CN106326694A - Android application reinforcing method baed on C source code mixing - Google Patents
Android application reinforcing method baed on C source code mixing Download PDFInfo
- Publication number
- CN106326694A CN106326694A CN201610773361.9A CN201610773361A CN106326694A CN 106326694 A CN106326694 A CN 106326694A CN 201610773361 A CN201610773361 A CN 201610773361A CN 106326694 A CN106326694 A CN 106326694A
- Authority
- CN
- China
- Prior art keywords
- code
- android application
- block
- function
- obscured
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 230000003014 reinforcing effect Effects 0.000 title claims abstract description 11
- 230000002787 reinforcement Effects 0.000 claims abstract description 22
- 230000006870 function Effects 0.000 claims description 50
- 239000000284 extract Substances 0.000 claims description 10
- 238000007906 compression Methods 0.000 claims description 7
- 230000006835 compression Effects 0.000 claims description 6
- 238000007781 pre-processing Methods 0.000 claims description 6
- 238000012856 packing Methods 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 abstract description 9
- 238000011161 development Methods 0.000 abstract description 7
- 230000000694 effects Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 1
- 239000010931 gold Substances 0.000 description 1
- 229910052737 gold Inorganic materials 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Devices For Executing Special Programs (AREA)
Abstract
The invention discloses an Android application reinforcing method based on C source code mixing. The method comprises writing program key codes by using C programming languages and mixing C source codes. The reinforcement of Android application is achieved by mixing the C source codes in the Android application program, and the Android application program codes are protected. The Android application reinforcing method based on C source code mixing specifically includes the steps of writing the key part of the program by using C programming languages, writing programs into .so dynamic-link library file, invoking the dynamic-link library by using JNI technology in Java language, and then mixing the C source codes, so as to achieve the reinforcement of Android application. According to the Android application reinforcing method based on C source code mixing, important codes are saved in the C dynamic-link library by adopting NDK programming, and then the C source codes are mixed, the software protection is improved. At the same time, the important codes are written in a so library, the reusability of the codes are increased, ready-made so library can be directly introduced into other applications, so as to eliminate the troubles of secondary development.
Description
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of Android application obscured based on C source code
Reinforcement means.
Background technology
The most intelligent along with mobile phone, from strength to strength, security threat also can increase the function of mobile phone therewith, mobile phone
The paid services such as payment start to popularize, these business are closely related with economic transaction, so for the safety of cell phone software
Requiring the highest, leakage or the pretending to be of identity of some secret informations, all can bring huge economic loss.And for commercialization
The right of software developer also should well be protected, so the safety of cell phone software is the most important.
Android, as emerging operating system, has just developed rapidly since listing in 07 year, gradually replaces Saipan system,
Form, with the IOS of Fructus Mali pumilae, the gesture made rival claims as an equal, but under Android platform, Software Protection Technique research be still in the starting stage,
A lot of traditional software resist technologies are under this platform and inapplicable, and the increasing income property of code makes again to be easy to doping in developer and dislikes
Meaning assailant, the application software situation that is cracked is of common occurrence, and maliciously fee suction software is also often to have generation, and these the most greatly damage
Numerous developers and the interests of use certificate, also constrain the sound development of Android operation system.
Along with the development of android system, increasing of software application, the malicious act that mobile phone occurs also gets more and more.
The main cause that mobile phone viruses is walked crosswise in Android platform wantonly has: be different from Fructus Mali pumilae APP Store establish a set of simply
APP charging mode clearly, on Android market at home, application has been absorbed in free predicament, though freely looking good, but
Being the most really to conceal many potential safety hazards, the legitimacy of application cannot be judged, and application is probably carried out by assailant
Crack, add some malicious acts made a profit wherein, let pass by application shop forum etc. the most again and be diffused, and with
The information cellphone subscriber is more and more important, and payment, network game, associated person information etc. more start to become the gold in lawless person's eye
Money.
For Android software developer, need the software managing to prevent developing by other people decompiling
And be cracked, it is ensured that the core code of software is not plagiarized by other people, thus maximally protects Android software Developmental Engineer's
Interests, ensure the safety of Android application simultaneously.
The Code Obfuscation Security Technology that more existing Android application program reinforcement means are used is all based on greatly Java source generation
Code is obscured, and Java code itself is easier by decompiling so that software protection effect is the most preferable.
Summary of the invention
In order to overcome above-mentioned the deficiencies in the prior art, the present invention provides a kind of Android obscured based on C source code to answer
With reinforcement means, utilize C source code itself be difficult to by the characteristic of decompiling, first the pith of program is shown a C language,
Being compiled into .so dynamic link library file, (Java Native Interface, Java are originally then to utilize the JNI in Java language
Ground interface interchange) technology calls this dynamic link library;Secondly, C source code is obscured, thus realize Android is answered
Reinforcing.
Present invention provide the technical scheme that
A kind of Android application reinforcement means obscured based on C source code, to the C source generation in Android application program
Code is obscured so that Android application code is protected.Described reinforcement means includes that the program that shows a C language is closed
Key code and obscure C source code, specifically includes following steps:
A. the important code write C language is obscured, and uses and controls stream compress technique, the following operation of execution:
A1. source program P is read;
A2. P is carried out pretreatment, analyzes and extract the function information of P and preserve;
A3., in units of function, analyze and extract the code block information of P and preserve;
A4., on the premise of ensureing P logical relation, determine that partial code block is as controlling block message and preserving at random;
Determine at random as the code block controlling block, it may be possible to condition or loop structure, can be as code block information
Preserving, code block, in units of function, the most also preserves function name and the state pause judgments position of function in code block;The generation preserved
Code block information is in A5;
A5. judge to control the type of block, and use corresponding Obfuscating Algorithms, enter controlling block according to the order determined in A4
Row is mixed
Confuse, form program O (P) after obscuring;
When control block be if judge block structure time, to judging that structure is obscured, structure case branch.When controlling block it is
During while block structure, extracting while Rule of judgment, structure comprises the case branch of if statement;
A6. O (P) is arranged: O (P) is inserted into the position (position of the function preserved in A4) specified, and
The C source code that output is obscured;
B. the mode using NDK (NativeDevelopmentKit) to program, is saved in .so the C source code obscured and moves
In state chained library (.so storehouse), then use JNI technology to call the .so storehouse of bottom in Java code, perform to operate as follows:
B1. Java code (java file), the function in statement local file are write;
The .c file that local file is in B2, needs first to state in java file;
B2 newly-built .c file, the C source code after i.e. obscuring;
B3. JNI entrance function JNI_OnLoad function is write, for loading the C source code after obscuring;
B4. write project profile Android.mk file, be used for configuring project information;
B5. compiling generates so storehouse;
B6. compiling packing application, obtains the Android application of new reinforcing.
The above-mentioned Android application reinforcement means obscured based on C source code, further, the pretreatment in step A2
Algorithm mainly by resolving the source program of input, is prepared for follow-up control stream compression, is extracted important information,
Ensure to control stream properly functioning.Mainly include function name, the initial address of function and the end address of function, for often
Individual function generates for (or while) loop structure and switch structure, and for structure is each in order to complete in switch
The circulation of individual basic block performs, and switch structure control program is flattened.
The above-mentioned Android application reinforcement means obscured based on C source code, further, the control block pressure of step A5
Algorithm (Obfuscating Algorithms) critical function of the part that contracts is to analyze to extract code control block message, according to the type of control block, initial
Position and end position call different opaque predicates and obscure method.
The above-mentioned Android application reinforcement means obscured based on C source code, further, the entrance letter in step B3
Number is JNI_OnLoad () and JNI_OnUnLoad (), when Dalvik virtual machine goes to System.loadLibraryO function
Time, entrance function in C file can be first carried out, it can tell which JNI version Dalvik virtual machine uses, if dynamically
Not having entrance function in chained library, virtual machine can give tacit consent to the JNI1.1 version that use is oldest.And we are also required at entrance letter
Number carries out some initialized operations.
Compared with prior art, the invention has the beneficial effects as follows:
The present invention provides a kind of Android application reinforcement means obscured based on C source code, utilizes C source code itself
It is difficult to, by the characteristic of decompiling, first be shown a C language by the pith of program, is compiled into .so dynamic link library file, so
It is dynamic that rear JNI (Java Native Interface, the Java local interface calls) technology utilized in Java language calls this
Chained library;Secondly, C source code is obscured, thus realize the reinforcing to Android application.
The inventive method uses the mode of NDK programming, important code is saved in C dynamic link library, the most again to C source
Code is obscured, and can strengthen the protective measure to software.In addition, important code is write in so storehouse, moreover it is possible to increase
The reusability of code, in other are applied, can be introduced directly into ready-made so storehouse, eliminate the trouble of secondary development next time.
Accompanying drawing explanation
Fig. 1 is the FB(flow block) of the Android application reinforcement means that the C source code that the present invention provides is obscured.
Fig. 2 is NDK development process figure;
Mode initially with NDK writes C source code, and compiling generates .so file, and then Java code is called by JNI
Mode call the C source code in .so file, followed by SDK compile whole project, be packaged into .apk file.
Detailed description of the invention
Below in conjunction with the accompanying drawings, further describe the present invention by embodiment, but limit the model of the present invention never in any form
Enclose.
The present invention provides a kind of Android application reinforcement means obscured based on C source code, to Android application journey
C source code in sequence is obscured so that Android application code is protected.Reinforcement means includes showing a C language
Program key code and C source code is obscured;Fig. 1 is that the Android application that the C source code that the present invention provides is obscured is reinforced
The FB(flow block) of method, specifically includes following steps:
A. the important code write C language is obscured, and uses and controls stream compress technique, the following operation of execution:
A1. source program P is read;
A2. P is carried out pretreatment, analyzes and extract the function information of P and preserve;
A3., in units of function, analyze and extract the code block information of P and preserve;
P is carried out in units of function pretreatment, analyzes the code block information of the function extracting P and preserve;
A4., on the premise of ensureing P logical relation, determine that partial code block is as controlling block message and preserving at random;
Determine at random as the code block controlling block, it may be possible to condition or loop structure, can be as code block information
Preserving, code block, in units of function, the most also preserves function name and the state pause judgments position of function in code block;The generation preserved
Code block information is in A5;
A5. judge to control the type of block, and use corresponding Obfuscating Algorithms, enter controlling block according to the order determined in A4
Row is mixed
Confuse, form program O (P) after obscuring;
When control block be if judge block structure time, to judging that structure is obscured, structure case branch.When controlling block it is
During while block structure, extracting while Rule of judgment, structure comprises the case branch of if statement;
A6. O (P) is arranged: O (P) is inserted into the position (position of the function preserved in A4) specified, and
The C source code that output is obscured;
B. the mode using NDK (NativeDevelopmentKit) to program, is saved in .so the C source code obscured and moves
In state chained library (.so storehouse), then use JNI technology to call the .so storehouse of bottom in Java code, perform to operate as follows:
B1. Java code (java file), the function in statement local file are write;
The .c file that local file is in B2, needs first to state in java file;
B2 newly-built .c file, the C source code after i.e. obscuring;
B3. JNI entrance function JNI_OnLoad function is write, for loading the C source code after obscuring;
B4. write project profile Android.mk file, be used for configuring project information;
B5. compiling generates so storehouse;
B6. compiling packing application, obtains the Android application of new reinforcing.
Wherein, the important code write C language is obscured employing and is controlled stream compress technique.In NDK development process, control
The Code obfuscation method core of stream compression algorithm processed be broadly divided into preprocessing part and control block compression section, below for this two
Part carries out emphasis description.
The major function of Preprocessing Algorithm is that the source code to input carries out pretreatment.In Preprocessing Algorithm,
Uniqueident_Random () method is used for as obscuring rear Program Generating variable name;The code of pretreatment is as follows, wherein, → it
After be the false code of Preprocessing Algorithm;" // " the part of back annotation is the specific descriptions to Preprocessing Algorithm;Pretreatment generates
Be the function information of source program.Specifically, input: source program;Algorithm input is analyzed, preserves function information and exist
Rune_parts array;Start For circulation, the function of the preservation in func_parts is analyzed, including: call pseudo-another name
Algorithm to sending variable to be encrypted operation, circulation is held line control block and is obscured the operation such as control algolithm;Output: the function of source program
Information;
Below for controlling the code of the algorithm of block compression section, input the function information for obscuring front program;Analyze and extract
Control block in part;Perform circulation: call different predicate according to different control block types and insert function;After being output as obscuring
Program code;
Fig. 2 is NDK development process figure.Specifically, NDK exploitation writes C source code initially with the mode of NDK, and compiling is raw
Becoming .so file, then, Java code calls the C source code in .so file by the way of JNI calls, and compiles followed by SDK
Translate whole project, be packaged into .apk file.
First each code block in controlling stream graph is all placed in a switch statement by following example, the most again
This switch statement is encapsulated in an endless loop, and the code after conversion will become parallel execution flow process with controlling stream,
Thus reach the effect obscured, thus realize Andriod application and reinforce.
Original code is as follows:
Code after obscuring is as follows:
It should be noted that publicizing and implementing the purpose of example is that help is further appreciated by the present invention, but the skill of this area
Art personnel are understood that various substitutions and modifications are all without departing from the present invention and spirit and scope of the appended claims
Possible.Therefore, the present invention should not be limited to embodiment disclosure of that, and the scope of protection of present invention is with claim
Book defines in the range of standard.
Claims (5)
1. an Android application reinforcement means, described reinforcement means includes showing a C language program key code and to C source
Code is obscured;By the C source code in Android application program is obscured, it is achieved Android application is added
Gu so that Android application code is protected;Described reinforcement means comprises the steps:
A. the important code using control flow compression method to write C language is obscured, the following operation of concrete execution:
A1. source program P is read;
A2. P is carried out pretreatment, analyzes and extract the function information of P and preserve;
A3., in units of function, analyze and extract the code block information of P and preserve;
A4., on the premise of ensureing P logical relation, determine that partial code block controls block message as code and preserves at random;Institute
State code control block message and include controlling function name and the state pause judgments position of function in block order, control block;
A5. code controls block compression process: controls the type of block according to code, uses corresponding Obfuscating Algorithms that code is controlled block
Obscure, form program O (P) after obscuring;
A6. O (P) is inserted into position described in A4, thus obtains the C source code obscured and export;
B. use the mode of NDK programming, the C source code obscured is saved in C dynamic link library .so storehouse, then at Java code
Middle employing JNI calls the .so storehouse of bottom, compiling packing application, obtains the application of the Android after new reinforcing.
2. Android application reinforcement means as claimed in claim 1, is characterized in that, described in step A2, Preprocessing Algorithm is passed through
The source program P of input is resolved, extracts and obtain important function information;Described function information includes function name, function
Initial address and the end address of function, be also that each function generates a for loop structure or while loop structure and one
Switch structure, the control stream compression for follow-up operation is obscured.
3. Android application reinforcement means as claimed in claim 1, is characterized in that, it is compressed that code described in step A5 controls block
Journey extracts code control block message by analyzing, and controls the type of block, original position and end position according to code and calls not
Transparent predicate is obscured method and is obscured, and forms the program after obscuring;When code control block be if judge block structure time, to judgement
Structure is obscured, and constructs case branch;When code control block is while block structure, extract while Rule of judgment, structure
Comprise the case branch of if statement.
4. Android application reinforcement means as claimed in claim 1, is characterized in that, uses the mode of NDK programming to obtain described in B
The Android application of new reinforcing;Concrete execution operates as follows:
B1. java file, the function in statement local file are write;
B2 newly-built .c file;
B3. JNI entrance function is write, for loading the C source code after obscuring;
B4. write project profile Android.mk file, be used for configuring project information;
B5. compiling generates so storehouse;
B6. compiling packing application, obtains the Android application of new reinforcing.
5. Android application reinforcement means as claimed in claim 4, is characterized in that, the entrance function in step B3 is JNI_
OnLoad () and JNI_OnUnLoad ();Initialization operation is carried out in described entrance function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610773361.9A CN106326694A (en) | 2016-08-30 | 2016-08-30 | Android application reinforcing method baed on C source code mixing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610773361.9A CN106326694A (en) | 2016-08-30 | 2016-08-30 | Android application reinforcing method baed on C source code mixing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106326694A true CN106326694A (en) | 2017-01-11 |
Family
ID=57789416
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610773361.9A Pending CN106326694A (en) | 2016-08-30 | 2016-08-30 | Android application reinforcing method baed on C source code mixing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106326694A (en) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106951744A (en) * | 2017-03-15 | 2017-07-14 | 北京深思数盾科技股份有限公司 | The guard method of executable program and device |
CN107085677A (en) * | 2017-03-29 | 2017-08-22 | 武汉斗鱼网络科技有限公司 | The method and system that code is cracked are prevented in a kind of Flash |
CN107133502A (en) * | 2017-04-14 | 2017-09-05 | 北京洋浦伟业科技发展有限公司 | A kind of processing method and processing device of application program |
CN107229848A (en) * | 2017-06-12 | 2017-10-03 | 北京洋浦伟业科技发展有限公司 | A kind of code reinforcement means and device |
CN108416191A (en) * | 2018-02-12 | 2018-08-17 | 北京梆梆安全科技有限公司 | The method and device of source code is reinforced based on opaque predicate and finite state machine |
CN108446536A (en) * | 2018-02-12 | 2018-08-24 | 北京梆梆安全科技有限公司 | A kind of source code reinforcement means and device based on semiology analysis and single-point logic |
CN108446541A (en) * | 2018-02-12 | 2018-08-24 | 北京梆梆安全科技有限公司 | Source code reinforcement means and device based on finite state machine and semiology analysis |
CN108446537A (en) * | 2018-02-12 | 2018-08-24 | 北京梆梆安全科技有限公司 | Source code based on opaque predicate obscures method and device |
CN108509773A (en) * | 2018-02-12 | 2018-09-07 | 北京梆梆安全科技有限公司 | A kind of source code reinforcement means and device |
CN108537012A (en) * | 2018-02-12 | 2018-09-14 | 北京梆梆安全科技有限公司 | Source code based on variable and code execution sequence obscures method and device |
CN108536434A (en) * | 2018-01-09 | 2018-09-14 | 武汉斗鱼网络科技有限公司 | A kind of method and device for realizing Hook Function based on high-level programming language |
CN108846265A (en) * | 2018-04-18 | 2018-11-20 | 北京奇虎科技有限公司 | A kind of program reinforcement means and device |
CN108846264A (en) * | 2018-06-11 | 2018-11-20 | 北京奇虎科技有限公司 | Code reinforcement means, device, intelligent terminal and computer readable storage medium |
CN108985017A (en) * | 2018-09-26 | 2018-12-11 | 北京京东金融科技控股有限公司 | The reinforcement means and device of application program |
CN109344574A (en) * | 2018-09-19 | 2019-02-15 | 四川长虹电器股份有限公司 | A kind of adaptive Android reinforcement means based on specification |
CN109543369A (en) * | 2018-11-23 | 2019-03-29 | 杭州哲信信息技术有限公司 | A kind of guard method of DEX |
CN109740315A (en) * | 2018-12-28 | 2019-05-10 | 深圳前海微众银行股份有限公司 | Constant guard method, device, equipment and storage medium based on Android platform |
CN109960510A (en) * | 2019-03-20 | 2019-07-02 | 北京智游网安科技有限公司 | The reinforcement means and relevant device of Android application dynamic link library |
CN110135133A (en) * | 2019-04-19 | 2019-08-16 | 肖银皓 | A kind of integrated source code of compression towards microcontroller obscures method and system |
CN110298146A (en) * | 2019-06-27 | 2019-10-01 | 北京奇艺世纪科技有限公司 | A kind of processing of application program, operation method and device |
CN111666078A (en) * | 2020-04-30 | 2020-09-15 | 平安科技(深圳)有限公司 | Source code reinforcing method and device, computer equipment and storage medium |
CN112688919A (en) * | 2020-12-11 | 2021-04-20 | 杭州安恒信息技术股份有限公司 | APP interface-based crawler-resisting method, device and medium |
CN114047922A (en) * | 2021-11-16 | 2022-02-15 | 北京字节跳动网络技术有限公司 | Code conversion method, apparatus, medium, and device for pre-compiler |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104239757A (en) * | 2014-09-30 | 2014-12-24 | 北京奇虎科技有限公司 | Application program reversing-preventing method and device and operation method and terminal |
CN104463002A (en) * | 2014-12-24 | 2015-03-25 | 北京奇虎科技有限公司 | APK reinforcing method and device and APK reinforcing client and server |
CN105426708A (en) * | 2016-01-19 | 2016-03-23 | 北京鼎源科技有限公司 | Reinforcing method of application program of Android system |
CN105512521A (en) * | 2015-12-25 | 2016-04-20 | 北京奇虎科技有限公司 | Reinforcement and protection method and system for software installation package |
-
2016
- 2016-08-30 CN CN201610773361.9A patent/CN106326694A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104239757A (en) * | 2014-09-30 | 2014-12-24 | 北京奇虎科技有限公司 | Application program reversing-preventing method and device and operation method and terminal |
CN104463002A (en) * | 2014-12-24 | 2015-03-25 | 北京奇虎科技有限公司 | APK reinforcing method and device and APK reinforcing client and server |
CN105512521A (en) * | 2015-12-25 | 2016-04-20 | 北京奇虎科技有限公司 | Reinforcement and protection method and system for software installation package |
CN105426708A (en) * | 2016-01-19 | 2016-03-23 | 北京鼎源科技有限公司 | Reinforcing method of application program of Android system |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106951744B (en) * | 2017-03-15 | 2019-12-13 | 北京深思数盾科技股份有限公司 | protection method and device for executable program |
CN106951744A (en) * | 2017-03-15 | 2017-07-14 | 北京深思数盾科技股份有限公司 | The guard method of executable program and device |
CN107085677A (en) * | 2017-03-29 | 2017-08-22 | 武汉斗鱼网络科技有限公司 | The method and system that code is cracked are prevented in a kind of Flash |
CN107133502B (en) * | 2017-04-14 | 2019-10-15 | 北京梆梆安全科技有限公司 | A kind of processing method and processing device of application program |
CN107133502A (en) * | 2017-04-14 | 2017-09-05 | 北京洋浦伟业科技发展有限公司 | A kind of processing method and processing device of application program |
CN107229848A (en) * | 2017-06-12 | 2017-10-03 | 北京洋浦伟业科技发展有限公司 | A kind of code reinforcement means and device |
CN108536434B (en) * | 2018-01-09 | 2020-03-17 | 武汉斗鱼网络科技有限公司 | Method and device for realizing hook function based on high-level programming language |
CN108536434A (en) * | 2018-01-09 | 2018-09-14 | 武汉斗鱼网络科技有限公司 | A kind of method and device for realizing Hook Function based on high-level programming language |
CN108509773A (en) * | 2018-02-12 | 2018-09-07 | 北京梆梆安全科技有限公司 | A kind of source code reinforcement means and device |
CN108537012A (en) * | 2018-02-12 | 2018-09-14 | 北京梆梆安全科技有限公司 | Source code based on variable and code execution sequence obscures method and device |
CN108446537A (en) * | 2018-02-12 | 2018-08-24 | 北京梆梆安全科技有限公司 | Source code based on opaque predicate obscures method and device |
CN108416191B (en) * | 2018-02-12 | 2021-11-19 | 北京梆梆安全科技有限公司 | Method and device for reinforcing source code based on opaque predicate and finite state machine |
CN108537012B (en) * | 2018-02-12 | 2021-11-16 | 北京梆梆安全科技有限公司 | Source code obfuscation method and device based on variables and code execution sequence |
CN108446541A (en) * | 2018-02-12 | 2018-08-24 | 北京梆梆安全科技有限公司 | Source code reinforcement means and device based on finite state machine and semiology analysis |
CN108446536A (en) * | 2018-02-12 | 2018-08-24 | 北京梆梆安全科技有限公司 | A kind of source code reinforcement means and device based on semiology analysis and single-point logic |
CN108416191A (en) * | 2018-02-12 | 2018-08-17 | 北京梆梆安全科技有限公司 | The method and device of source code is reinforced based on opaque predicate and finite state machine |
CN108846265A (en) * | 2018-04-18 | 2018-11-20 | 北京奇虎科技有限公司 | A kind of program reinforcement means and device |
CN108846265B (en) * | 2018-04-18 | 2021-07-30 | 北京奇虎科技有限公司 | Program reinforcing method and device |
CN108846264A (en) * | 2018-06-11 | 2018-11-20 | 北京奇虎科技有限公司 | Code reinforcement means, device, intelligent terminal and computer readable storage medium |
CN109344574B (en) * | 2018-09-19 | 2020-09-22 | 四川长虹电器股份有限公司 | Self-adaptive android reinforcement method based on specification |
CN109344574A (en) * | 2018-09-19 | 2019-02-15 | 四川长虹电器股份有限公司 | A kind of adaptive Android reinforcement means based on specification |
CN108985017A (en) * | 2018-09-26 | 2018-12-11 | 北京京东金融科技控股有限公司 | The reinforcement means and device of application program |
CN109543369A (en) * | 2018-11-23 | 2019-03-29 | 杭州哲信信息技术有限公司 | A kind of guard method of DEX |
CN109543369B (en) * | 2018-11-23 | 2022-03-25 | 杭州哲信信息技术有限公司 | DEX protection method |
CN109740315A (en) * | 2018-12-28 | 2019-05-10 | 深圳前海微众银行股份有限公司 | Constant guard method, device, equipment and storage medium based on Android platform |
CN109960510A (en) * | 2019-03-20 | 2019-07-02 | 北京智游网安科技有限公司 | The reinforcement means and relevant device of Android application dynamic link library |
CN109960510B (en) * | 2019-03-20 | 2022-09-06 | 北京智游网安科技有限公司 | Method for reinforcing Android application dynamic link library and related equipment |
CN110135133B (en) * | 2019-04-19 | 2021-08-17 | 佛山市微风科技有限公司 | Microcontroller-oriented compression integrated source code obfuscation method and system |
CN110135133A (en) * | 2019-04-19 | 2019-08-16 | 肖银皓 | A kind of integrated source code of compression towards microcontroller obscures method and system |
CN110298146A (en) * | 2019-06-27 | 2019-10-01 | 北京奇艺世纪科技有限公司 | A kind of processing of application program, operation method and device |
CN110298146B (en) * | 2019-06-27 | 2022-04-22 | 北京奇艺世纪科技有限公司 | Application processing and running method and device |
CN111666078A (en) * | 2020-04-30 | 2020-09-15 | 平安科技(深圳)有限公司 | Source code reinforcing method and device, computer equipment and storage medium |
WO2021218173A1 (en) * | 2020-04-30 | 2021-11-04 | 平安科技(深圳)有限公司 | Source code reinforcement method and apparatus, and computer device and storage medium |
CN112688919A (en) * | 2020-12-11 | 2021-04-20 | 杭州安恒信息技术股份有限公司 | APP interface-based crawler-resisting method, device and medium |
CN114047922A (en) * | 2021-11-16 | 2022-02-15 | 北京字节跳动网络技术有限公司 | Code conversion method, apparatus, medium, and device for pre-compiler |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106326694A (en) | Android application reinforcing method baed on C source code mixing | |
CN105683990B (en) | Method and apparatus for protecting dynamic base | |
KR101471589B1 (en) | Method for Providing Security for Common Intermediate Language Program | |
CA2831369C (en) | Method of securing non-native code | |
CN104680039B (en) | A kind of data guard method and device of application program installation kit | |
Schoepe et al. | Explicit secrecy: A policy for taint tracking | |
CN106203006A (en) | Android application reinforcement means based on dex Yu so file Dynamic Execution | |
Tang et al. | A novel hybrid method to analyze security vulnerabilities in android applications | |
CN108733379B (en) | Android application reinforcement method based on DEX byte code extraction mapping confusion | |
CN108733988A (en) | The guard method of executable program on Android platform | |
CN105608391B (en) | More ELF document protection methods and system | |
KR101861341B1 (en) | Deobfuscation apparatus of application code and method of deobfuscating application code using the same | |
KR101234591B1 (en) | Method for Anti-Encoding Android by Using Java Native Interface | |
Lu et al. | DeepAutoD: Research on distributed machine learning oriented scalable mobile communication security unpacking system | |
CN112163195B (en) | Virtual machine software protection method based on stack hiding | |
CN103413074B (en) | A kind of method and apparatus being realized software protection by API | |
Bastys et al. | Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps | |
CN113779578B (en) | Intelligent confusion method and system for mobile terminal application | |
Xu et al. | Security analysis and protection based on smali injection for android applications | |
CN107066886A (en) | A kind of Android reinforces the detection method of shelling | |
KR101436741B1 (en) | The method and system for applying security solution program | |
Wang et al. | Leveraging WebAssembly for Numerical JavaScript Code Virtualization | |
Tsoupidi et al. | Vivienne: Relational verification of cryptographic implementations in webassembly | |
CN115774865A (en) | Front-end code operation method and device, electronic equipment and storage medium | |
Guo et al. | A survey of obfuscation and deobfuscation techniques in android code protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170111 |
|
RJ01 | Rejection of invention patent application after publication |