CN106326694A - Android application reinforcing method baed on C source code mixing - Google Patents

Android application reinforcing method baed on C source code mixing Download PDF

Info

Publication number
CN106326694A
CN106326694A CN201610773361.9A CN201610773361A CN106326694A CN 106326694 A CN106326694 A CN 106326694A CN 201610773361 A CN201610773361 A CN 201610773361A CN 106326694 A CN106326694 A CN 106326694A
Authority
CN
China
Prior art keywords
code
android application
block
function
obscured
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610773361.9A
Other languages
Chinese (zh)
Inventor
文伟平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Devsource Technology Co Ltd
Original Assignee
Beijing Devsource Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Devsource Technology Co Ltd filed Critical Beijing Devsource Technology Co Ltd
Priority to CN201610773361.9A priority Critical patent/CN106326694A/en
Publication of CN106326694A publication Critical patent/CN106326694A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Devices For Executing Special Programs (AREA)

Abstract

The invention discloses an Android application reinforcing method based on C source code mixing. The method comprises writing program key codes by using C programming languages and mixing C source codes. The reinforcement of Android application is achieved by mixing the C source codes in the Android application program, and the Android application program codes are protected. The Android application reinforcing method based on C source code mixing specifically includes the steps of writing the key part of the program by using C programming languages, writing programs into .so dynamic-link library file, invoking the dynamic-link library by using JNI technology in Java language, and then mixing the C source codes, so as to achieve the reinforcement of Android application. According to the Android application reinforcing method based on C source code mixing, important codes are saved in the C dynamic-link library by adopting NDK programming, and then the C source codes are mixed, the software protection is improved. At the same time, the important codes are written in a so library, the reusability of the codes are increased, ready-made so library can be directly introduced into other applications, so as to eliminate the troubles of secondary development.

Description

A kind of Android application reinforcement means obscured based on C source code
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of Android application obscured based on C source code Reinforcement means.
Background technology
The most intelligent along with mobile phone, from strength to strength, security threat also can increase the function of mobile phone therewith, mobile phone The paid services such as payment start to popularize, these business are closely related with economic transaction, so for the safety of cell phone software Requiring the highest, leakage or the pretending to be of identity of some secret informations, all can bring huge economic loss.And for commercialization The right of software developer also should well be protected, so the safety of cell phone software is the most important.
Android, as emerging operating system, has just developed rapidly since listing in 07 year, gradually replaces Saipan system, Form, with the IOS of Fructus Mali pumilae, the gesture made rival claims as an equal, but under Android platform, Software Protection Technique research be still in the starting stage, A lot of traditional software resist technologies are under this platform and inapplicable, and the increasing income property of code makes again to be easy to doping in developer and dislikes Meaning assailant, the application software situation that is cracked is of common occurrence, and maliciously fee suction software is also often to have generation, and these the most greatly damage Numerous developers and the interests of use certificate, also constrain the sound development of Android operation system.
Along with the development of android system, increasing of software application, the malicious act that mobile phone occurs also gets more and more. The main cause that mobile phone viruses is walked crosswise in Android platform wantonly has: be different from Fructus Mali pumilae APP Store establish a set of simply APP charging mode clearly, on Android market at home, application has been absorbed in free predicament, though freely looking good, but Being the most really to conceal many potential safety hazards, the legitimacy of application cannot be judged, and application is probably carried out by assailant Crack, add some malicious acts made a profit wherein, let pass by application shop forum etc. the most again and be diffused, and with The information cellphone subscriber is more and more important, and payment, network game, associated person information etc. more start to become the gold in lawless person's eye Money.
For Android software developer, need the software managing to prevent developing by other people decompiling And be cracked, it is ensured that the core code of software is not plagiarized by other people, thus maximally protects Android software Developmental Engineer's Interests, ensure the safety of Android application simultaneously.
The Code Obfuscation Security Technology that more existing Android application program reinforcement means are used is all based on greatly Java source generation Code is obscured, and Java code itself is easier by decompiling so that software protection effect is the most preferable.
Summary of the invention
In order to overcome above-mentioned the deficiencies in the prior art, the present invention provides a kind of Android obscured based on C source code to answer With reinforcement means, utilize C source code itself be difficult to by the characteristic of decompiling, first the pith of program is shown a C language, Being compiled into .so dynamic link library file, (Java Native Interface, Java are originally then to utilize the JNI in Java language Ground interface interchange) technology calls this dynamic link library;Secondly, C source code is obscured, thus realize Android is answered Reinforcing.
Present invention provide the technical scheme that
A kind of Android application reinforcement means obscured based on C source code, to the C source generation in Android application program Code is obscured so that Android application code is protected.Described reinforcement means includes that the program that shows a C language is closed Key code and obscure C source code, specifically includes following steps:
A. the important code write C language is obscured, and uses and controls stream compress technique, the following operation of execution:
A1. source program P is read;
A2. P is carried out pretreatment, analyzes and extract the function information of P and preserve;
A3., in units of function, analyze and extract the code block information of P and preserve;
A4., on the premise of ensureing P logical relation, determine that partial code block is as controlling block message and preserving at random;
Determine at random as the code block controlling block, it may be possible to condition or loop structure, can be as code block information Preserving, code block, in units of function, the most also preserves function name and the state pause judgments position of function in code block;The generation preserved Code block information is in A5;
A5. judge to control the type of block, and use corresponding Obfuscating Algorithms, enter controlling block according to the order determined in A4 Row is mixed
Confuse, form program O (P) after obscuring;
When control block be if judge block structure time, to judging that structure is obscured, structure case branch.When controlling block it is During while block structure, extracting while Rule of judgment, structure comprises the case branch of if statement;
A6. O (P) is arranged: O (P) is inserted into the position (position of the function preserved in A4) specified, and
The C source code that output is obscured;
B. the mode using NDK (NativeDevelopmentKit) to program, is saved in .so the C source code obscured and moves In state chained library (.so storehouse), then use JNI technology to call the .so storehouse of bottom in Java code, perform to operate as follows:
B1. Java code (java file), the function in statement local file are write;
The .c file that local file is in B2, needs first to state in java file;
B2 newly-built .c file, the C source code after i.e. obscuring;
B3. JNI entrance function JNI_OnLoad function is write, for loading the C source code after obscuring;
B4. write project profile Android.mk file, be used for configuring project information;
B5. compiling generates so storehouse;
B6. compiling packing application, obtains the Android application of new reinforcing.
The above-mentioned Android application reinforcement means obscured based on C source code, further, the pretreatment in step A2 Algorithm mainly by resolving the source program of input, is prepared for follow-up control stream compression, is extracted important information, Ensure to control stream properly functioning.Mainly include function name, the initial address of function and the end address of function, for often Individual function generates for (or while) loop structure and switch structure, and for structure is each in order to complete in switch The circulation of individual basic block performs, and switch structure control program is flattened.
The above-mentioned Android application reinforcement means obscured based on C source code, further, the control block pressure of step A5 Algorithm (Obfuscating Algorithms) critical function of the part that contracts is to analyze to extract code control block message, according to the type of control block, initial Position and end position call different opaque predicates and obscure method.
The above-mentioned Android application reinforcement means obscured based on C source code, further, the entrance letter in step B3 Number is JNI_OnLoad () and JNI_OnUnLoad (), when Dalvik virtual machine goes to System.loadLibraryO function Time, entrance function in C file can be first carried out, it can tell which JNI version Dalvik virtual machine uses, if dynamically Not having entrance function in chained library, virtual machine can give tacit consent to the JNI1.1 version that use is oldest.And we are also required at entrance letter Number carries out some initialized operations.
Compared with prior art, the invention has the beneficial effects as follows:
The present invention provides a kind of Android application reinforcement means obscured based on C source code, utilizes C source code itself It is difficult to, by the characteristic of decompiling, first be shown a C language by the pith of program, is compiled into .so dynamic link library file, so It is dynamic that rear JNI (Java Native Interface, the Java local interface calls) technology utilized in Java language calls this Chained library;Secondly, C source code is obscured, thus realize the reinforcing to Android application.
The inventive method uses the mode of NDK programming, important code is saved in C dynamic link library, the most again to C source Code is obscured, and can strengthen the protective measure to software.In addition, important code is write in so storehouse, moreover it is possible to increase The reusability of code, in other are applied, can be introduced directly into ready-made so storehouse, eliminate the trouble of secondary development next time.
Accompanying drawing explanation
Fig. 1 is the FB(flow block) of the Android application reinforcement means that the C source code that the present invention provides is obscured.
Fig. 2 is NDK development process figure;
Mode initially with NDK writes C source code, and compiling generates .so file, and then Java code is called by JNI Mode call the C source code in .so file, followed by SDK compile whole project, be packaged into .apk file.
Detailed description of the invention
Below in conjunction with the accompanying drawings, further describe the present invention by embodiment, but limit the model of the present invention never in any form Enclose.
The present invention provides a kind of Android application reinforcement means obscured based on C source code, to Android application journey C source code in sequence is obscured so that Android application code is protected.Reinforcement means includes showing a C language Program key code and C source code is obscured;Fig. 1 is that the Android application that the C source code that the present invention provides is obscured is reinforced The FB(flow block) of method, specifically includes following steps:
A. the important code write C language is obscured, and uses and controls stream compress technique, the following operation of execution:
A1. source program P is read;
A2. P is carried out pretreatment, analyzes and extract the function information of P and preserve;
A3., in units of function, analyze and extract the code block information of P and preserve;
P is carried out in units of function pretreatment, analyzes the code block information of the function extracting P and preserve;
A4., on the premise of ensureing P logical relation, determine that partial code block is as controlling block message and preserving at random;
Determine at random as the code block controlling block, it may be possible to condition or loop structure, can be as code block information Preserving, code block, in units of function, the most also preserves function name and the state pause judgments position of function in code block;The generation preserved Code block information is in A5;
A5. judge to control the type of block, and use corresponding Obfuscating Algorithms, enter controlling block according to the order determined in A4 Row is mixed
Confuse, form program O (P) after obscuring;
When control block be if judge block structure time, to judging that structure is obscured, structure case branch.When controlling block it is During while block structure, extracting while Rule of judgment, structure comprises the case branch of if statement;
A6. O (P) is arranged: O (P) is inserted into the position (position of the function preserved in A4) specified, and
The C source code that output is obscured;
B. the mode using NDK (NativeDevelopmentKit) to program, is saved in .so the C source code obscured and moves In state chained library (.so storehouse), then use JNI technology to call the .so storehouse of bottom in Java code, perform to operate as follows:
B1. Java code (java file), the function in statement local file are write;
The .c file that local file is in B2, needs first to state in java file;
B2 newly-built .c file, the C source code after i.e. obscuring;
B3. JNI entrance function JNI_OnLoad function is write, for loading the C source code after obscuring;
B4. write project profile Android.mk file, be used for configuring project information;
B5. compiling generates so storehouse;
B6. compiling packing application, obtains the Android application of new reinforcing.
Wherein, the important code write C language is obscured employing and is controlled stream compress technique.In NDK development process, control The Code obfuscation method core of stream compression algorithm processed be broadly divided into preprocessing part and control block compression section, below for this two Part carries out emphasis description.
The major function of Preprocessing Algorithm is that the source code to input carries out pretreatment.In Preprocessing Algorithm, Uniqueident_Random () method is used for as obscuring rear Program Generating variable name;The code of pretreatment is as follows, wherein, → it After be the false code of Preprocessing Algorithm;" // " the part of back annotation is the specific descriptions to Preprocessing Algorithm;Pretreatment generates Be the function information of source program.Specifically, input: source program;Algorithm input is analyzed, preserves function information and exist Rune_parts array;Start For circulation, the function of the preservation in func_parts is analyzed, including: call pseudo-another name Algorithm to sending variable to be encrypted operation, circulation is held line control block and is obscured the operation such as control algolithm;Output: the function of source program Information;
Below for controlling the code of the algorithm of block compression section, input the function information for obscuring front program;Analyze and extract Control block in part;Perform circulation: call different predicate according to different control block types and insert function;After being output as obscuring Program code;
Fig. 2 is NDK development process figure.Specifically, NDK exploitation writes C source code initially with the mode of NDK, and compiling is raw Becoming .so file, then, Java code calls the C source code in .so file by the way of JNI calls, and compiles followed by SDK Translate whole project, be packaged into .apk file.
First each code block in controlling stream graph is all placed in a switch statement by following example, the most again This switch statement is encapsulated in an endless loop, and the code after conversion will become parallel execution flow process with controlling stream, Thus reach the effect obscured, thus realize Andriod application and reinforce.
Original code is as follows:
Code after obscuring is as follows:
It should be noted that publicizing and implementing the purpose of example is that help is further appreciated by the present invention, but the skill of this area Art personnel are understood that various substitutions and modifications are all without departing from the present invention and spirit and scope of the appended claims Possible.Therefore, the present invention should not be limited to embodiment disclosure of that, and the scope of protection of present invention is with claim Book defines in the range of standard.

Claims (5)

1. an Android application reinforcement means, described reinforcement means includes showing a C language program key code and to C source Code is obscured;By the C source code in Android application program is obscured, it is achieved Android application is added Gu so that Android application code is protected;Described reinforcement means comprises the steps:
A. the important code using control flow compression method to write C language is obscured, the following operation of concrete execution:
A1. source program P is read;
A2. P is carried out pretreatment, analyzes and extract the function information of P and preserve;
A3., in units of function, analyze and extract the code block information of P and preserve;
A4., on the premise of ensureing P logical relation, determine that partial code block controls block message as code and preserves at random;Institute State code control block message and include controlling function name and the state pause judgments position of function in block order, control block;
A5. code controls block compression process: controls the type of block according to code, uses corresponding Obfuscating Algorithms that code is controlled block Obscure, form program O (P) after obscuring;
A6. O (P) is inserted into position described in A4, thus obtains the C source code obscured and export;
B. use the mode of NDK programming, the C source code obscured is saved in C dynamic link library .so storehouse, then at Java code Middle employing JNI calls the .so storehouse of bottom, compiling packing application, obtains the application of the Android after new reinforcing.
2. Android application reinforcement means as claimed in claim 1, is characterized in that, described in step A2, Preprocessing Algorithm is passed through The source program P of input is resolved, extracts and obtain important function information;Described function information includes function name, function Initial address and the end address of function, be also that each function generates a for loop structure or while loop structure and one Switch structure, the control stream compression for follow-up operation is obscured.
3. Android application reinforcement means as claimed in claim 1, is characterized in that, it is compressed that code described in step A5 controls block Journey extracts code control block message by analyzing, and controls the type of block, original position and end position according to code and calls not Transparent predicate is obscured method and is obscured, and forms the program after obscuring;When code control block be if judge block structure time, to judgement Structure is obscured, and constructs case branch;When code control block is while block structure, extract while Rule of judgment, structure Comprise the case branch of if statement.
4. Android application reinforcement means as claimed in claim 1, is characterized in that, uses the mode of NDK programming to obtain described in B The Android application of new reinforcing;Concrete execution operates as follows:
B1. java file, the function in statement local file are write;
B2 newly-built .c file;
B3. JNI entrance function is write, for loading the C source code after obscuring;
B4. write project profile Android.mk file, be used for configuring project information;
B5. compiling generates so storehouse;
B6. compiling packing application, obtains the Android application of new reinforcing.
5. Android application reinforcement means as claimed in claim 4, is characterized in that, the entrance function in step B3 is JNI_ OnLoad () and JNI_OnUnLoad ();Initialization operation is carried out in described entrance function.
CN201610773361.9A 2016-08-30 2016-08-30 Android application reinforcing method baed on C source code mixing Pending CN106326694A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610773361.9A CN106326694A (en) 2016-08-30 2016-08-30 Android application reinforcing method baed on C source code mixing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610773361.9A CN106326694A (en) 2016-08-30 2016-08-30 Android application reinforcing method baed on C source code mixing

Publications (1)

Publication Number Publication Date
CN106326694A true CN106326694A (en) 2017-01-11

Family

ID=57789416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610773361.9A Pending CN106326694A (en) 2016-08-30 2016-08-30 Android application reinforcing method baed on C source code mixing

Country Status (1)

Country Link
CN (1) CN106326694A (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106951744A (en) * 2017-03-15 2017-07-14 北京深思数盾科技股份有限公司 The guard method of executable program and device
CN107085677A (en) * 2017-03-29 2017-08-22 武汉斗鱼网络科技有限公司 The method and system that code is cracked are prevented in a kind of Flash
CN107133502A (en) * 2017-04-14 2017-09-05 北京洋浦伟业科技发展有限公司 A kind of processing method and processing device of application program
CN107229848A (en) * 2017-06-12 2017-10-03 北京洋浦伟业科技发展有限公司 A kind of code reinforcement means and device
CN108416191A (en) * 2018-02-12 2018-08-17 北京梆梆安全科技有限公司 The method and device of source code is reinforced based on opaque predicate and finite state machine
CN108446536A (en) * 2018-02-12 2018-08-24 北京梆梆安全科技有限公司 A kind of source code reinforcement means and device based on semiology analysis and single-point logic
CN108446541A (en) * 2018-02-12 2018-08-24 北京梆梆安全科技有限公司 Source code reinforcement means and device based on finite state machine and semiology analysis
CN108446537A (en) * 2018-02-12 2018-08-24 北京梆梆安全科技有限公司 Source code based on opaque predicate obscures method and device
CN108509773A (en) * 2018-02-12 2018-09-07 北京梆梆安全科技有限公司 A kind of source code reinforcement means and device
CN108537012A (en) * 2018-02-12 2018-09-14 北京梆梆安全科技有限公司 Source code based on variable and code execution sequence obscures method and device
CN108536434A (en) * 2018-01-09 2018-09-14 武汉斗鱼网络科技有限公司 A kind of method and device for realizing Hook Function based on high-level programming language
CN108846265A (en) * 2018-04-18 2018-11-20 北京奇虎科技有限公司 A kind of program reinforcement means and device
CN108846264A (en) * 2018-06-11 2018-11-20 北京奇虎科技有限公司 Code reinforcement means, device, intelligent terminal and computer readable storage medium
CN108985017A (en) * 2018-09-26 2018-12-11 北京京东金融科技控股有限公司 The reinforcement means and device of application program
CN109344574A (en) * 2018-09-19 2019-02-15 四川长虹电器股份有限公司 A kind of adaptive Android reinforcement means based on specification
CN109543369A (en) * 2018-11-23 2019-03-29 杭州哲信信息技术有限公司 A kind of guard method of DEX
CN109740315A (en) * 2018-12-28 2019-05-10 深圳前海微众银行股份有限公司 Constant guard method, device, equipment and storage medium based on Android platform
CN109960510A (en) * 2019-03-20 2019-07-02 北京智游网安科技有限公司 The reinforcement means and relevant device of Android application dynamic link library
CN110135133A (en) * 2019-04-19 2019-08-16 肖银皓 A kind of integrated source code of compression towards microcontroller obscures method and system
CN110298146A (en) * 2019-06-27 2019-10-01 北京奇艺世纪科技有限公司 A kind of processing of application program, operation method and device
CN111666078A (en) * 2020-04-30 2020-09-15 平安科技(深圳)有限公司 Source code reinforcing method and device, computer equipment and storage medium
CN112688919A (en) * 2020-12-11 2021-04-20 杭州安恒信息技术股份有限公司 APP interface-based crawler-resisting method, device and medium
CN114047922A (en) * 2021-11-16 2022-02-15 北京字节跳动网络技术有限公司 Code conversion method, apparatus, medium, and device for pre-compiler

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239757A (en) * 2014-09-30 2014-12-24 北京奇虎科技有限公司 Application program reversing-preventing method and device and operation method and terminal
CN104463002A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 APK reinforcing method and device and APK reinforcing client and server
CN105426708A (en) * 2016-01-19 2016-03-23 北京鼎源科技有限公司 Reinforcing method of application program of Android system
CN105512521A (en) * 2015-12-25 2016-04-20 北京奇虎科技有限公司 Reinforcement and protection method and system for software installation package

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239757A (en) * 2014-09-30 2014-12-24 北京奇虎科技有限公司 Application program reversing-preventing method and device and operation method and terminal
CN104463002A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 APK reinforcing method and device and APK reinforcing client and server
CN105512521A (en) * 2015-12-25 2016-04-20 北京奇虎科技有限公司 Reinforcement and protection method and system for software installation package
CN105426708A (en) * 2016-01-19 2016-03-23 北京鼎源科技有限公司 Reinforcing method of application program of Android system

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106951744B (en) * 2017-03-15 2019-12-13 北京深思数盾科技股份有限公司 protection method and device for executable program
CN106951744A (en) * 2017-03-15 2017-07-14 北京深思数盾科技股份有限公司 The guard method of executable program and device
CN107085677A (en) * 2017-03-29 2017-08-22 武汉斗鱼网络科技有限公司 The method and system that code is cracked are prevented in a kind of Flash
CN107133502B (en) * 2017-04-14 2019-10-15 北京梆梆安全科技有限公司 A kind of processing method and processing device of application program
CN107133502A (en) * 2017-04-14 2017-09-05 北京洋浦伟业科技发展有限公司 A kind of processing method and processing device of application program
CN107229848A (en) * 2017-06-12 2017-10-03 北京洋浦伟业科技发展有限公司 A kind of code reinforcement means and device
CN108536434B (en) * 2018-01-09 2020-03-17 武汉斗鱼网络科技有限公司 Method and device for realizing hook function based on high-level programming language
CN108536434A (en) * 2018-01-09 2018-09-14 武汉斗鱼网络科技有限公司 A kind of method and device for realizing Hook Function based on high-level programming language
CN108509773A (en) * 2018-02-12 2018-09-07 北京梆梆安全科技有限公司 A kind of source code reinforcement means and device
CN108537012A (en) * 2018-02-12 2018-09-14 北京梆梆安全科技有限公司 Source code based on variable and code execution sequence obscures method and device
CN108446537A (en) * 2018-02-12 2018-08-24 北京梆梆安全科技有限公司 Source code based on opaque predicate obscures method and device
CN108416191B (en) * 2018-02-12 2021-11-19 北京梆梆安全科技有限公司 Method and device for reinforcing source code based on opaque predicate and finite state machine
CN108537012B (en) * 2018-02-12 2021-11-16 北京梆梆安全科技有限公司 Source code obfuscation method and device based on variables and code execution sequence
CN108446541A (en) * 2018-02-12 2018-08-24 北京梆梆安全科技有限公司 Source code reinforcement means and device based on finite state machine and semiology analysis
CN108446536A (en) * 2018-02-12 2018-08-24 北京梆梆安全科技有限公司 A kind of source code reinforcement means and device based on semiology analysis and single-point logic
CN108416191A (en) * 2018-02-12 2018-08-17 北京梆梆安全科技有限公司 The method and device of source code is reinforced based on opaque predicate and finite state machine
CN108846265A (en) * 2018-04-18 2018-11-20 北京奇虎科技有限公司 A kind of program reinforcement means and device
CN108846265B (en) * 2018-04-18 2021-07-30 北京奇虎科技有限公司 Program reinforcing method and device
CN108846264A (en) * 2018-06-11 2018-11-20 北京奇虎科技有限公司 Code reinforcement means, device, intelligent terminal and computer readable storage medium
CN109344574B (en) * 2018-09-19 2020-09-22 四川长虹电器股份有限公司 Self-adaptive android reinforcement method based on specification
CN109344574A (en) * 2018-09-19 2019-02-15 四川长虹电器股份有限公司 A kind of adaptive Android reinforcement means based on specification
CN108985017A (en) * 2018-09-26 2018-12-11 北京京东金融科技控股有限公司 The reinforcement means and device of application program
CN109543369A (en) * 2018-11-23 2019-03-29 杭州哲信信息技术有限公司 A kind of guard method of DEX
CN109543369B (en) * 2018-11-23 2022-03-25 杭州哲信信息技术有限公司 DEX protection method
CN109740315A (en) * 2018-12-28 2019-05-10 深圳前海微众银行股份有限公司 Constant guard method, device, equipment and storage medium based on Android platform
CN109960510A (en) * 2019-03-20 2019-07-02 北京智游网安科技有限公司 The reinforcement means and relevant device of Android application dynamic link library
CN109960510B (en) * 2019-03-20 2022-09-06 北京智游网安科技有限公司 Method for reinforcing Android application dynamic link library and related equipment
CN110135133B (en) * 2019-04-19 2021-08-17 佛山市微风科技有限公司 Microcontroller-oriented compression integrated source code obfuscation method and system
CN110135133A (en) * 2019-04-19 2019-08-16 肖银皓 A kind of integrated source code of compression towards microcontroller obscures method and system
CN110298146A (en) * 2019-06-27 2019-10-01 北京奇艺世纪科技有限公司 A kind of processing of application program, operation method and device
CN110298146B (en) * 2019-06-27 2022-04-22 北京奇艺世纪科技有限公司 Application processing and running method and device
CN111666078A (en) * 2020-04-30 2020-09-15 平安科技(深圳)有限公司 Source code reinforcing method and device, computer equipment and storage medium
WO2021218173A1 (en) * 2020-04-30 2021-11-04 平安科技(深圳)有限公司 Source code reinforcement method and apparatus, and computer device and storage medium
CN112688919A (en) * 2020-12-11 2021-04-20 杭州安恒信息技术股份有限公司 APP interface-based crawler-resisting method, device and medium
CN114047922A (en) * 2021-11-16 2022-02-15 北京字节跳动网络技术有限公司 Code conversion method, apparatus, medium, and device for pre-compiler

Similar Documents

Publication Publication Date Title
CN106326694A (en) Android application reinforcing method baed on C source code mixing
CN105683990B (en) Method and apparatus for protecting dynamic base
KR101471589B1 (en) Method for Providing Security for Common Intermediate Language Program
CA2831369C (en) Method of securing non-native code
CN104680039B (en) A kind of data guard method and device of application program installation kit
Schoepe et al. Explicit secrecy: A policy for taint tracking
CN106203006A (en) Android application reinforcement means based on dex Yu so file Dynamic Execution
Tang et al. A novel hybrid method to analyze security vulnerabilities in android applications
CN108733379B (en) Android application reinforcement method based on DEX byte code extraction mapping confusion
CN108733988A (en) The guard method of executable program on Android platform
CN105608391B (en) More ELF document protection methods and system
KR101861341B1 (en) Deobfuscation apparatus of application code and method of deobfuscating application code using the same
KR101234591B1 (en) Method for Anti-Encoding Android by Using Java Native Interface
Lu et al. DeepAutoD: Research on distributed machine learning oriented scalable mobile communication security unpacking system
CN112163195B (en) Virtual machine software protection method based on stack hiding
CN103413074B (en) A kind of method and apparatus being realized software protection by API
Bastys et al. Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps
CN113779578B (en) Intelligent confusion method and system for mobile terminal application
Xu et al. Security analysis and protection based on smali injection for android applications
CN107066886A (en) A kind of Android reinforces the detection method of shelling
KR101436741B1 (en) The method and system for applying security solution program
Wang et al. Leveraging WebAssembly for Numerical JavaScript Code Virtualization
Tsoupidi et al. Vivienne: Relational verification of cryptographic implementations in webassembly
CN115774865A (en) Front-end code operation method and device, electronic equipment and storage medium
Guo et al. A survey of obfuscation and deobfuscation techniques in android code protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170111

RJ01 Rejection of invention patent application after publication