CN105426708B - A kind of reinforcement means of the application program of android system - Google Patents
A kind of reinforcement means of the application program of android system Download PDFInfo
- Publication number
- CN105426708B CN105426708B CN201610034627.8A CN201610034627A CN105426708B CN 105426708 B CN105426708 B CN 105426708B CN 201610034627 A CN201610034627 A CN 201610034627A CN 105426708 B CN105426708 B CN 105426708B
- Authority
- CN
- China
- Prior art keywords
- files
- key
- dex
- encrypted
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 230000002787 reinforcement Effects 0.000 title claims abstract description 21
- 238000000034 method Methods 0.000 claims abstract description 64
- 230000008569 process Effects 0.000 claims abstract description 14
- 238000012795 verification Methods 0.000 claims description 5
- 230000007246 mechanism Effects 0.000 claims description 4
- 230000006835 compression Effects 0.000 claims description 3
- 238000007906 compression Methods 0.000 claims description 3
- 230000003068 static effect Effects 0.000 abstract description 5
- 230000003014 reinforcing effect Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 239000002131 composite material Substances 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000002513 implantation Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000006837 decompression Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
Abstract
The invention discloses a kind of reinforcement means of the application program of android system, are reinforced to the key code in Android application programs by binary stream encryption, protect application code;Including:Parse classes.dex files;Navigate to key method;First time encryption is carried out, intermediate data is obtained;Second is carried out to intermediate data to encrypt;The hash value for calculating new dex files is stored in after encryption in so files;The value of new dex files checksum and signature is calculated, updates dex files;Apk is regenerated, that is, completes ciphering process.When decryption, the hash value of dex files is calculated, the hash value being encrypted is compared with the value in so files;Secondary decryption oprerations are carried out, key code is obtained.The present invention may make can not check Android source codes by decompiling instrument, and only protects the integrality of code to key code encipherment protection, be effective against static analysis, and Android program code is prevented to be tampered, and ensure program operational efficiency.
Description
Technical field
The present invention relates to field of information security technology more particularly to a kind of reinforcing sides of the application program of android system
Method.
Background technology
Android (Android) operating system by Google companies and OHA member's joint development open source operating system, mainly
Applied to mobile device, such as smart mobile phone, tablet computer.Since 2007 release, Android operation system is based on it
The features such as linux kernel, open source code, obtains rapidly the support of numerous developers and many manufacturers.At the same time, it is based on
The number of applications of Android platform is skyrocketed through.In July, 2013, Google companies announce answering for the shops Google Play
1,000,000 are alreadyd exceed with program quantity, becomes the maximum application shop in the whole world.
Currently, Android program is all write using only Android SDK mostly, but what traditional Java language was write
Program is easy to inversely be cracked.The main problem that android system is faced in secure context is pirate application and malice
Software.The interests and enthusiasm prevailing for greatly compromising numerous developers of piracy application, and the implantation of malicious code makes
Android user faces the risk of privacy compromise and property loss.In Android industrial chains, pirate tissue abnormalities are active.He
Tightly follow Android application, which application fire, just " mountain vallage " what application." being packaged party " less serious case plants in mountain vallage application
Enter malice ad plug-in, is made profit by advertisement pop-up;Severe one is by Android wooden horses, back door implantation therein, to customer mobile terminal
Carry out remote control.
The Software Protection Technique of windows platform has been formed due to widely using and Security Officer studies for many years
The protection system of complete set.But due to the difference of Android platform and windows platform bottom layer realization, cause
A series of theories and mechanism for software protection of windows platform cannot effectively be transplanted to Android platform.Meanwhile by
Being born in Android platform, the time is shorter, and the research in terms of software protection is still in the starting stage, is broken for more and more ripe
Solution technology can not provide relatively effective protection, and the intellectual property of software developer is commonplace by the event invaded.
Some existing Android application program reinforcement means, the method for mostly using static treatment greatly, i.e., to dex files
Some modifications are carried out to increase the difficulty of attack.This reinforcement means only increases code reading difficulty, but its protection effect
Limited, attacker can still obtain the code of program, can not ensure the safety of application program.
Invention content
In order to overcome the above-mentioned deficiencies of the prior art, the present invention provides a kind of reinforcing of the application program of android system
Method, this method is reinforced based on android system using binary stream encryption method, in Android application programs
Key code is encrypted, to achieve the purpose that protect Android application programs.
Technical solution provided by the invention is:
A kind of reinforcement means of the application program of android system applies Android by binary stream encryption method
Key code in program is reinforced so that Android application codes are protected;The reinforcement means includes encryption
Process and decrypting process, specifically comprise the following steps:
A. being directed to needs Android application programs to be protected, and key code is encrypted, and executes following operation:
A1. it is obtained in Android application programs to needing Android application programs to be protected to decompress first
Classes.dex files parse the dex files;
A2. setting needs the key method of encrypted certain kinds, navigates to the key method for needing encrypted certain kinds;
A3. key key1 is set, first time encryption is carried out to the instruction of key method described in step A2 using key key1,
Obtain encrypted intermediate data for the first time;
A4. key key2 is set, carrying out second to intermediate data described in step A3 using key key2 encrypts;
A5. it will be obtained in data update to dex files after secondary encryption, obtain new dex files;
A6. the hash value of new dex files described in step A5 is calculated, which is used to verify the integrality of dex;To hash value
It is deposited into after being encrypted in so files;
A7. it for dex files new described in step A5, recalculates to obtain the value of checksum and signature, update
Dex files;
A8. compression regenerates apk, that is, completes ciphering process;It is encrypted comprising key code in the apk regenerated
Dex files and include decryption and dex check informations so files;
When B. starting to execute Android application programs, encrypted Android application programs are decrypted to obtain crucial generation
Code executes following operation:
After B1.Android application programs are loaded into memory, the program in so files is executed;
B2. dex files are found in memory;
B3. for obtained dex files, the hash value of dex files is calculated, then Hash is encrypted, is encrypted
Hash value afterwards;
B4. the value preserved in so files described in encrypted hash value described in step B3 and step A6 is compared;Such as
Fruit is consistent, thens follow the steps B5, otherwise returns to error code, program stopped operation;
When B5. executing key code, key key2 is obtained from so files, key code is decrypted, centre is obtained
Code;
B6. it is directed to the intermediate code that step B5 is obtained, key key1 is obtained from so files, second is carried out and decrypts, obtain
To final key code;
B7. the method call of key code is carried out.
The reinforcement means of the application program of above-mentioned android system, further, setting described in step A2 need encrypted
The key method of certain kinds, specifically include important algorithm method, verification login method, one in system core flow and method or
It is multiple.
The reinforcement means of the application program of above-mentioned android system is further encrypted or is walked for the first time described in step A3
AES encryption method can be used in second of encryption described in rapid A4, and the AES encryption method includes being added using the AES voluntarily write
Close program or the Encryption Tool for using AES.
The reinforcement means of the application program of above-mentioned android system is further encrypted as md5 encryption described in step A6
Method.
The reinforcement means of the application program of above-mentioned android system further executes described in step B1 in so files
Program calls the method in so files specifically by JNI call-by mechanisms.
Compared with prior art, the beneficial effects of the invention are as follows:
Existing Android application programs reinforcement means, the method for mostly using static treatment greatly carry out one to dex files
It is a little to change to increase the difficulty of attack.This reinforcement means only increases code reading difficulty, but its protection effect is limited, attacks
The person of hitting can still obtain the code of program.It, can dynamically decryption program using technical solution provided by the invention.The present invention
The reinforcement means of offer carries out double layer encryption protection to Key Functions, and increases the safety check of dex, and attacker is allowed not get
Code, and the program changed can not also be run, and be may be implemented to protect the integrality of code, be reasonably resistant to static state
Analysis, prevents the code of Android application programs to be tampered, and makes hacker from being checked by tools such as decompilings
Android source codes, and protection only is encrypted to key code, it ensure that the operational efficiency of program.
Description of the drawings
Fig. 1 is the flow diagram of the method provided by the present invention.
Fig. 2 is the file composite structural diagram of the dex files in Android application programs.
Specific implementation mode
Below in conjunction with the accompanying drawings, the present invention, the model of but do not limit the invention in any way are further described by embodiment
It encloses.
The present invention provides a kind of reinforcement means based on android system binary stream encryption technology, and Fig. 1 is that the present invention carries
For the flow diagram of method, include the following steps:
A. key code is encrypted, executes following operation:
A1. classes.dex files are parsed;
A2. specific class and method are navigated to;
A3. key key1 is used to carry out first time encryption;
A4. it uses key key2 to carry out second to encrypt;
A5. dex files are updated;
A6. it calculates the hash value of classes.dex files and hash value is encrypted, be stored in so files;
B. encrypted code is decrypted, executes following operation:
B1. the initial address of dex is found;
B2. hash value operation is carried out to dex files, by obtained result be encrypted and so files in the value that preserves into
Row compares;
B3. key key1 is used to carry out first time decryption;
B4. it uses key key2 to carry out second to decrypt;
B5 carries out the method call of key code.
Reinforcement means provided by the invention based on android system binary stream encryption technology includes ciphering process reconciliation
Close process;Illustrate the specific implementation of the method for the present invention by the following examples:
Ciphering process:
For needing Android application programs (apk) to be protected, first decompression to obtain the classes.dex texts in apk
Then part parses dex files;
Developer, which sets, needs the key method of encrypted certain kinds (to need encrypted certain kinds key method according to exploitation
The demand of person carries out judgement setting, for example, certain important algorithm methods, either verify login method or some system is closed
Key flow), then navigate to the key method for needing encrypted certain kinds;
Setting key key1 by reinforcing person, (reinforcing person's need for confidentiality needs when decryption with this key pair ciphertext
It is decrypted), it first uses key key1 to carry out first time encryption to the instruction of key method and (uses AES encryption, can be used voluntarily
The AES encryption program write can also use the Encryption Tool of AES), obtain encrypted intermediate data for the first time;
Then key key2 is set, second of encryption (also using AES encryption) is carried out to intermediate data using key key2;
AES encryption twice in succession can increase safety;
Update dex files:It will be obtained in data update to dex files after secondary encryption, obtain new dex files;
The hash value of new dex files is calculated, which is used to verify the integrality of dex;(MD5 is encrypted to hash value
Encryption) after be deposited into so files;The verification to dex files and deciphering parameter are added in so files;
For modified dex files, recalculates to obtain the value of checksum and signature, update dex files;
Compression regenerates apk, that is, completes ciphering process.
In the apk regenerated, including the dex files of Partial key code encryption, so files (are that reinforcing person provides
One section of program c program, acquiescence is safe), the checking procedure of decrypting process and dex is included in so files.
Decrypting process:
Start to execute program (the apk programs of AES encryption), the program in so files is first carried out:
Specifically, after AES encryption program is loaded into memory, JNI (Java are first passed through when program starts execution
Native Interface) call-by mechanism, it executes verification and decryption in so files and restores code, particular by Java
Method in code call so files (libraries so), first search program memory, find need to restore after encryption it is corresponding
Class and method.When searching can some prefabricated labels in a program, to help to find the part for needing to decrypt;
Then, dex files are found in memory:Fig. 2 is the composite structural diagram of dex files, and dex files include mainly dex
File header, character string identification symbol list, type identification item, function prototype mark table, zone identifier list, function identification table,
Class identifies table, data field (data that i.e. each table is listed above are stored in data field), static linkage data segment (can be sky), seeks
The method is looked for be specifically:
Find dex files from odex files, the starting magic fields of dex files for indicating dex versions, at present it
Value be fixed as " 6465780a 30333500 ", be converted to character string " dex.035 ", therefore forward lookup memory can be passed through
Page, the magic fields until finding dex files, the referred to herein as initial address of dex files;It, can be with after finding dex files
Dex file structures according to fig. 2, parsing dex file headers (dex header).Dex file headers have recorded other portions of dex files
Divide the offset in dex files, so as to navigate to the region where dex other parts, for further parsing.
Dex top of files (Dex file headers) mainly include verification and and other structures offset address and length information,
Specifically it is shown in Table 1:
The information and corresponding meaning of 1 Dex file headers of table record
For obtained dex file, the hash value of dex files is calculated, ((md5 encryption)) then is encrypted to Hash,
It is compared with the value preserved in so files, if unanimously, read-me is not changed, otherwise returns to error code, program is stopped
Only run.
When executing key code, key key2 is obtained from so files, key code is decrypted, intermediate generation is obtained
Code.For obtained intermediate code, key key1 is obtained from so files, is carried out second of decryption and is obtained final crucial generation
Code;Decrypting process corresponds to ciphering process twice respectively twice, to ensure the safety of application program.
Finally, the correct method for safely calling key code is realized.
It should be noted that the purpose for publicizing and implementing example is to help to further understand the present invention, but the skill of this field
Art personnel are appreciated that:It is not departing from the present invention and spirit and scope of the appended claims, various substitutions and modifications are all
It is possible.Therefore, the present invention should not be limited to embodiment disclosure of that, and the scope of protection of present invention is with claim
Subject to the range that book defines.
Claims (4)
1. a kind of reinforcement means of the application program of android system, by binary stream encryption method to Android application journeys
Key code in sequence is reinforced so that Android application codes are protected;The reinforcement means includes encrypted
Journey and decrypting process, specifically comprise the following steps:
A. being directed to needs Android application programs to be protected, and key code is encrypted, and executes following operation:
A1. the classes.dex in Android application programs is obtained to needing Android application programs to be protected to decompress first
File parses the classes.dex files;
A2. setting needs the key method of encrypted certain kinds, navigates to the key method for needing encrypted certain kinds;It is described to set
Surely the key method for needing encrypted certain kinds specifically includes important algorithm method, verification login method, system core flow side
One or more of method;
A3. key key1 is set, first time encryption is carried out to the instruction of key method described in step A2 using key key1, is obtained
Encrypted intermediate data for the first time;
A4. key key2 is set, carrying out second to intermediate data described in step A3 using key key2 encrypts;
A5. it will be obtained in data update to dex files after secondary encryption, obtain new dex files;
A6. the hash value of new dex files described in step A5 is calculated, which is used to verify the integrality of dex;To hash value
It is deposited into after being encrypted in so files;
A7. it for dex files new described in step A5, recalculates to obtain the value of checksum and signature, updates dex
File;
A8. compression regenerates apk, that is, completes ciphering process;It is encrypted comprising key code in the apk regenerated
Dex files and include decryption and dex check informations so files;
When B. starting to execute Android application programs, encrypted Android application programs are decrypted to obtain key code,
Execute following operation:
After B1.Android application programs are loaded into memory, the program in so files is executed;
B2. dex files are found in memory;
B3. for obtained dex files, the hash value of dex files is calculated, then Hash is encrypted, is obtained encrypted
Hash value;
B4. the value preserved in so files described in encrypted hash value described in step B3 and step A6 is compared;If one
It causes, thens follow the steps B5, otherwise return to error code, program stopped operation;
When B5. executing key code, key key2 is obtained from so files, key code is decrypted, intermediate code is obtained;
B6. it is directed to the intermediate code that step B5 is obtained, key key1 is obtained from so files, second is carried out and decrypts, obtain most
Whole key code;
B7. the method call of key code is carried out.
2. the reinforcement means of the application program of android system as described in claim 1, characterized in that first described in step A3
Second encryption described in secondary encryption or step A4 can be used AES encryption method, and the AES encryption method includes using voluntarily compiling
The AES encryption program write or the Encryption Tool using AES.
3. the reinforcement means of the application program of android system as described in claim 1, characterized in that encrypted described in step A6
For md5 encryption method.
4. the reinforcement means of the application program of android system as described in claim 1, characterized in that executed described in step B1
Program in so files calls the method in so files specifically by JNI call-by mechanisms.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610034627.8A CN105426708B (en) | 2016-01-19 | 2016-01-19 | A kind of reinforcement means of the application program of android system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610034627.8A CN105426708B (en) | 2016-01-19 | 2016-01-19 | A kind of reinforcement means of the application program of android system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105426708A CN105426708A (en) | 2016-03-23 |
CN105426708B true CN105426708B (en) | 2018-08-21 |
Family
ID=55504916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610034627.8A Expired - Fee Related CN105426708B (en) | 2016-01-19 | 2016-01-19 | A kind of reinforcement means of the application program of android system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105426708B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110147655A (en) * | 2019-03-28 | 2019-08-20 | 江苏通付盾信息安全技术有限公司 | The security protection system and method for application program |
Families Citing this family (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106326694A (en) * | 2016-08-30 | 2017-01-11 | 北京鼎源科技有限公司 | Android application reinforcing method baed on C source code mixing |
CN106355081A (en) * | 2016-09-07 | 2017-01-25 | 深圳市新国都支付技术有限公司 | Android program start verification method and device |
CN106650327A (en) * | 2016-11-24 | 2017-05-10 | 湖南鼎源蓝剑信息科技有限公司 | so file dynamic recovery-based Android application reinforcement method |
CN106709286A (en) * | 2016-11-30 | 2017-05-24 | 江苏神州信源系统工程有限公司 | Method for performing security reinforcement on apk resource package |
CN108460276B (en) * | 2016-12-09 | 2022-01-25 | 北京奇虎科技有限公司 | Processing method and device for SO file of dynamic link library of android installation package |
CN106529222A (en) * | 2016-12-09 | 2017-03-22 | 北京智游网安科技有限公司 | Protection method and protection system for preventing secondary packaging and cracking of application program |
CN106843853B (en) * | 2016-12-28 | 2020-09-08 | 北京五八信息技术有限公司 | Method and device for protecting user information |
CN106934260B (en) * | 2017-03-14 | 2020-03-17 | 北京深思数盾科技股份有限公司 | Code protection method, device, server and storage medium |
CN107122634B (en) * | 2017-04-26 | 2020-03-17 | 北京梆梆安全科技有限公司 | Reinforcement protection method and device for software installation package |
CN107122632A (en) * | 2017-04-26 | 2017-09-01 | 北京洋浦伟业科技发展有限公司 | The encryption method and device of software installation bag |
CN107122635A (en) * | 2017-04-27 | 2017-09-01 | 北京洋浦伟业科技发展有限公司 | A kind of reinforcement means of the reinforcement means of SO files, device and APK |
CN107169324A (en) * | 2017-05-12 | 2017-09-15 | 北京理工大学 | A kind of Android application reinforcement means based on dynamic encryption and decryption |
CN107977553B (en) * | 2017-12-25 | 2020-07-10 | 中国电子产品可靠性与环境试验研究所 | Method and device for security reinforcement of mobile application program |
CN108377185B (en) * | 2018-03-14 | 2021-01-26 | 四川长虹电器股份有限公司 | Internet of things weak resource terminal key safety management method |
CN108932436B (en) * | 2018-07-06 | 2020-07-28 | 四川长虹电器股份有限公司 | Android system-based software security reinforcement method for APP specification |
CN109005184A (en) * | 2018-08-17 | 2018-12-14 | 上海小蚁科技有限公司 | File encrypting method and device, storage medium, terminal |
CN109005196A (en) * | 2018-09-10 | 2018-12-14 | 北京旷视科技有限公司 | Data transmission method, data decryption method, device and electronic equipment |
CN109344574B (en) * | 2018-09-19 | 2020-09-22 | 四川长虹电器股份有限公司 | Self-adaptive android reinforcement method based on specification |
US10929153B2 (en) | 2018-10-26 | 2021-02-23 | International Business Machines Corporation | Bidirectional protection of application package |
CN109981283B (en) * | 2019-02-28 | 2022-05-20 | 西安理工大学 | Android platform message driven core code integrity detection system and method |
CN110046504B (en) * | 2019-04-22 | 2021-04-06 | 北京智游网安科技有限公司 | SO file hiding method, storage medium and device based on Linker |
CN110502874B (en) * | 2019-07-19 | 2021-05-25 | 西安理工大学 | Android App reinforcement method based on file self-modification |
CN110609789A (en) * | 2019-08-29 | 2019-12-24 | 烽火通信科技股份有限公司 | Method and system for software License verification |
CN110610097A (en) * | 2019-09-09 | 2019-12-24 | 杭州天宽科技有限公司 | File transmission security system based on android application |
CN110598402A (en) * | 2019-09-09 | 2019-12-20 | 杭州天宽科技有限公司 | Operation security system based on android application |
CN111259370A (en) * | 2020-01-13 | 2020-06-09 | 苏州浪潮智能科技有限公司 | FPGA program security verification method, system, terminal and storage medium |
CN112052461A (en) * | 2020-08-05 | 2020-12-08 | 北京智游网安科技有限公司 | Code processing method based on instruction injection, terminal and storage medium |
CN112084469A (en) * | 2020-08-06 | 2020-12-15 | 华帝股份有限公司 | Encryption method for preventing application program from being reverse engineered |
CN112613037A (en) * | 2020-12-29 | 2021-04-06 | 北京永新视博数字电视技术有限公司 | Code checking method and device |
CN113094666B (en) * | 2021-04-09 | 2022-06-24 | 每日互动股份有限公司 | System for preventing java program from being decompiled |
CN113419734B (en) * | 2021-06-17 | 2022-10-04 | 网易(杭州)网络有限公司 | Application program reinforcing method and device and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103117851A (en) * | 2011-11-17 | 2013-05-22 | 银视通信息科技有限公司 | Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) |
CN104317625A (en) * | 2014-11-09 | 2015-01-28 | 刘鹏 | Dynamic loading method for APK files |
CN104462883A (en) * | 2014-11-09 | 2015-03-25 | 刘鹏 | APK file strengthening method |
CN104866739A (en) * | 2015-06-04 | 2015-08-26 | 上海斐讯数据通信技术有限公司 | Application program encryption method and application program encryption system in Android system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101521765B1 (en) * | 2015-01-08 | 2015-05-20 | 숭실대학교산학협력단 | Apparatus For Code Obfuscation Using Indistinguishable Identifier Conversion and Method Thereof |
-
2016
- 2016-01-19 CN CN201610034627.8A patent/CN105426708B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103117851A (en) * | 2011-11-17 | 2013-05-22 | 银视通信息科技有限公司 | Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) |
CN104317625A (en) * | 2014-11-09 | 2015-01-28 | 刘鹏 | Dynamic loading method for APK files |
CN104462883A (en) * | 2014-11-09 | 2015-03-25 | 刘鹏 | APK file strengthening method |
CN104866739A (en) * | 2015-06-04 | 2015-08-26 | 上海斐讯数据通信技术有限公司 | Application program encryption method and application program encryption system in Android system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110147655A (en) * | 2019-03-28 | 2019-08-20 | 江苏通付盾信息安全技术有限公司 | The security protection system and method for application program |
Also Published As
Publication number | Publication date |
---|---|
CN105426708A (en) | 2016-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105426708B (en) | A kind of reinforcement means of the application program of android system | |
US9602289B2 (en) | Steganographic embedding of executable code | |
CN110110548B (en) | Method for storing files in trusted execution environment in encrypted manner based on encryption chip | |
US10284372B2 (en) | Method and system for secure management of computer applications | |
US9892661B2 (en) | Steganographic embedding of hidden payload | |
Kovacheva | Efficient code obfuscation for Android | |
CN106650327A (en) | so file dynamic recovery-based Android application reinforcement method | |
JP4702957B2 (en) | Tamper resistant virtual machine | |
US20080263366A1 (en) | Self-verifying software to prevent reverse engineering and piracy | |
US20160203087A1 (en) | Method for providing security for common intermediate language-based program | |
CN102236757A (en) | Software protection method and system applicable to Android system | |
CN109992987B (en) | Script file protection method and device based on Nginx and terminal equipment | |
Piao et al. | Server‐based code obfuscation scheme for APK tamper detection | |
CN103457733A (en) | Data sharing method and system under cloud computing environment | |
WO2003090021A2 (en) | Security framework for protecting rights in computer software | |
CN103530535A (en) | Shell adding and removing method for Android platform application program protection | |
KR101436536B1 (en) | File server, file transfer method thereof and file tamperproof system | |
CN107273723B (en) | So file shell adding-based Android platform application software protection method | |
CN111191195A (en) | Method and device for protecting APK | |
US8694548B2 (en) | Defense-in-depth security for bytecode executables | |
Yuste et al. | Avaddon ransomware: An in-depth analysis and decryption of infected systems | |
CN108133147A (en) | Guard method, equipment and the readable storage medium storing program for executing of executable code | |
CN105184119B (en) | A kind of method for security protection of software | |
Chen et al. | Semantic-integrated software watermarking with tamper-proofing | |
WO2016188134A1 (en) | Application reinforcing implementation method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180821 Termination date: 20200119 |
|
CF01 | Termination of patent right due to non-payment of annual fee |