CN105426708B - A kind of reinforcement means of the application program of android system - Google Patents

A kind of reinforcement means of the application program of android system Download PDF

Info

Publication number
CN105426708B
CN105426708B CN201610034627.8A CN201610034627A CN105426708B CN 105426708 B CN105426708 B CN 105426708B CN 201610034627 A CN201610034627 A CN 201610034627A CN 105426708 B CN105426708 B CN 105426708B
Authority
CN
China
Prior art keywords
files
key
dex
encrypted
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610034627.8A
Other languages
Chinese (zh)
Other versions
CN105426708A (en
Inventor
文伟平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Devsource Technology Co Ltd
Original Assignee
Beijing Devsource Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Devsource Technology Co Ltd filed Critical Beijing Devsource Technology Co Ltd
Priority to CN201610034627.8A priority Critical patent/CN105426708B/en
Publication of CN105426708A publication Critical patent/CN105426708A/en
Application granted granted Critical
Publication of CN105426708B publication Critical patent/CN105426708B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

Abstract

The invention discloses a kind of reinforcement means of the application program of android system, are reinforced to the key code in Android application programs by binary stream encryption, protect application code;Including:Parse classes.dex files;Navigate to key method;First time encryption is carried out, intermediate data is obtained;Second is carried out to intermediate data to encrypt;The hash value for calculating new dex files is stored in after encryption in so files;The value of new dex files checksum and signature is calculated, updates dex files;Apk is regenerated, that is, completes ciphering process.When decryption, the hash value of dex files is calculated, the hash value being encrypted is compared with the value in so files;Secondary decryption oprerations are carried out, key code is obtained.The present invention may make can not check Android source codes by decompiling instrument, and only protects the integrality of code to key code encipherment protection, be effective against static analysis, and Android program code is prevented to be tampered, and ensure program operational efficiency.

Description

A kind of reinforcement means of the application program of android system
Technical field
The present invention relates to field of information security technology more particularly to a kind of reinforcing sides of the application program of android system Method.
Background technology
Android (Android) operating system by Google companies and OHA member's joint development open source operating system, mainly Applied to mobile device, such as smart mobile phone, tablet computer.Since 2007 release, Android operation system is based on it The features such as linux kernel, open source code, obtains rapidly the support of numerous developers and many manufacturers.At the same time, it is based on The number of applications of Android platform is skyrocketed through.In July, 2013, Google companies announce answering for the shops Google Play 1,000,000 are alreadyd exceed with program quantity, becomes the maximum application shop in the whole world.
Currently, Android program is all write using only Android SDK mostly, but what traditional Java language was write Program is easy to inversely be cracked.The main problem that android system is faced in secure context is pirate application and malice Software.The interests and enthusiasm prevailing for greatly compromising numerous developers of piracy application, and the implantation of malicious code makes Android user faces the risk of privacy compromise and property loss.In Android industrial chains, pirate tissue abnormalities are active.He Tightly follow Android application, which application fire, just " mountain vallage " what application." being packaged party " less serious case plants in mountain vallage application Enter malice ad plug-in, is made profit by advertisement pop-up;Severe one is by Android wooden horses, back door implantation therein, to customer mobile terminal Carry out remote control.
The Software Protection Technique of windows platform has been formed due to widely using and Security Officer studies for many years The protection system of complete set.But due to the difference of Android platform and windows platform bottom layer realization, cause A series of theories and mechanism for software protection of windows platform cannot effectively be transplanted to Android platform.Meanwhile by Being born in Android platform, the time is shorter, and the research in terms of software protection is still in the starting stage, is broken for more and more ripe Solution technology can not provide relatively effective protection, and the intellectual property of software developer is commonplace by the event invaded.
Some existing Android application program reinforcement means, the method for mostly using static treatment greatly, i.e., to dex files Some modifications are carried out to increase the difficulty of attack.This reinforcement means only increases code reading difficulty, but its protection effect Limited, attacker can still obtain the code of program, can not ensure the safety of application program.
Invention content
In order to overcome the above-mentioned deficiencies of the prior art, the present invention provides a kind of reinforcing of the application program of android system Method, this method is reinforced based on android system using binary stream encryption method, in Android application programs Key code is encrypted, to achieve the purpose that protect Android application programs.
Technical solution provided by the invention is:
A kind of reinforcement means of the application program of android system applies Android by binary stream encryption method Key code in program is reinforced so that Android application codes are protected;The reinforcement means includes encryption Process and decrypting process, specifically comprise the following steps:
A. being directed to needs Android application programs to be protected, and key code is encrypted, and executes following operation:
A1. it is obtained in Android application programs to needing Android application programs to be protected to decompress first Classes.dex files parse the dex files;
A2. setting needs the key method of encrypted certain kinds, navigates to the key method for needing encrypted certain kinds;
A3. key key1 is set, first time encryption is carried out to the instruction of key method described in step A2 using key key1, Obtain encrypted intermediate data for the first time;
A4. key key2 is set, carrying out second to intermediate data described in step A3 using key key2 encrypts;
A5. it will be obtained in data update to dex files after secondary encryption, obtain new dex files;
A6. the hash value of new dex files described in step A5 is calculated, which is used to verify the integrality of dex;To hash value It is deposited into after being encrypted in so files;
A7. it for dex files new described in step A5, recalculates to obtain the value of checksum and signature, update Dex files;
A8. compression regenerates apk, that is, completes ciphering process;It is encrypted comprising key code in the apk regenerated Dex files and include decryption and dex check informations so files;
When B. starting to execute Android application programs, encrypted Android application programs are decrypted to obtain crucial generation Code executes following operation:
After B1.Android application programs are loaded into memory, the program in so files is executed;
B2. dex files are found in memory;
B3. for obtained dex files, the hash value of dex files is calculated, then Hash is encrypted, is encrypted Hash value afterwards;
B4. the value preserved in so files described in encrypted hash value described in step B3 and step A6 is compared;Such as Fruit is consistent, thens follow the steps B5, otherwise returns to error code, program stopped operation;
When B5. executing key code, key key2 is obtained from so files, key code is decrypted, centre is obtained Code;
B6. it is directed to the intermediate code that step B5 is obtained, key key1 is obtained from so files, second is carried out and decrypts, obtain To final key code;
B7. the method call of key code is carried out.
The reinforcement means of the application program of above-mentioned android system, further, setting described in step A2 need encrypted The key method of certain kinds, specifically include important algorithm method, verification login method, one in system core flow and method or It is multiple.
The reinforcement means of the application program of above-mentioned android system is further encrypted or is walked for the first time described in step A3 AES encryption method can be used in second of encryption described in rapid A4, and the AES encryption method includes being added using the AES voluntarily write Close program or the Encryption Tool for using AES.
The reinforcement means of the application program of above-mentioned android system is further encrypted as md5 encryption described in step A6 Method.
The reinforcement means of the application program of above-mentioned android system further executes described in step B1 in so files Program calls the method in so files specifically by JNI call-by mechanisms.
Compared with prior art, the beneficial effects of the invention are as follows:
Existing Android application programs reinforcement means, the method for mostly using static treatment greatly carry out one to dex files It is a little to change to increase the difficulty of attack.This reinforcement means only increases code reading difficulty, but its protection effect is limited, attacks The person of hitting can still obtain the code of program.It, can dynamically decryption program using technical solution provided by the invention.The present invention The reinforcement means of offer carries out double layer encryption protection to Key Functions, and increases the safety check of dex, and attacker is allowed not get Code, and the program changed can not also be run, and be may be implemented to protect the integrality of code, be reasonably resistant to static state Analysis, prevents the code of Android application programs to be tampered, and makes hacker from being checked by tools such as decompilings Android source codes, and protection only is encrypted to key code, it ensure that the operational efficiency of program.
Description of the drawings
Fig. 1 is the flow diagram of the method provided by the present invention.
Fig. 2 is the file composite structural diagram of the dex files in Android application programs.
Specific implementation mode
Below in conjunction with the accompanying drawings, the present invention, the model of but do not limit the invention in any way are further described by embodiment It encloses.
The present invention provides a kind of reinforcement means based on android system binary stream encryption technology, and Fig. 1 is that the present invention carries For the flow diagram of method, include the following steps:
A. key code is encrypted, executes following operation:
A1. classes.dex files are parsed;
A2. specific class and method are navigated to;
A3. key key1 is used to carry out first time encryption;
A4. it uses key key2 to carry out second to encrypt;
A5. dex files are updated;
A6. it calculates the hash value of classes.dex files and hash value is encrypted, be stored in so files;
B. encrypted code is decrypted, executes following operation:
B1. the initial address of dex is found;
B2. hash value operation is carried out to dex files, by obtained result be encrypted and so files in the value that preserves into Row compares;
B3. key key1 is used to carry out first time decryption;
B4. it uses key key2 to carry out second to decrypt;
B5 carries out the method call of key code.
Reinforcement means provided by the invention based on android system binary stream encryption technology includes ciphering process reconciliation Close process;Illustrate the specific implementation of the method for the present invention by the following examples:
Ciphering process:
For needing Android application programs (apk) to be protected, first decompression to obtain the classes.dex texts in apk Then part parses dex files;
Developer, which sets, needs the key method of encrypted certain kinds (to need encrypted certain kinds key method according to exploitation The demand of person carries out judgement setting, for example, certain important algorithm methods, either verify login method or some system is closed Key flow), then navigate to the key method for needing encrypted certain kinds;
Setting key key1 by reinforcing person, (reinforcing person's need for confidentiality needs when decryption with this key pair ciphertext It is decrypted), it first uses key key1 to carry out first time encryption to the instruction of key method and (uses AES encryption, can be used voluntarily The AES encryption program write can also use the Encryption Tool of AES), obtain encrypted intermediate data for the first time;
Then key key2 is set, second of encryption (also using AES encryption) is carried out to intermediate data using key key2; AES encryption twice in succession can increase safety;
Update dex files:It will be obtained in data update to dex files after secondary encryption, obtain new dex files;
The hash value of new dex files is calculated, which is used to verify the integrality of dex;(MD5 is encrypted to hash value Encryption) after be deposited into so files;The verification to dex files and deciphering parameter are added in so files;
For modified dex files, recalculates to obtain the value of checksum and signature, update dex files;
Compression regenerates apk, that is, completes ciphering process.
In the apk regenerated, including the dex files of Partial key code encryption, so files (are that reinforcing person provides One section of program c program, acquiescence is safe), the checking procedure of decrypting process and dex is included in so files.
Decrypting process:
Start to execute program (the apk programs of AES encryption), the program in so files is first carried out:
Specifically, after AES encryption program is loaded into memory, JNI (Java are first passed through when program starts execution Native Interface) call-by mechanism, it executes verification and decryption in so files and restores code, particular by Java Method in code call so files (libraries so), first search program memory, find need to restore after encryption it is corresponding Class and method.When searching can some prefabricated labels in a program, to help to find the part for needing to decrypt;
Then, dex files are found in memory:Fig. 2 is the composite structural diagram of dex files, and dex files include mainly dex File header, character string identification symbol list, type identification item, function prototype mark table, zone identifier list, function identification table, Class identifies table, data field (data that i.e. each table is listed above are stored in data field), static linkage data segment (can be sky), seeks The method is looked for be specifically:
Find dex files from odex files, the starting magic fields of dex files for indicating dex versions, at present it Value be fixed as " 6465780a 30333500 ", be converted to character string " dex.035 ", therefore forward lookup memory can be passed through Page, the magic fields until finding dex files, the referred to herein as initial address of dex files;It, can be with after finding dex files Dex file structures according to fig. 2, parsing dex file headers (dex header).Dex file headers have recorded other portions of dex files Divide the offset in dex files, so as to navigate to the region where dex other parts, for further parsing.
Dex top of files (Dex file headers) mainly include verification and and other structures offset address and length information, Specifically it is shown in Table 1:
The information and corresponding meaning of 1 Dex file headers of table record
For obtained dex file, the hash value of dex files is calculated, ((md5 encryption)) then is encrypted to Hash, It is compared with the value preserved in so files, if unanimously, read-me is not changed, otherwise returns to error code, program is stopped Only run.
When executing key code, key key2 is obtained from so files, key code is decrypted, intermediate generation is obtained Code.For obtained intermediate code, key key1 is obtained from so files, is carried out second of decryption and is obtained final crucial generation Code;Decrypting process corresponds to ciphering process twice respectively twice, to ensure the safety of application program.
Finally, the correct method for safely calling key code is realized.
It should be noted that the purpose for publicizing and implementing example is to help to further understand the present invention, but the skill of this field Art personnel are appreciated that:It is not departing from the present invention and spirit and scope of the appended claims, various substitutions and modifications are all It is possible.Therefore, the present invention should not be limited to embodiment disclosure of that, and the scope of protection of present invention is with claim Subject to the range that book defines.

Claims (4)

1. a kind of reinforcement means of the application program of android system, by binary stream encryption method to Android application journeys Key code in sequence is reinforced so that Android application codes are protected;The reinforcement means includes encrypted Journey and decrypting process, specifically comprise the following steps:
A. being directed to needs Android application programs to be protected, and key code is encrypted, and executes following operation:
A1. the classes.dex in Android application programs is obtained to needing Android application programs to be protected to decompress first File parses the classes.dex files;
A2. setting needs the key method of encrypted certain kinds, navigates to the key method for needing encrypted certain kinds;It is described to set Surely the key method for needing encrypted certain kinds specifically includes important algorithm method, verification login method, system core flow side One or more of method;
A3. key key1 is set, first time encryption is carried out to the instruction of key method described in step A2 using key key1, is obtained Encrypted intermediate data for the first time;
A4. key key2 is set, carrying out second to intermediate data described in step A3 using key key2 encrypts;
A5. it will be obtained in data update to dex files after secondary encryption, obtain new dex files;
A6. the hash value of new dex files described in step A5 is calculated, which is used to verify the integrality of dex;To hash value It is deposited into after being encrypted in so files;
A7. it for dex files new described in step A5, recalculates to obtain the value of checksum and signature, updates dex File;
A8. compression regenerates apk, that is, completes ciphering process;It is encrypted comprising key code in the apk regenerated Dex files and include decryption and dex check informations so files;
When B. starting to execute Android application programs, encrypted Android application programs are decrypted to obtain key code, Execute following operation:
After B1.Android application programs are loaded into memory, the program in so files is executed;
B2. dex files are found in memory;
B3. for obtained dex files, the hash value of dex files is calculated, then Hash is encrypted, is obtained encrypted Hash value;
B4. the value preserved in so files described in encrypted hash value described in step B3 and step A6 is compared;If one It causes, thens follow the steps B5, otherwise return to error code, program stopped operation;
When B5. executing key code, key key2 is obtained from so files, key code is decrypted, intermediate code is obtained;
B6. it is directed to the intermediate code that step B5 is obtained, key key1 is obtained from so files, second is carried out and decrypts, obtain most Whole key code;
B7. the method call of key code is carried out.
2. the reinforcement means of the application program of android system as described in claim 1, characterized in that first described in step A3 Second encryption described in secondary encryption or step A4 can be used AES encryption method, and the AES encryption method includes using voluntarily compiling The AES encryption program write or the Encryption Tool using AES.
3. the reinforcement means of the application program of android system as described in claim 1, characterized in that encrypted described in step A6 For md5 encryption method.
4. the reinforcement means of the application program of android system as described in claim 1, characterized in that executed described in step B1 Program in so files calls the method in so files specifically by JNI call-by mechanisms.
CN201610034627.8A 2016-01-19 2016-01-19 A kind of reinforcement means of the application program of android system Expired - Fee Related CN105426708B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610034627.8A CN105426708B (en) 2016-01-19 2016-01-19 A kind of reinforcement means of the application program of android system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610034627.8A CN105426708B (en) 2016-01-19 2016-01-19 A kind of reinforcement means of the application program of android system

Publications (2)

Publication Number Publication Date
CN105426708A CN105426708A (en) 2016-03-23
CN105426708B true CN105426708B (en) 2018-08-21

Family

ID=55504916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610034627.8A Expired - Fee Related CN105426708B (en) 2016-01-19 2016-01-19 A kind of reinforcement means of the application program of android system

Country Status (1)

Country Link
CN (1) CN105426708B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110147655A (en) * 2019-03-28 2019-08-20 江苏通付盾信息安全技术有限公司 The security protection system and method for application program

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106326694A (en) * 2016-08-30 2017-01-11 北京鼎源科技有限公司 Android application reinforcing method baed on C source code mixing
CN106355081A (en) * 2016-09-07 2017-01-25 深圳市新国都支付技术有限公司 Android program start verification method and device
CN106650327A (en) * 2016-11-24 2017-05-10 湖南鼎源蓝剑信息科技有限公司 so file dynamic recovery-based Android application reinforcement method
CN106709286A (en) * 2016-11-30 2017-05-24 江苏神州信源系统工程有限公司 Method for performing security reinforcement on apk resource package
CN108460276B (en) * 2016-12-09 2022-01-25 北京奇虎科技有限公司 Processing method and device for SO file of dynamic link library of android installation package
CN106529222A (en) * 2016-12-09 2017-03-22 北京智游网安科技有限公司 Protection method and protection system for preventing secondary packaging and cracking of application program
CN106843853B (en) * 2016-12-28 2020-09-08 北京五八信息技术有限公司 Method and device for protecting user information
CN106934260B (en) * 2017-03-14 2020-03-17 北京深思数盾科技股份有限公司 Code protection method, device, server and storage medium
CN107122634B (en) * 2017-04-26 2020-03-17 北京梆梆安全科技有限公司 Reinforcement protection method and device for software installation package
CN107122632A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The encryption method and device of software installation bag
CN107122635A (en) * 2017-04-27 2017-09-01 北京洋浦伟业科技发展有限公司 A kind of reinforcement means of the reinforcement means of SO files, device and APK
CN107169324A (en) * 2017-05-12 2017-09-15 北京理工大学 A kind of Android application reinforcement means based on dynamic encryption and decryption
CN107977553B (en) * 2017-12-25 2020-07-10 中国电子产品可靠性与环境试验研究所 Method and device for security reinforcement of mobile application program
CN108377185B (en) * 2018-03-14 2021-01-26 四川长虹电器股份有限公司 Internet of things weak resource terminal key safety management method
CN108932436B (en) * 2018-07-06 2020-07-28 四川长虹电器股份有限公司 Android system-based software security reinforcement method for APP specification
CN109005184A (en) * 2018-08-17 2018-12-14 上海小蚁科技有限公司 File encrypting method and device, storage medium, terminal
CN109005196A (en) * 2018-09-10 2018-12-14 北京旷视科技有限公司 Data transmission method, data decryption method, device and electronic equipment
CN109344574B (en) * 2018-09-19 2020-09-22 四川长虹电器股份有限公司 Self-adaptive android reinforcement method based on specification
US10929153B2 (en) 2018-10-26 2021-02-23 International Business Machines Corporation Bidirectional protection of application package
CN109981283B (en) * 2019-02-28 2022-05-20 西安理工大学 Android platform message driven core code integrity detection system and method
CN110046504B (en) * 2019-04-22 2021-04-06 北京智游网安科技有限公司 SO file hiding method, storage medium and device based on Linker
CN110502874B (en) * 2019-07-19 2021-05-25 西安理工大学 Android App reinforcement method based on file self-modification
CN110609789A (en) * 2019-08-29 2019-12-24 烽火通信科技股份有限公司 Method and system for software License verification
CN110610097A (en) * 2019-09-09 2019-12-24 杭州天宽科技有限公司 File transmission security system based on android application
CN110598402A (en) * 2019-09-09 2019-12-20 杭州天宽科技有限公司 Operation security system based on android application
CN111259370A (en) * 2020-01-13 2020-06-09 苏州浪潮智能科技有限公司 FPGA program security verification method, system, terminal and storage medium
CN112052461A (en) * 2020-08-05 2020-12-08 北京智游网安科技有限公司 Code processing method based on instruction injection, terminal and storage medium
CN112084469A (en) * 2020-08-06 2020-12-15 华帝股份有限公司 Encryption method for preventing application program from being reverse engineered
CN112613037A (en) * 2020-12-29 2021-04-06 北京永新视博数字电视技术有限公司 Code checking method and device
CN113094666B (en) * 2021-04-09 2022-06-24 每日互动股份有限公司 System for preventing java program from being decompiled
CN113419734B (en) * 2021-06-17 2022-10-04 网易(杭州)网络有限公司 Application program reinforcing method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117851A (en) * 2011-11-17 2013-05-22 银视通信息科技有限公司 Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI)
CN104317625A (en) * 2014-11-09 2015-01-28 刘鹏 Dynamic loading method for APK files
CN104462883A (en) * 2014-11-09 2015-03-25 刘鹏 APK file strengthening method
CN104866739A (en) * 2015-06-04 2015-08-26 上海斐讯数据通信技术有限公司 Application program encryption method and application program encryption system in Android system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101521765B1 (en) * 2015-01-08 2015-05-20 숭실대학교산학협력단 Apparatus For Code Obfuscation Using Indistinguishable Identifier Conversion and Method Thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117851A (en) * 2011-11-17 2013-05-22 银视通信息科技有限公司 Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI)
CN104317625A (en) * 2014-11-09 2015-01-28 刘鹏 Dynamic loading method for APK files
CN104462883A (en) * 2014-11-09 2015-03-25 刘鹏 APK file strengthening method
CN104866739A (en) * 2015-06-04 2015-08-26 上海斐讯数据通信技术有限公司 Application program encryption method and application program encryption system in Android system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110147655A (en) * 2019-03-28 2019-08-20 江苏通付盾信息安全技术有限公司 The security protection system and method for application program

Also Published As

Publication number Publication date
CN105426708A (en) 2016-03-23

Similar Documents

Publication Publication Date Title
CN105426708B (en) A kind of reinforcement means of the application program of android system
US9602289B2 (en) Steganographic embedding of executable code
CN110110548B (en) Method for storing files in trusted execution environment in encrypted manner based on encryption chip
US10284372B2 (en) Method and system for secure management of computer applications
US9892661B2 (en) Steganographic embedding of hidden payload
Kovacheva Efficient code obfuscation for Android
CN106650327A (en) so file dynamic recovery-based Android application reinforcement method
JP4702957B2 (en) Tamper resistant virtual machine
US20080263366A1 (en) Self-verifying software to prevent reverse engineering and piracy
US20160203087A1 (en) Method for providing security for common intermediate language-based program
CN102236757A (en) Software protection method and system applicable to Android system
CN109992987B (en) Script file protection method and device based on Nginx and terminal equipment
Piao et al. Server‐based code obfuscation scheme for APK tamper detection
CN103457733A (en) Data sharing method and system under cloud computing environment
WO2003090021A2 (en) Security framework for protecting rights in computer software
CN103530535A (en) Shell adding and removing method for Android platform application program protection
KR101436536B1 (en) File server, file transfer method thereof and file tamperproof system
CN107273723B (en) So file shell adding-based Android platform application software protection method
CN111191195A (en) Method and device for protecting APK
US8694548B2 (en) Defense-in-depth security for bytecode executables
Yuste et al. Avaddon ransomware: An in-depth analysis and decryption of infected systems
CN108133147A (en) Guard method, equipment and the readable storage medium storing program for executing of executable code
CN105184119B (en) A kind of method for security protection of software
Chen et al. Semantic-integrated software watermarking with tamper-proofing
WO2016188134A1 (en) Application reinforcing implementation method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180821

Termination date: 20200119

CF01 Termination of patent right due to non-payment of annual fee