634B (en) * 2017-04-26 2020-03-17 北京梆梆安全科技有限公司 Reinforcement protection method and device for software installation package
CN107122635A (en) * 2017-04-27 2017-09-01 北京洋浦伟业科技发展有限公司 A kind of reinforcement means of the reinforcement means of SO files, device and APK
CN107169324A (en) * 2017-05-12 2017-09-15 北京理工大学 A kind of Android application reinforcement means based on dynamic encryption and decryption
CN107977553B (en) * 2017-12-25 2020-07-10 中国电子产品可靠性与环境试验研究所 Method and device for security reinforcement of mobile application program
CN107977553A (en) * 2017-12-25 2018-05-01 中国电子产品可靠性与环境试验研究所 The method and device of the security hardening of mobile applications
CN108377185A (en) * 2018-03-14 2018-08-07 四川长虹电器股份有限公司 A kind of weak resource endpoint key method for managing security of Internet of Things
CN108932436A (en) * 2018-07-06 2018-12-04 四川长虹电器股份有限公司 A kind of software security reinforcement means of APP specification based on android system
CN109005184A (en) * 2018-08-17 2018-12-14 上海小蚁科技有限公司 File encrypting method and device, storage medium, terminal
CN109005196A (en) * 2018-09-10 2018-12-14 北京旷视科技有限公司 Data transmission method, data decryption method, device and electronic equipment
CN109344574A (en) * 2018-09-19 2019-02-15 四川长虹电器股份有限公司 A kind of adaptive Android reinforcement means based on specification
CN109344574B (en) * 2018-09-19 2020-09-22 四川长虹电器股份有限公司 Self-adaptive android reinforcement method based on specification
US10929153B2 (en) 2018-10-26 2021-02-23 International Business Machines Corporation Bidirectional protection of application package
CN109981283A (en) * 2019-02-28 2019-07-05 西安理工大学 Android platform message-driven core code integrity detection system and method
CN109981283B (en) * 2019-02-28 2022-05-20 西安理工大学 Android platform message driven core code integrity detection system and method
CN110046504A (en) * 2019-04-22 2019-07-23 北京智游网安科技有限公司 SO file hiding method, storage medium and device based on Linker
CN110502874A (en) * 2019-07-19 2019-11-26 西安理工大学 A kind of Android App reinforcement means based on file self-modifying
CN110502874B (en) * 2019-07-19 2021-05-25 西安理工大学 Android App reinforcement method based on file self-modification
CN110609789A (en) * 2019-08-29 2019-12-24 烽火通信科技股份有限公司 Method and system for software License verification
CN110610097A (en) * 2019-09-09 2019-12-24 杭州天宽科技有限公司 File transmission security system based on android application
CN110598402A (en) * 2019-09-09 2019-12-20 杭州天宽科技有限公司 Operation security system based on android application
CN111259370A (en) * 2020-01-13 2020-06-09 苏州浪潮智能科技有限公司 FPGA program security verification method, system, terminal and storage medium
CN112052461A (en) * 2020-08-05 2020-12-08 北京智游网安科技有限公司 Code processing method based on instruction injection, terminal and storage medium
CN112084469A (en) * 2020-08-06 2020-12-15 华帝股份有限公司 Encryption method for preventing application program from being reverse engineered
CN112613037A (en) * 2020-12-29 2021-04-06 北京永新视博数字电视技术有限公司 Code checking method and device
CN113094666A (en) * 2021-04-09 2021-07-09 每日互动股份有限公司 System for preventing java program from being decompiled
CN113094666B (en) * 2021-04-09 2022-06-24 每日互动股份有限公司 System for preventing java program from being decompiled
CN113419734A (en) * 2021-06-17 2021-09-21 网易(杭州)网络有限公司 Application program reinforcing method and device and electronic equipment

Also Published As

Publication number Publication date
CN105426708B (en) 2018-08-21

Similar Documents

Publication Publication Date Title
CN105426708A (en) Reinforcing method of application program of Android system
US10284372B2 (en) Method and system for secure management of computer applications
JP4702957B2 (en) Tamper resistant virtual machine
CN106650327A (en) so file dynamic recovery-based Android application reinforcement method
CN110110548B (en) Method for storing files in trusted execution environment in encrypted manner based on encryption chip
TWI384381B (en) Upgrading a memory card that has security mechanisms that prevent copying of secure content and applications
US9514305B2 (en) Code pointer authentication for hardware flow control
JP6227772B2 (en) Method and apparatus for protecting a dynamic library
US9602289B2 (en) Steganographic embedding of executable code
US20160203087A1 (en) Method for providing security for common intermediate language-based program
CN103106372A (en) Lightweight class privacy data encryption method and system for Android system
WO2016078130A1 (en) Dynamic loading method for preventing reverse of apk file
US9892661B2 (en) Steganographic embedding of hidden payload
CN109992987B (en) Script file protection method and device based on Nginx and terminal equipment
CN105095771A (en) Method and apparatus for protecting shared target file
CN108595950A (en) A kind of safe Enhancement Methods of SGX of combination remote authentication
US8694548B2 (en) Defense-in-depth security for bytecode executables
US20170262640A1 (en) Database operation method and device
CN107305606A (en) The processing method and processing device of application file and the access method of file and device
CN104821949A (en) Signature-based SQL tamper-proof protection method
Petrov Android password managers and vault applications: data storage security issues identification
CN106295263A (en) A kind of method and device realizing application reinforcing
US20190102573A1 (en) Theater ears android app sensitive data management
CN116235174A (en) Apparatus and method for performing encryption algorithm
KR102618922B1 (en) Apparatus and method for Preventing SW reverse engineering of embedded system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180821

Termination date: 20200119