CN106778104A - A kind of anti-debug method and system of application program - Google Patents

A kind of anti-debug method and system of application program Download PDF

Info

Publication number
CN106778104A
CN106778104A CN201710040492.0A CN201710040492A CN106778104A CN 106778104 A CN106778104 A CN 106778104A CN 201710040492 A CN201710040492 A CN 201710040492A CN 106778104 A CN106778104 A CN 106778104A
Authority
CN
China
Prior art keywords
application program
program
debugged
logic
thread
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710040492.0A
Other languages
Chinese (zh)
Other versions
CN106778104B (en
Inventor
周志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201710040492.0A priority Critical patent/CN106778104B/en
Publication of CN106778104A publication Critical patent/CN106778104A/en
Application granted granted Critical
Publication of CN106778104B publication Critical patent/CN106778104B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

Abstract

The invention discloses a kind of anti-debug method of application program, in the method, by the current debugging process for reading the status file of android system preservation to know application program, if detecting application program to be debugged, can then call and quit a program, terminate current application program, and the user profile for performing debugging operations is reported into server simultaneously, server can carry out title treatment to the user, or forbid the user to log in application program within a period of time.The invention discloses a kind of anti-debug system of application program, the system includes detection module, adds module and processing module.The present invention greatly improves the threshold that program is cracked, and enhances security.

Description

A kind of anti-debug method and system of application program
Technical field
The present invention relates to the debugging field of application program, more particularly to a kind of application program anti-debug method and system.
Background technology
As computer technology application becomes increasingly popular, the fast development of Android intelligent terminal, Android software industry Developed rapidly, at the same time, attacker is made using Android software reversal technique to the various attacks of software and unauthorized With and pirate the behavior such as to replicate also more and more.
Android conversed analysis technology can be used to the analysis in the case where application source code is not known and apply journey The functional sequence of sequence, the data code for distorting application program etc., if conversed analysis technology is used by malice without restriction, profit User can analyze the core technology for obtaining application program, it is also possible to distort the signature and author information of application program, can be with Malicious code is injected into existing application program and is pretended by secondary packing, these behaviors are all greatly compromised The interests of application developer, seriously compromise the personal secrets of users.
In Android software reversal technique, Android debugging techniques are a very important parts.Pass through The debugging of Android applications is carried out, the operational process of Android applications can be obtained, be inferred to the substantially former of Android applications Reason, generally can with it is very well and rapidly bypass some log in limitation or function restriction, get some user's private informations, With larger harm.For example, can analyze and understand the data encryption/decryption method used in Android program, such as analyze clear Using the decision logic of charging function, such that it is able to bypass the inspection whether paid, such that it is able to not pay the fees in the case of use Charging function etc., such as can go to develop corresponding " game is plug-in " for game application.And the reverse first step of software is then It is that program can be debugged, if not having anti-debug technology, equivalent to program quilt " exposed " in face of hacker.Compare at present More important program is intended to that anti-debug function can be added, and prevents hacker from being debugged, from without allowing others' analysis program Realization principle, the threshold that the program of greatly improving is cracked, how to carry out the anti-debug of application program has turned into urgent need solution Problem.
The content of the invention
It is an object of the invention to provide a kind of anti-debug method and system of application program, by judging current application Whether program is debugged, if detect current application program be debugged, the application program is terminated at once, from And realize the anti-debug to application program.
The technical solution adopted in the present invention is as follows:
A kind of anti-debug method of application program, it is characterised in that the method includes:Step S101, detects current application program Whether in debugged state;Step S102, in the key point of application program, adds detection logic;Step S103, if inspection Measure application program to be debugged, then obtain the user profile for performing debugging operations, and the user profile is sent to server, and Execution quits a program.
Preferably, whether detection current application program specifically includes in debugged state:Power function is write for examining Whether current application program is surveyed in debugged state, the power function reads the status file of android system, and judges institute TracePid fields in the status file of reading, if the value of TracePid fields is equal to 0, illustrate that the application program does not have It is debugged, if being not equal to 0, illustrate that the application program has been debugged, and TracePid fields value be exactly debug into The ID of journey.
Preferably, detection logic is added to specifically include:Call write for checking the work(whether current process is debugged Can function.
Preferably, in the key point of application program, detection logic is added to specifically include:Application program launching when After time, User logs in success and when application program loads other SO files, detection logic is added.
Preferably, perform to quit a program and specifically include:If detecting application program be currently debugged, n is created Individual thread, and add program to exit logic in each thread, then randomly choose a thread and exit logic to perform, wherein N is the positive integer more than 1, wherein, the program exits the interface System.exit (0) that logic is provided for android system.
Preferably, a thread is randomly choosed to exit logic and specifically include to perform:Calling system function Rand is produced One 1 random number to n, performs to select a thread from n thread.
Preferably, perform to quit a program and specifically include:Object needed for being performed by deleting application program, allows the program cannot Continue executing with down, wherein the object needed for the application program is performed includes reading the internal memory sky of the handle of file or distribution Between.
Preferably, the user profile for performing debugging operations is obtained, and the user profile is sent to server and specifically included: Current user information is sent to by server by web socket, server-tag active user has debugging utility.
A kind of anti-debug system of application program, the system includes detection module, adds module and processing module:It is special Levy and be:Detection module, for detecting current application program whether in debugged state;Module is added, in application journey In the key point of sequence, detection logic is added;Processing module, if for debugged when application program is detected, obtaining and performing The user profile of debugging operations, and the user profile is sent to server, and execution quits a program.
Preferably, whether detection current application program specifically includes in debugged state and writes power function for detecting Whether in debugged state, the power function reads the status file of android system to current application program, and judges to be read TracePid fields in the status file for taking, if the value of TracePid fields be equal to 0, illustrate the application program not by Debugging, if being not equal to 0, illustrates that the application program has been debugged, and the value of TracePid fields is exactly the process of debugging ID.
Preferably, add detection logic specifically include call write for checking the function whether current process is debugged Function.
Preferably, in the key point of application program, when adding detection logic to be specifically included in application program launching, After User logs in success and when application program loads other SO files, detection logic is added.
Preferably, detect application program and be currently debugged if performing and quitting a program to specifically include, create n Thread, and add program to exit logic in each thread, then randomly choose a thread and exit logic to perform, wherein n It is the positive integer more than 1, wherein, the program exits the interface System.exit (0) that logic is provided for android system.
Preferably, a thread is randomly choosed to exit logic and specifically include calling system function Rand to produce one to perform Individual 1 to n random number, performs to select a thread from n thread.
Preferably, the object for quitting a program and specifically including needed for performing by deleting application program is performed, allows the program cannot Continue executing with down, wherein the object needed for the application program is performed includes reading the internal memory sky of the handle of file or distribution Between.
Preferably, the user profile for performing debugging operations is obtained, and the user profile is sent to server and specifically included Current user information is sent to by server by web socket, server-tag active user has debugging utility.
Technical scheme can be obtained beneficial effect to be included, the threshold that the program of greatly improving is cracked, Enhance security.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the anti-debug method;
Fig. 2 is the high-level schematic functional block diagram of the anti-debug system.
Specific embodiment
In order to better illustrate the present invention, further is made to technical scheme in conjunction with specific embodiment and Figure of description Explanation.Although having recorded these specific embodiments in embodiment, so it is not limited to the present invention, any affiliated skill Have usually intellectual in art field, without departing from the spirit and scope of the present invention, when can make a little change with retouching, therefore Protection scope of the present invention ought be defined depending on those as defined in claim.
Can be stored in the debugging mode of process in status file by android system, and the anti-debug method can read first The status file that android system is preserved knows the current debugging process of application program, if current application program not by Debugging, then the process numbering ID values for debugging process are 0, if current application program is debugged, debug the process of process Numbering ID values, just can judge whether application program is debugged by process numbering ID values.If detecting application program It is debugged, then can call and quit a program, terminate current application program, and simultaneously report the user profile for performing debugging operations To server, server can be accordingly punished the current user for performing debugging, for example, being carried out at title to the user Reason, or forbid the user to log in application program etc. within a period of time.Simultaneously in order to further whether strengthen detection procedure In debugging, can be all inserted into detecting logic in multiple key points of program.
The schematic flow sheet of the anti-debug method of the application program is as shown in figure 1, the anti-debug method comprises the following steps:
1)Step S101:Whether detection current application program is in debugged state;
The debugging process ID of application program can be recorded android system the state in the application(status)In file, and The ID of the debugging process of the application is represented with field TracerPid, it is only necessary to reading state file, and judge read shape TracePid fields in state file, illustrate the application without debugged, if not if the value of TracePid fields is equal to 0 Illustrate that the process has been debugged equal to 0, and TracePid fields value be exactly the process of debugging ID.Concrete methods of realizing It is as follows:
Pid = getpid();The PID of // acquisition current process, i.e., the TracePid fields in status file
Snprintf(path,“/proc/%d/status”,Pid);
File *fp = fopen(path);// open status files
Wherein, Snprintf () function is used for being spliced into ID and the path of status file of debugging process, "/proc/%d/ Status " represents that %d needs to insert the PID of current debugging process, and path represents the path of the status file of final reading.Then, Carry out open mode status files using fopen () function.
While(fgets(line, 255, fp))
{
if(strncmp(line,"TracerPid",9) == 0)
{int statue = atoi(&line[10]);
If statue !=0 { } // explanation process is debugged
Else { } // explanation process is not debugged
}
}
Call function strncmp () judge read row content line in whether have this field of TracerPid, While is followed Ring is used for call function fgets () and reads file, according to capable mode, a line is read every time, then reads status files Content, and judge whether there is this field of TracePid in reading of content, if this field, then value thereafter is read, Judge whether its value is 0, be debugged if not 0 explanation current process.
2)Step S102:In the key point of application program, detection logic is added;
The state whether reading process is debugged, it is necessary to be judged often judge it is all once to judge in the application always Either with or without debugged under current state, so the anti-debug method all adds detection logic to enter using the key point in application program Row check, when the key point such as application program launching of application program, User logs in success after, application program load other SO files etc..The specific method for adding detection logic is whether the inspection current process that invocation step S101 writes is debugged Power function, can be obtained after the completion of calling whether the debugged returning result of current process.
3)Step S103:If detecting application program to be debugged, the user profile for performing debugging operations is obtained, and will The user profile is sent to server, and execution quits a program;
If detecting application program be currently debugged, the interface System.exit for calling android system to provide (0) current application program is exited, prevents from performing the hacker further conversed analysis application program of debugging operations.In view of program It is a weak spot to exit, and hacker is easier to analyze the logical point that program is exited, so as to be modified to exiting logic, around Cross and exit logic.The mode that some reinforcement programs are exited is provided in anti-debug method of the invention, once detect application Program is currently being debugged, and the method using multiple threads are created, each thread adds program to exit logic, then random choosing Select a thread and exit logic to perform, the thread called when so exiting every time is different, while the function generation called The position of code is also different.
It is as follows that multithreading exits implementation method:3 threads are created, a thread is then randomly choosed and is quit a program.
Thread1 = new Thread();
Thread2 = new Thread();
Thread2 = new Thread();
Program is added to exit logic in RUN functions in the interface function of each thread, it is specific as follows:
Thread
{ public void run()
{System.exit(0);}
}
Then calling system function Rand holds to produce the random number of 1 to 3 to select a thread from 3 threads OK.
Further, it is also possible to using abnormal method is produced, program cannot be continued executing with down, for example, journey is applied in deletion Sequence performs required object(Can be the handle for reading file, can be memory headroom of distribution etc.), once used when program and deleted The object for removing can then make calling program produce mistake, so as to exit.Above method can also be used in combination with, so that further The complexity that the program of strengthening is exited so that the threshold of hacker's analysis is higher.Can will currently be used by web socket simultaneously Family information is sent to server, and server-tag active user has debugging utility, can make corresponding punishment.
The high-level schematic functional block diagram of the anti-debug system is as shown in Fig. 2 the anti-debug system includes detection module 201, adds Enter module 202 and processing module 203.Detection module 201, for whether detecting current application program in debugged state, Module 202 is added, for the key point in application program, detection logic, processing module 203, if for when detection is added It is debugged to application program, then the user profile for performing debugging operations is obtained, and the user profile is sent to server, and hold Row quits a program.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.And, the present invention can be used and wherein include the computer of computer usable program code at one or more Usable storage medium(Including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)The computer program of upper implementation is produced The form of product.
The present invention is with reference to method according to embodiments of the present invention, equipment(System)And the flow of computer program product Figure and/or block diagram are described.It should be understood that every first-class during flow chart and/or block diagram can be realized by computer program instructions The combination of flow and/or square frame in journey and/or square frame and flow chart and/or block diagram.These computer programs can be provided The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced for reality by the instruction of computer or the computing device of other programmable data processing devices The device of the function of being specified in present one flow of flow chart or multiple one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing devices with spy In determining the computer-readable memory that mode works so that instruction of the storage in the computer-readable memory is produced and include finger Make the manufacture of device, the command device realize in one flow of flow chart or multiple one square frame of flow and/or block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented treatment, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Obviously, those skilled in the art can carry out various changes and modification without deviating from essence of the invention to the present invention God and scope.So, if these modifications of the invention and modification belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising these changes and modification.

Claims (10)

1. a kind of anti-debug method of application program, it is characterised in that the method includes:
Step S101, whether detection current application program is in debugged state;
Step S102, in the key point of application program, adds detection logic;
Step S103, if detect application program be debugged, obtains the user profile for performing debugging operations, and by the user Information is sent to server, and execution quits a program.
2. anti-debug method according to claim 1, it is characterised in that whether detection current application program is in debugged State is specifically included:
Whether power function is write for detecting current application program in debugged state, the power function reads Android The status file of system, and judge the TracePid fields in read status file, if value of TracePid fields etc. In 0, then illustrate that the application program is not debugged, if being not equal to 0, illustrate that the application program has been debugged.
3. anti-debug method according to claim 2, it is characterised in that add detection logic to specifically include:
Call write for checking the power function whether current process is debugged.
4. the anti-debug method according to claim 1 or 3, it is characterised in that in the key point of application program, adds inspection Logic is surveyed to specifically include:
When application program launching, after User logs in success or when application program loads other SO files, detection is added Logic.
5. anti-debug method according to claim 1, it is characterised in that execution quits a program and specifically includes:
If detecting application program be currently debugged, m thread is created, and add program to exit in each thread Logic, then randomly chooses a thread and exits logic to perform, and wherein m is the positive integer more than 1, and the described logic that exits is The interface function System.exit (0) provided by performing android system realizes exit function.
6. anti-debug method according to claim 5, it is characterised in that one thread of random selection exits logic to perform Specifically include:
Calling system function Rand generates a span and is 1 to n random number, and selects one from random several threads Individual thread exits logic to perform, and wherein n is the positive integer more than 1, the m mono- in m thread of span n and the establishment Cause.
7. according to the anti-debug method that one of claim 5 to 6 is described, it is characterised in that execution quits a program and specifically includes:
Required object is performed by deleting application program, program cannot be continued executing with down, wherein the application program is held Object needed for row includes reading the handle of file or the memory headroom of distribution.
8. anti-debug method according to claim 1, it is characterised in that obtain the user profile for performing debugging operations, and The user profile is sent into server to specifically include:
Current user information is sent to by server by web socket, after receiving information, server is to the active user It is marked, indicates the active user to there is the operation of debugging utility.
9. a kind of anti-debug system of application program, the system includes detection module, adds module and processing module, its feature It is:
Detection module, for detecting current application program whether in debugged state;
Module is added, for the key point in application program, detection logic is added;
Processing module, if for application program to be debugged when detecting, the user profile for performing debugging operations is obtained, and will The user profile is sent to server, and execution quits a program;
Whether detection current application program specifically includes in debugged state:
Whether power function is write for detecting current application program in debugged state, the power function reads Android The status file of system, and judge the TracePid fields in read status file, if value of TracePid fields etc. In 0, then illustrate that the application program is not debugged, if being not equal to 0, illustrate that the application program has been debugged;
Execution quits a program and specifically includes:
If detecting application program be currently debugged, m thread is created, and add program to exit in each thread Logic, then randomly chooses a thread and exits logic to perform, and wherein m is the positive integer more than 1, wherein, the program is exited The interface function System.exit (0) that logic is provided for android system;
In the key point of application program, detection logic is added to specifically include:
Call write for checking the power function whether current process is debugged;
When application program launching, after User logs in success or when application program loads other SO files, detection is added Logic;
One thread of random selection exits logic and specifically includes to perform:
Calling system function Rand generates a span and is 1 to n random number, and selects one from random several threads Individual thread exits logic to perform, and the n in n thread of wherein span n and the establishment is consistent.
10. anti-debug system according to claim 9, it is characterised in that execution quits a program and specifically includes:
Required object is performed by deleting application program, program cannot be continued executing with down, wherein the application program is held Object needed for row includes reading the handle of file or the memory headroom of distribution;
The user profile for performing debugging operations is obtained, and the user profile is sent to server and specifically included:
Current user information is sent to by server by web socket, after receiving information, server is to the active user It is marked, indicates the active user to there is the operation of debugging utility.
CN201710040492.0A 2017-01-20 2017-01-20 A kind of anti-debug method and system of application program Active CN106778104B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710040492.0A CN106778104B (en) 2017-01-20 2017-01-20 A kind of anti-debug method and system of application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710040492.0A CN106778104B (en) 2017-01-20 2017-01-20 A kind of anti-debug method and system of application program

Publications (2)

Publication Number Publication Date
CN106778104A true CN106778104A (en) 2017-05-31
CN106778104B CN106778104B (en) 2019-10-25

Family

ID=58944237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710040492.0A Active CN106778104B (en) 2017-01-20 2017-01-20 A kind of anti-debug method and system of application program

Country Status (1)

Country Link
CN (1) CN106778104B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107463836A (en) * 2017-08-17 2017-12-12 郑州云海信息技术有限公司 A kind of synthesis anti-debug method and system under Windows systems
CN107992724A (en) * 2017-12-14 2018-05-04 四川大学 A kind of software security reinforcement means
CN109117631A (en) * 2018-07-05 2019-01-01 武汉斗鱼网络科技有限公司 A kind of method that program exits and relevant device
CN109190377A (en) * 2018-09-13 2019-01-11 麒麟合盛网络技术股份有限公司 Intrusion detection method and device
CN109684795A (en) * 2018-12-25 2019-04-26 成都卫士通信息产业股份有限公司 The method, apparatus and electronic equipment of application program anti-debug
CN109977633A (en) * 2019-03-28 2019-07-05 武汉斗鱼鱼乐网络科技有限公司 A kind of program protection method and relevant apparatus
CN110750782A (en) * 2018-07-05 2020-02-04 武汉斗鱼网络科技有限公司 Program exiting method and related equipment
CN112199642A (en) * 2019-07-08 2021-01-08 北京智游网安科技有限公司 Detection method for anti-debugging of android system, mobile terminal and storage medium
CN112363917A (en) * 2020-10-30 2021-02-12 北京五八信息技术有限公司 Application program debugging exception processing method and device, electronic equipment and medium
US11409635B2 (en) 2019-08-23 2022-08-09 Raytheon Company Hacker-resistant anti-debug system
WO2022237120A1 (en) * 2021-05-14 2022-11-17 上海完美时空软件有限公司 Frame capture defense method and apparatus for game application, and storage medium and computer device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164643A (en) * 2011-12-08 2013-06-19 北京深思洛克软件技术股份有限公司 Method and device using hardware to debug
CN104932972A (en) * 2014-03-19 2015-09-23 北京娜迦信息科技发展有限公司 Method and apparatus for preventing application from dynamic debugging
US20160300044A1 (en) * 2013-11-14 2016-10-13 Inka Entworks, Inc. Anti-debugging method
CN106055983A (en) * 2016-07-27 2016-10-26 北京鼎源科技有限公司 Anti-debugging method of android application based on IDA communication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164643A (en) * 2011-12-08 2013-06-19 北京深思洛克软件技术股份有限公司 Method and device using hardware to debug
US20160300044A1 (en) * 2013-11-14 2016-10-13 Inka Entworks, Inc. Anti-debugging method
CN104932972A (en) * 2014-03-19 2015-09-23 北京娜迦信息科技发展有限公司 Method and apparatus for preventing application from dynamic debugging
CN106055983A (en) * 2016-07-27 2016-10-26 北京鼎源科技有限公司 Anti-debugging method of android application based on IDA communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
朱洪军等: "一种Android应用加固方案", 《计算机应用与软件》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107463836A (en) * 2017-08-17 2017-12-12 郑州云海信息技术有限公司 A kind of synthesis anti-debug method and system under Windows systems
CN107992724A (en) * 2017-12-14 2018-05-04 四川大学 A kind of software security reinforcement means
CN110750782A (en) * 2018-07-05 2020-02-04 武汉斗鱼网络科技有限公司 Program exiting method and related equipment
CN109117631A (en) * 2018-07-05 2019-01-01 武汉斗鱼网络科技有限公司 A kind of method that program exits and relevant device
CN110750782B (en) * 2018-07-05 2022-05-13 武汉斗鱼网络科技有限公司 Program exiting method and related equipment
CN109190377A (en) * 2018-09-13 2019-01-11 麒麟合盛网络技术股份有限公司 Intrusion detection method and device
CN109684795A (en) * 2018-12-25 2019-04-26 成都卫士通信息产业股份有限公司 The method, apparatus and electronic equipment of application program anti-debug
CN109684795B (en) * 2018-12-25 2023-01-24 成都卫士通信息产业股份有限公司 Method and device for anti-debugging of application program and electronic equipment
CN109977633A (en) * 2019-03-28 2019-07-05 武汉斗鱼鱼乐网络科技有限公司 A kind of program protection method and relevant apparatus
CN112199642A (en) * 2019-07-08 2021-01-08 北京智游网安科技有限公司 Detection method for anti-debugging of android system, mobile terminal and storage medium
US11409635B2 (en) 2019-08-23 2022-08-09 Raytheon Company Hacker-resistant anti-debug system
CN112363917A (en) * 2020-10-30 2021-02-12 北京五八信息技术有限公司 Application program debugging exception processing method and device, electronic equipment and medium
CN112363917B (en) * 2020-10-30 2022-03-04 北京五八信息技术有限公司 Application program debugging exception processing method and device, electronic equipment and medium
WO2022237120A1 (en) * 2021-05-14 2022-11-17 上海完美时空软件有限公司 Frame capture defense method and apparatus for game application, and storage medium and computer device

Also Published As

Publication number Publication date
CN106778104B (en) 2019-10-25

Similar Documents

Publication Publication Date Title
CN106778104A (en) A kind of anti-debug method and system of application program
CN106845170B (en) A kind of anti-debug method and system
Yang et al. Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
CN108123956B (en) Password misuse vulnerability detection method and system based on Petri network
CN110765000B (en) Program testing method and device
CN108182359B (en) Method, device and storage medium for testing API security in trusted environment
CN109635568B (en) Concurrent vulnerability detection method based on combination of static analysis and fuzzy test
CN107193732B (en) Verification function positioning method based on path comparison
CN109117201B (en) Program exiting method and related equipment
CN110096433B (en) Method for acquiring encrypted data on iOS platform
CN102043915A (en) Method and device for detecting malicious code contained in non-executable file
CN109214171A (en) A kind of detection method of software, device, equipment and medium
US9047448B2 (en) Branch auditing in a computer program
Berthomé et al. High level model of control flow attacks for smart card functional security
Gao et al. Em-fuzz: Augmented firmware fuzzing via memory checking
CN105512562B (en) Vulnerability mining method and device and electronic equipment
Chao et al. An android application vulnerability mining method based on static and dynamic analysis
WO2023035751A1 (en) Intelligent confusion for mobile terminal application
Jiang et al. Evocatio: Conjuring bug capabilities from a single poc
CN109977633A (en) A kind of program protection method and relevant apparatus
Bell Detecting, isolating, and enforcing dependencies among and within test cases
CN109726115B (en) Anti-debugging automatic bypass method based on tracking of Intel processor
Yuan et al. Scalable and obfuscation-resilient android app repackaging detection based on behavior birthmark
Crincoli et al. Vulnerable smart contract detection by means of model checking
Wu et al. Detecting Android Inter-App Data Leakage via Compositional Concolic Walking.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant