CN104318155A - Dynamic loading method capable of guarding against reverse APK file - Google Patents

Dynamic loading method capable of guarding against reverse APK file Download PDF

Info

Publication number
CN104318155A
CN104318155A CN201410663307.XA CN201410663307A CN104318155A CN 104318155 A CN104318155 A CN 104318155A CN 201410663307 A CN201410663307 A CN 201410663307A CN 104318155 A CN104318155 A CN 104318155A
Authority
CN
China
Prior art keywords
file
classes
dex
apk
dex file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410663307.XA
Other languages
Chinese (zh)
Inventor
刘鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410663307.XA priority Critical patent/CN104318155A/en
Priority to PCT/CN2014/092643 priority patent/WO2016078130A1/en
Publication of CN104318155A publication Critical patent/CN104318155A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a dynamic loading method capable of guarding against a reverse APK file. The method includes the steps that a first Classes.dex file is loaded, an Entry.so file is called, decryption processing is conducted on an Encrypt.so file through the Entry.so file, and the decrypted Encrypt.so file is obtained; decryption is conducted on a second Classes.dex file through the Entry.so file, and an original Classes.dex file in an APK file generated before the reinforcing processing is conducted is obtained; dynamic loading is conducted on the original Classes.dex file, the physical address of a source code for storing the APK file functions is found out, and the source code is dynamically loaded to a memory; The decrypted original Classes.dex file is deleted from the physical memory. By means of the dynamic loading method, decompilation of an existing Android reverse tool can be avoided, the difficulty in the decompilation is increased, and thus the safety of the APK file can be improved to a large degree.

Description

A kind of dynamic loading method of anti-reversing APK file
Technical field
The present invention relates to mobile terminal application safety field, particularly a kind of dynamic loading method of anti-reversing APK file.
Background technology
APK (abbreviation of Android PacKage) i.e. Android installation kit.APK file (i.e. APK application program) is directly passed in the terminal device (such as Android smartphone) of Android simulator or Android operation system and perform and can install.APK file is zip form in fact, but suffix name is modified to apk, and windows system can be checked by the direct decompress(ion) of decompression instrument (such as winrar software).After decompress(ion) APK file, general appreciable bibliographic structure is as shown in table 1 below:
Table 1
The final stage of Android application development is packing signature, and generate APK file and download and install for user, packing is packaged into APK file as shown in Figure 1.This shows, if can carry out reverse to Dex file and AndroidManifest.XML, the source code of application APK file can be restored, if add malicious code on the basis of source code, again to sign packing, the APK file of carrying malicious code can be generated.
Growing along with Android mobile terminal platform, third party application emerges in multitude, to the piracy of third-party application with to beat again bag phenomenon day by day serious.The programming language used due to Android platform software is Java, and the binary code after Java source code compiling is very easily by decompiling, causes it to crack the program of difficulty much smaller than other use compiled language compilation.In view of APK file under Android can easily by the decompiling of the decompiling such as dex2jar and JD-GUI, JAD instrument be easy to read JAVA code, thus plaintext character string, library function call, Core Feature function etc. in code is all very clear, makes illegal developer become the piracy of third party application or the reverse-engineering of Core Feature and is more prone to.
Prior art is compared, and the present invention has following beneficial effect:
Above-mentioned reinforcement means is utilized to carry out the APK file of reinforcing, current most popular Android reverse instrument dex2jar and apktool is used to carry out reverse compiling respectively, due to not source code in a reverse compiling Classes.dex file out, and the source code realizing an APK file major function still leaves former Classes.dex file in, but under being left in the file directory of specifying after this former Classes.dex file is encrypted to the 2nd Classes.dex file, reverse instrument dex2jar and apktool is utilized to be difficult to the 2nd Classes.dex file after finding deciphering, even if find the 2nd Classes.dex file, cannot be decrypted due to Encrypt ' the .so file of deciphering the 2nd Classes.dex file cannot be found, thus can effectively prevent APK file from being divulged a secret by after reverse amendment.As can be seen here, after the reinforcement means consolidation process utilizing the application to mention, achieve the enciphering hiding of the source code of APK file, the decompiling of the reverse instrument of existing Android can be evaded, thus the security of APK file can be improved dramatically.
Summary of the invention
In order to reduce APK file by reverse risk; the invention provides a kind of dynamic loading method of anti-reversing APK file; solve APK file (i.e. APK application program) to be easy to by decompiling display and the problem of easily divulging a secret; third party application can be made to reinforce, maximize the safety of protection APK application program.
The present invention adopts following technical scheme to realize: a kind of dynamic loading method of anti-reversing APK file, it comprises step: load a Classes.dex file, call Entry.so file, utilize Entry.so file to be decrypted process to Encrypt ' .so file, obtain the Encrypt.so file after deciphering;
Utilize Entry.so file to be decrypted the 2nd Classes.dex file, obtain the former Classes.dex file in the APK file before consolidation process;
Dynamic load is carried out to former Classes.dex file, and finds the physical address of the source code depositing APK file function, by source code dynamic load to internal memory;
The former Classes.dex file after deciphering is deleted from physical memory;
Wherein, only comprise in one Classes.dex file former Classes.dex file top of file structure, 2nd Classes.dex file and Encrypt ' .so file leave under file directory res, Entry.so file leaves under file directory libs, forms described anti-reversing APK file by after a Classes.dex file, AndroidManifest ' .xml file, file directory res, file directory libs and resources.ars Document encapsulation.
Wherein, the 2nd Classes.dex file is decrypted before also comprise the step of former Classes.dex file being carried out to integrity checking.
Wherein, utilize the file header field information that structure comprises of a Classes.dex file, integrity checking is carried out to the former Classes.dex file that deciphering obtains.
Wherein, carried out to former Classes.dex file specifically comprising of dynamic load: a newly-built DexClassLoader object with source program Classes.dex, be substituted into the attribute mClassLoader in the loading classes of system default by the mode of reflection.
Wherein, according to data_size field and data_off field information in former Classes.dex file file head construction, and the physical address of the source code depositing APK file function is found.
Wherein, the step of source code dynamic load to internal memory is specifically comprised:
Utilize self-defining onCreate method, by the meta-data attribute in application in AndroidManifest, find the physical address of source code, thus replace to the Application of source program;
Existing in internal memory " an Application file " to be removed from calling set, and a newly-built Application object app, the attribute of former Classes.dex file is tied to app, then app is joined internal memory call in set;
Due to assembly Provider before onCreate method just by system registry, therefore app is tied on the context of Provider in source program, then start up system level onCreate method.
Accompanying drawing explanation
Fig. 1 is the packing encapsulation schematic flow sheet of APK file.
Fig. 2 is the schematic flow sheet of the reinforcement means of APK file anti-reversing of the present invention.
Fig. 3 is the contrast schematic diagram of the document directory structure before and after APK file is reinforced.
Fig. 4 is the schematic flow sheet that after reinforcing, APK file realizes dynamic load.
Embodiment
For the ease of understanding the technical scheme of the application, applicant is first first further described in detail classes.dex file in APK file bibliographic structure:
Classes.dex file is the java byte code files generated after the compiling of java source code.But the dalvik virtual machine used due to Android and the java virtual machine of standard are incompatible, dex file compared with class file, no matter be that file structure or opcode are different.Classes.dex file is made up of file header, index area and data field three parts.Wherein, classes.dex top of file separation structure is defined as follows shown in table 2.
Field name Explanation
checksum Check code
signature SHA-1 signs
file_size The total length of Dex file
data_size The size of data segment, must with 4 byte-aligned
data_off Data segment base address
Table 2
In Android source code, under the realization of Dalvik virtual machine is positioned at dalvik/ catalogue, wherein dalvik/vm be virtual machine realize part, will libdvm.so be compiled into; And dalvik/libdex will be compiled into libdex.a static library as dex instrument; Dalvik/dexdump is the decompiling instrument of .dex file; The executable program of virtual machine is arranged in dalvik/dalvikvm, will be compiled into dalvikvm executable file.
When Android platform runs APK file, first by Dalvik virtual machine (in Android source code, under the realization of Dalvik virtual machine is positioned at dalvik/ catalogue) load decompress(ion) APK file and verify integrality, extract Classes.dex file, then perform the bytecode in classes.dex file.When performing classes.dex file, first Dalvik virtual machine can check checksum field and the siganature field of its file header part, guarantee that classes.dex file does not have damaged or distorts, then just carry out addressing according to the offset address of other structures defined in file header and length information and resolve and perform.Last dalvik virtual machine can from classes.dex file reading command and data, and then run the programmed logic of this APK file.
Shown in composition graphs 2, a preferred embodiment of the present invention comprises following performing step:
Step S11, by a for APK file Central Plains to be reinforced Classes.dex file copy, delete the function source code of APK file in the Classes.dex file copying gained after, preserve and obtain a Classes.dex file.Therefore, only remain the top of file structure of former Classes.dex file in a Classes.dex file, do not comprise the function code of APK file.
Step S12, the former Classes.dex file encryption-decryption algorithm preset to be encrypted, to obtain the 2nd Classes.dex file.Therefore, the main function code of APK file is still among the 2nd Classes.dex file, and hiding, protection the 2nd Classes.dex file is the relation of reinforcing APK file, is also prevent APK file by reverse important step.
Step S13, generating Encrypt.so file for deciphering the 2nd Classes.dex file, superencipher being carried out to this Encrypt.so file, obtains Encrypt ' .so file.
Step S14, generate Entry.so file, this Entry.so file is the entry file when APK file is run, and is Encrypt.so file by the native method in the file Entry.so of call entry by Encrypt ' .so file decryption.
Step S15, the source program entrance of APK file Central Plains AndroidManifest.xml file to be reinforced to be pointed to, by sensing former Classes.dex file amendment be sensing the one Classes.dex file, amendment process after file be designated as AndroidManifest ' .xml file.
Step S16, the 2nd Classes.dex file and Encrypt ' .so file are left under file directory res, Entry.so file is left under file directory libs, the rear package file of packing encapsulation is carried out with a Classes.dex file, AndroidManifest ' .xml file, file directory res, file directory libs and resources.ars file, the signature instrument that re-using provides in Android SDK is signed to package file, namely completes the consolidation process of APK file.Specifically, the document directory structure contrast schematic diagram of the APK file of front and back is reinforced as shown in Figure 3.
When APK file after reinforcing is run, shown in composition graphs 4, load operating process comprises the steps:
Step S21, to point to according to the source program entrance in AndroidManifest ' .xml file, when APK file after reinforcing is run, first load a Classes.dex file by Dalvik virtual machine.
Step S22, call Entry.so file by a Classes.dex file, utilize Entry.so file to be decrypted process to Encrypt ' the .so file left under file directory res, obtain the Encrypt.so file after deciphering.
Step S23, Entry.so file is utilized to be decrypted the 2nd Classes.dex file left under file directory res according to the encryption-decryption algorithm preset, thus the former Classes.dex file before obtaining consolidation process in APK file.
Step S24, utilize the file header field information that structure comprises of a Classes.dex file, integrity checking is carried out, by entering step S26 after integrity checking to the former Classes.dex file that deciphering obtains.
Step S25, according to Android dynamic load technology (DexClassLoader program), dynamic load is carried out to former Classes.dex file by Dalvik virtual machine.Detailed process is, a newly-built DexClassLoader object with source program Classes.dex, is substituted into the attribute mClassLoader in the loading classes of system default by the mode of reflection.
Step S26, according to data_size field and data_off field information in former Classes.dex file file head construction, find the physical address of the source code depositing APK file function, by source code dynamic load to internal memory.Specifically, utilize self-defining onCreate method, by the meta-data attribute in application in AndroidManifest, find the physical address of source code, thus replace to the Application of source program; Existing " an Application file " is removed from system call set, and a newly-built Application object app, the attribute of former Classes.dex file is tied to app, then app is joined in system call set; Finally, due to assembly Provider before onCreate method just by system registry, therefore app is tied on the context of Provider in source program, then start up system level onCreate method.
Step S27, delete the former Classes.dex file after deciphering from the physical memory of system, prevent victim from stealing.
Above-mentioned reinforcement means is utilized to carry out the APK file of reinforcing, current most popular Android reverse instrument dex2jar and apktool is used to carry out reverse compiling respectively, due to not source code in a reverse compiling Classes.dex file out, and the source code realizing an APK file major function still leaves former Classes.dex file in, but under being left in the file directory of specifying after this former Classes.dex file is encrypted to the 2nd Classes.dex file, reverse instrument dex2jar and apktool is utilized to be difficult to the 2nd Classes.dex file after finding deciphering, even if find the 2nd Classes.dex file, cannot be decrypted due to Encrypt ' the .so file of deciphering the 2nd Classes.dex file cannot be found, thus can effectively prevent APK file from being divulged a secret by after reverse amendment.As can be seen here, after the reinforcement means consolidation process utilizing the application to mention, achieve the enciphering hiding of the source code of APK file, the decompiling of the reverse instrument of existing Android can be evaded, thus the security of APK file can be improved dramatically.
The present invention can be used in numerous general or special purpose computing system environment or configuration.Such as: personal computer, server, handheld device or portable set, laptop device, multicomputer system, system, the digital television receiving apparatus of Android system, programmable consumer-elcetronics devices, network PC, small-size computer, mainframe computer, the distributed computing environment comprising above any system or equipment etc. based on microprocessor.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (6)

1. a dynamic loading method for anti-reversing APK file, is characterized in that, comprises step:
Load a Classes.dex file, call Entry.so file, utilize Entry.so file to be decrypted process to Encrypt ' .so file, obtain the Encrypt.so file after deciphering;
Utilize Entry.so file to be decrypted the 2nd Classes.dex file, obtain the former Classes.dex file in the APK file before consolidation process;
Dynamic load is carried out to former Classes.dex file, and finds the physical address of the source code depositing APK file function, by source code dynamic load to internal memory;
The former Classes.dex file after deciphering is deleted from physical memory;
Wherein, only comprise in one Classes.dex file former Classes.dex file top of file structure, 2nd Classes.dex file and Encrypt ' .so file leave under file directory res, Entry.so file leaves under file directory libs, forms described anti-reversing APK file by after a Classes.dex file, AndroidManifest ' .xml file, file directory res, file directory libs and resources.ars Document encapsulation.
2. the dynamic loading method of a kind of anti-reversing APK file according to claim 1, is characterized in that, also comprise the step of former Classes.dex file being carried out to integrity checking before being decrypted to the 2nd Classes.dex file.
3. the dynamic loading method of a kind of anti-reversing APK file according to claim 2, is characterized in that, utilize the file header field information that structure comprises of a Classes.dex file, carries out integrity checking to the former Classes.dex file that deciphering obtains.
4. the dynamic loading method of a kind of anti-reversing APK file according to claim 1, it is characterized in that, carried out to former Classes.dex file: a newly-built DexClassLoader object with source program Classes.dex specifically comprising of dynamic load, be substituted into the attribute mClassLoader in the loading classes of system default by the mode of reflection.
5. the dynamic loading method of a kind of anti-reversing APK file according to claim 1, it is characterized in that, according to data_size field and data_off field information in former Classes.dex file file head construction, and find the physical address of the source code depositing APK file function.
6. the dynamic loading method of a kind of anti-reversing APK file according to claim 1, is characterized in that, the step of source code dynamic load to internal memory specifically comprised:
Utilize self-defining onCreate method, by the meta-data attribute in application in AndroidManifest, find the physical address of source code, thus replace to the Application of source program;
Existing in internal memory " an Application file " to be removed from calling set, and a newly-built Application object app, the attribute of former Classes.dex file is tied to app, then app is joined internal memory call in set;
Due to assembly Provider before onCreate method just by system registry, therefore app is tied on the context of Provider in source program, then start up system level onCreate method.
CN201410663307.XA 2014-11-18 2014-11-18 Dynamic loading method capable of guarding against reverse APK file Pending CN104318155A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410663307.XA CN104318155A (en) 2014-11-18 2014-11-18 Dynamic loading method capable of guarding against reverse APK file
PCT/CN2014/092643 WO2016078130A1 (en) 2014-11-18 2014-12-01 Dynamic loading method for preventing reverse of apk file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410663307.XA CN104318155A (en) 2014-11-18 2014-11-18 Dynamic loading method capable of guarding against reverse APK file

Publications (1)

Publication Number Publication Date
CN104318155A true CN104318155A (en) 2015-01-28

Family

ID=52373386

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410663307.XA Pending CN104318155A (en) 2014-11-18 2014-11-18 Dynamic loading method capable of guarding against reverse APK file

Country Status (2)

Country Link
CN (1) CN104318155A (en)
WO (1) WO2016078130A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740708A (en) * 2016-01-28 2016-07-06 博雅网信(北京)科技有限公司 Java reflection mechanism-based automatic Android application shelling method
CN106528255A (en) * 2016-12-19 2017-03-22 北京小米移动软件有限公司 Class loading method and device
CN106845166A (en) * 2016-12-12 2017-06-13 北京奇虎科技有限公司 The storage method and device of a kind of dex files
CN106843919A (en) * 2016-12-12 2017-06-13 北京奇虎科技有限公司 The storage method and device of a kind of dex files
CN106897587A (en) * 2017-02-27 2017-06-27 百度在线网络技术(北京)有限公司 The method and apparatus of reinforcement application, loading reinforcement application
CN107169324A (en) * 2017-05-12 2017-09-15 北京理工大学 A kind of Android application reinforcement means based on dynamic encryption and decryption
CN109033765A (en) * 2018-08-07 2018-12-18 麒麟合盛网络技术股份有限公司 The treating method and apparatus of application installation package
CN110610097A (en) * 2019-09-09 2019-12-24 杭州天宽科技有限公司 File transmission security system based on android application
CN113094665A (en) * 2021-04-09 2021-07-09 每日互动股份有限公司 System for preventing java program from being decompiled

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107122634B (en) * 2017-04-26 2020-03-17 北京梆梆安全科技有限公司 Reinforcement protection method and device for software installation package
CN107122632A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The encryption method and device of software installation bag
CN107122635A (en) * 2017-04-27 2017-09-01 北京洋浦伟业科技发展有限公司 A kind of reinforcement means of the reinforcement means of SO files, device and APK
CN109933325A (en) * 2017-12-15 2019-06-25 阿里巴巴集团控股有限公司 A kind of dex file construction method, apparatus and system
CN111488557B (en) * 2019-01-28 2024-01-12 中国移动通信有限公司研究院 Encryption and decryption method and device, electronic equipment and readable storage medium
CN112083970A (en) * 2020-09-10 2020-12-15 南京烽火星空通信发展有限公司 Mobile terminal digital evidence obtaining method and equipment based on dynamic loading technology
CN112667975B (en) * 2020-12-29 2024-04-26 西北工业大学 Application software safety protection method based on hybrid reinforcement Android system
CN112765608B (en) * 2021-01-20 2023-05-12 每日互动股份有限公司 Target apk source code acquisition method, electronic equipment and medium
CN113641426A (en) * 2021-08-31 2021-11-12 福建省天奕网络科技有限公司 Shelling search and implementation method and system based on source code modification of android terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102087605B (en) * 2011-01-28 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Android-based platform application installation control method and system
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN102760219B (en) * 2011-12-20 2015-12-16 北京安天电子设备有限公司 A kind of Android platform software protection system, method and apparatus
KR101383010B1 (en) * 2012-09-04 2014-04-07 주식회사 인프라웨어테크놀러지 Method of obtaining signature of apk files for android operating system, and computer-readable recording medium for the same
CN103761457A (en) * 2013-12-27 2014-04-30 华为技术有限公司 Software protecting method, device and system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740708A (en) * 2016-01-28 2016-07-06 博雅网信(北京)科技有限公司 Java reflection mechanism-based automatic Android application shelling method
CN106845166A (en) * 2016-12-12 2017-06-13 北京奇虎科技有限公司 The storage method and device of a kind of dex files
CN106843919A (en) * 2016-12-12 2017-06-13 北京奇虎科技有限公司 The storage method and device of a kind of dex files
CN106843919B (en) * 2016-12-12 2021-02-23 北京奇虎科技有限公司 Method and device for storing dex file
CN106528255A (en) * 2016-12-19 2017-03-22 北京小米移动软件有限公司 Class loading method and device
CN106528255B (en) * 2016-12-19 2019-07-12 北京小米移动软件有限公司 Kind loading method and device
CN106897587A (en) * 2017-02-27 2017-06-27 百度在线网络技术(北京)有限公司 The method and apparatus of reinforcement application, loading reinforcement application
CN107169324A (en) * 2017-05-12 2017-09-15 北京理工大学 A kind of Android application reinforcement means based on dynamic encryption and decryption
CN109033765A (en) * 2018-08-07 2018-12-18 麒麟合盛网络技术股份有限公司 The treating method and apparatus of application installation package
CN110610097A (en) * 2019-09-09 2019-12-24 杭州天宽科技有限公司 File transmission security system based on android application
CN113094665A (en) * 2021-04-09 2021-07-09 每日互动股份有限公司 System for preventing java program from being decompiled

Also Published As

Publication number Publication date
WO2016078130A1 (en) 2016-05-26

Similar Documents

Publication Publication Date Title
CN104318155A (en) Dynamic loading method capable of guarding against reverse APK file
CN104408337A (en) Reinforcement method for preventing reverse of APK (Android package) file
US10853270B2 (en) Cryptographic pointer address encoding
KR101471589B1 (en) Method for Providing Security for Common Intermediate Language Program
CN104317625A (en) Dynamic loading method for APK files
CN106203006A (en) Android application reinforcement means based on dex Yu so file Dynamic Execution
KR101695639B1 (en) Method and system for providing application security service based on cloud
CN104239757A (en) Application program reversing-preventing method and device and operation method and terminal
CN103902858A (en) APK application reinforcing method and system
CN104866739A (en) Application program encryption method and application program encryption system in Android system
CN107609394A (en) Tamper resistant method, storage device and the device of Android installation kits
US10867017B2 (en) Apparatus and method of providing security and apparatus and method of executing security for common intermediate language
Kim et al. Android Application Protection against Static Reverse Engineering based on Multidexing.
US9292708B2 (en) Protection of interpreted source code in virtual appliances
CN104462883A (en) APK file strengthening method
KR20160117183A (en) Method of encrypting dll file, system of encrypting dll file performing the same, and storage medium storing the same
WO2015058639A1 (en) Application program protecting system and method
KR101667774B1 (en) Apparatus and Method of Providing Security for Script Program
KR101749209B1 (en) Method and apparatus for hiding information of application, and method and apparatus for executing application
KR101863325B1 (en) Method and apparatus for preventing reverse engineering
CN116235174A (en) Apparatus and method for performing encryption algorithm
KR102039380B1 (en) Apparatus and Method of Providing Security, and Apparatus and Method of Executing Security for Protecting Code of Shared Object
JP6215468B2 (en) Program protector
CN111338664A (en) Image file packaging method and image file packaging system
CN104021321A (en) Reinforcing protection method and device for software installation package

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150128

WD01 Invention patent application deemed withdrawn after publication