CN106845167A - The reinforcement means and device of a kind of APK, and dynamic loading method and device - Google Patents
The reinforcement means and device of a kind of APK, and dynamic loading method and device Download PDFInfo
- Publication number
- CN106845167A CN106845167A CN201611139477.3A CN201611139477A CN106845167A CN 106845167 A CN106845167 A CN 106845167A CN 201611139477 A CN201611139477 A CN 201611139477A CN 106845167 A CN106845167 A CN 106845167A
- Authority
- CN
- China
- Prior art keywords
- apk
- data
- former
- classes
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000002787 reinforcement Effects 0.000 title claims abstract description 49
- 238000011068 loading method Methods 0.000 title claims abstract description 47
- 238000007596 consolidation process Methods 0.000 claims abstract description 18
- 238000003860 storage Methods 0.000 claims abstract description 17
- 230000006837 decompression Effects 0.000 claims description 19
- 230000003014 reinforcing effect Effects 0.000 claims description 16
- 238000012857 repacking Methods 0.000 claims description 10
- 239000000284 extract Substances 0.000 claims description 9
- 238000013075 data extraction Methods 0.000 claims description 7
- 241001269238 Data Species 0.000 abstract description 2
- 238000000034 method Methods 0.000 description 23
- 238000012986 modification Methods 0.000 description 6
- 230000004048 modification Effects 0.000 description 6
- 238000009434 installation Methods 0.000 description 5
- 238000012856 packing Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 2
- 238000011065 in-situ storage Methods 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 238000010009 beating Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000008672 reprogramming Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The reinforcement means and device and dynamic loading method and device of a kind of APK file are disclosed in the embodiment of the present invention.The reinforcement means includes:Obtain and need former data to be protected in former APK to be reinforced, the former data are encrypted, obtain encryption data;Consolidation process is carried out to the former APK, target APK is generated, wherein, the encryption data is stored in the predeterminated position of the target APK with document form.The reinforcement means and device and dynamic loading method and device provided in the embodiment of the present invention, it is stored in target APK by that will be hidden to encryption data necessary to operation APK, the storage that improve APK encryption datas is disguised, the difficulty of APK decompilings is increased, the security of APK file is dramatically improve.
Description
Technical field
The present invention relates to terminal applies security technology area, the reinforcement means and device, Yi Jidong of more particularly to a kind of APK
State loading method and device.
Background technology
APK (Android Package) is Android Android installation kits, is the application program in Android operation system
Installation file, this applies installation file by installation file strapping tool according to multiple file generateds, and the file for generating APK is typically adopted
Write with java programming languages, user by the APK file generated by installation file strapping tool upload to Android simulator or
Being performed in the user equipment of Android operation system to install.
Growing with Android mobile terminal platform, third party application is emerged in multitude, to the piracy applied
Bag phenomenon is increasingly serious with beating again.Because Android platform is developed using Java language, the code in APK is caused to be easy to anti-
Compiling, by decompiling APK file, enters analysis, modification or the insertion of line code, then signature is packaged as new APK texts again
Part, to reach the purpose of the original behavior of reprogramming, the tampering of APK seriously compromise application developers interests and
Enthusiasm, and technology is distorted using APK, by adding malicious code so that Android user faces privacy leakage and property is damaged
The danger of mistake, has had a strong impact on the application safety of user.Therefore, reinforcement protection of the developers for Android program code
Also increasingly pay close attention to.
In the reinforcement means of existing Android software installation bag APK, some of APK significant datas are encrypted, will added
Ciphertext data is stored under resource storing directory res catalogues or under extra resource catalogue assets catalogues with document form, program
To perform go in implementation procedure and find this encryption under correspondence catalogue and file and load, so that the operation of complete APK file, but this kind
The location mode of encryption data is disguised poor, is easily found, and the risk for causing APK to be cracked is still larger.
The content of the invention
For defect present in prior art, the purpose of the embodiment of the present invention is to provide one kind to overcome above-mentioned asking
Topic or the reinforcement means of a kind of APK that at least can partly solve the above problems and device and dynamic loading method and
Device.
To achieve the above object, a kind of reinforcement means of APK file is provided in one embodiment of the present of invention, it is described to add
Solid method includes:
A kind of reinforcement means of APK file, it is characterised in that including:
Obtain and need former data to be protected in former APK to be reinforced;
The former data are encrypted, encryption data is obtained;
Consolidation process is carried out to the former APK, target APK is generated, wherein, the encryption data is stored in document form
The predeterminated position of the target APK.
Preferably, reinforcement means as described above, the predeterminated position is in the classes.dex files of target APK
Position.
Preferably, reinforcement means as described above, the predeterminated position is the text of the classes.dex files of target APK
Part head and/or N number of specified location of data field, N >=1.
Preferably, reinforcement means as described above, the N=1, the specified location is the head or tail of the data field
Portion.
Preferably, reinforcement means as described above, the N=2;The encryption data includes the first encryption data and second
Encryption data;
The specified location includes the first specified location and the second specified location, and the first encryption data is target APK's
Position in classes.dex files is first specified location, classes.dex of second encryption data in target APK
Position in file is second specified location.
Preferably, reinforcement means as described above, first specified location is the head of the data field, described second
Specified location is the afterbody of the data field.
Preferably, reinforcement means as described above, during the former data are the non-classes.dex files in former APK
Data;
It is described that consolidation process is carried out to the former APK, target APK is generated, including:
The predeterminated position according to encryption data in target APK, encryption data is added to the corresponding position in former APK
Put;
Other files in former APK after by addition in addition to the former data carry out repacking signature, generate target
APK。
Preferably, reinforcement means as described above, if the predeterminated position is in the classes.dex files of target APK
Position, it is described by addition after former APK in other files in addition to the former data carry out repacking signature, generate mesh
Mark APK, including:
Recalculate and update addition encryption data after former APK classes.dex files File header information, obtain
A classes.dex files after renewal;
Other files in addition to the former data of first classes.dex files and original APK are repacked
Signature, generation target APK.
Preferably, reinforcement means as described above, the former data are the data in the classes.dex files of former APK;
It is described that consolidation process is carried out to the former APK, target APK is generated, including:
Original position information of the former data of record in the classes.dex files of former APK;
The predeterminated position according to encryption data in target APK, encryption data and the original position information are added
To the correspondence position in former APK;
The described former data in the classes.dex files of original APK are deleted, the 2nd classes.dex files are obtained;
The File header information of the 2nd classes.dex files is recalculated and updated, the 3rd classes.dex texts are obtained
Part;
Other files in addition to its classes.dex file of 3rd classes.dex files and original APK are carried out again
Packing signature, generation target APK.
A kind of bracing means of APK file is additionally provided in one embodiment of the invention, and the device includes:
Encryption data generation module, need former data to be protected in former APK to be reinforced, by the former data for obtaining
It is encrypted, obtains encryption data;
Target APK generation modules, for carrying out consolidation process to the former APK, generate target APK, wherein, the encryption
Data are stored in the predeterminated position of the target APK with document form.
In one embodiment of the invention, a kind of dynamic loading method of reinforcing APK is additionally provided, wherein, it is described to add
Gu APK is the target APK generated using the reinforcement means of any of the above-described APK file, the dynamic loading method includes:
Decompress the target APK;
According to storage location of the encryption data in target APK, the encryption data is extracted, and encryption data is solved
It is close to obtain former data;
According to the target APK after the former data and decompression, by dex Classloaders to the classes.dex of target APK
File carries out dynamic load.
Preferably, dynamic loading method as described above, if the former data are the classes.dex files in former APK
In data, it is described according to encryption data in the storage location of target APK, extract the encryption data, also include:Obtain encryption
The original position information of the former data corresponding to data;
The target APK according to after the former data and decompression, by dex Classloaders to target APK's
Classes.dex files carry out dynamic load, including:
According to the original position-information of the former data, the former data are put back into the 3rd classes.dex files
Correspondence position, obtain the complete classes.dex files of target APK;
Dynamic load is carried out to the complete classes.dex files of target APK by dex Classloaders.
Preferably, dynamic loading method as described above, it is described by dex Classloaders to the complete of target APK
Classes.dex files carry out dynamic load, including:
After the complete classes.dex files Central Plains data are loaded into memory headroom, delete described complete
Described former data in classes.dex files.
In one embodiment of the invention, a kind of dynamic loading device of reinforcing APK, the dynamic load are additionally provided
Device includes:
Target APK decompression modules, for decompressing the target APK;
Former data extraction module, for the storage location according to encryption data in target APK, extracts the encryption number
According to, and encryption data is decrypted obtains former data;
APK dlm (dynamic loading module)s, for according to the target APK after the former data and decompression, by dex Classloaders pair
The classes.dex files of target APK carry out dynamic load.
Preferably, dynamic loading device as described above, if the former data are the classes.dex files in former APK
In data, the former data extraction module be additionally operable to obtain encryption data corresponding to former data original position information;
The APK dlm (dynamic loading module)s include:
The former data for the original position-information according to the former data, are put back into the by complete dex acquiring units
Correspondence position in three classes.dex files, obtains the complete classes.dex files of target APK;
Dex dynamic load units, for the entering to the complete classes.dex files of target APK by dex Classloaders
Mobile state is loaded.
Preferably, dynamic loading device as described above, the dex dynamic loads unit also includes:
Former data delete subelement, and internal memory is loaded into for the former data in the complete classes.dex files
After in space, the described former data in the complete classes.dex files are deleted.
The beneficial effects of the present invention are:The reinforcement means and device and dynamic of the APK provided in the embodiment of the present invention
Loading method and device, after it will run the indispensable former data encryption treatment of APK, hide and are stored in target APK texts
In predeterminated position in part, when APK runs, the storage location of file according to encryption data in target APK finds described
The encryption data of predetermined position, to complete the whole dynamic load operating process of APK, provided in the embodiment of the present invention
Method and apparatus, the storage that improve encryption data is disguised, increased the difficulty of decompiling, dramatically improves
The security of APK file.In another embodiment of the invention, the reinforcement means generation target that load operating the present embodiment is provided
During APK, if former data are loaded into internal memory, the former data can also be deleted after loading is complete, further avoided
Former data are stolen, and improve APK decompiling difficulty.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, accompanying drawing is only limitted to show the purpose of preferred embodiment, and is not considered as limitation of the invention, and
For those of ordinary skill in the art, on the premise of not paying creative work, can also be obtained according to these accompanying drawings
Other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the reinforcement means of the APK file in one embodiment of the invention;
Fig. 2 is the structural representation of the dex files of the former APK in one embodiment of the invention;
Fig. 3 is the structural representation of the dex files of the target APK in one embodiment of the present of invention;
Fig. 4 is a kind of structural representation of the bracing means of the APK file in one embodiment of the present of invention;
Fig. 5 is the structural representation of the target APK generation modules in one embodiment of the present of invention;
Fig. 6 is the structural representation of the target APK generation modules in one embodiment of the present of invention;
Fig. 7 is a kind of schematic flow sheet of the dynamic loading method of the reinforcing APK in one embodiment of the present of invention;
Fig. 8 is a kind of structural representation of the dynamic loading device of the reinforcing APK in one embodiment of the present of invention;
Fig. 9 is the structural representation of the APK dlm (dynamic loading module)s in one embodiment of the present of invention;
Figure 10 is the structural representation of the APK dlm (dynamic loading module)s in one embodiment of the present of invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiments of the invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example is applied, the scope of protection of the invention is belonged to.
Fig. 1 shows a kind of schematic flow sheet of the reinforcement means of the APK file provided in one embodiment of the present of invention,
As can be seen from Figure, the method can mainly include following steps:
Step S110:Obtain and need former data to be protected in former APK to be reinforced;
Step S120:The former data are encrypted, encryption data is obtained;
Step S130:Consolidation process is carried out to the former APK, target APK is generated, the encryption data is deposited with document form
It is stored in the predeterminated position of the target APK.
For convenience, in embodiments of the invention, APK to be reinforced is designated as former APK, former APK is reinforced
The APK generated after treatment is designated as target APK.
The reinforcement means provided in the present embodiment, it is first determined need the former data protected, the former number
According to referring to indispensable data for being run to APK, that is, essential data during decompiling APK.Specific choosing
Which data is selected as former data, can be determined according to actual needs, can be relevant with the classes.dex files of former APK
Data, or the data unrelated with the classes.dex files of former APK.For example, in practical operation, developer people
Member can identify the content for intentionally getting protection by explaining, when APK reinforcings are carried out, you can to determine according to explaining
Data to be protected is needed in original APK.
Determine after needing former data to be protected, decompiling treatment is carried out by former APK, extract former data.By original
Data are encrypted, and when obtaining encryption data, can as needed select a kind of arbitrary cipher mode.Obtain encrypting number
According to rear, according to encryption data, consolidation process is carried out to former APK file, obtain target APK, make encryption data final with file shape
Formula is stored in the predeterminated position of the target APK.
The reinforcement means that the present embodiment is provided, is stored and target APK by will run the essential file encryptions of APK
Predeterminated position in, the storage that improve encryption data is disguised, increased the difficulty of decompiling, improves the peace of APK file
Quan Xing.
In one embodiment of the invention, the predeterminated position is the position in the classes.dex files of target APK
Put.
In one embodiment of the invention, the predeterminated position is the file header of the classes.dex files of target APK
Header and/or N number of specified location of data field, N >=1.
That is, the final encryption data present in the classes.dex files of target APK can be one or
Multiple, the number N of specified location is determined that specifically choosing several and which position can be according to reality by the number of encryption data
Need to determine.
In one embodiment of the invention, the N=1, now, the specified location can be target APK's
The head of the data field of classes.dex files, that is, the classes.dex files of target APK file header header
Afterbody.
In one embodiment of the invention, the N=2, i.e., described specified location includes the first specified location and second
Specified location, now, the encryption data includes the first encryption data and the second encryption data, and the first encryption data is in target
Position in the classes.dex files of APK is first specified location, and the second encryption data is target APK's
Position in classes.dex files is second specified location.First specified location and the second specified location can be with roots
Factually border it needs to be determined that.
In one embodiment of the invention, first specified location is the head of the data field, and described second refers to
Positioning is set to the afterbody of the data field.
Wherein, first encryption data and the second encryption data can be respectively to needing two to be protected in former APK
Divided data is encrypted obtains respectively, i.e., identified to need the former data to include the first former data and the second former data;
Can be to APK in protection in need former data be encrypted after the encryption data that obtains reprocess
Arrive, i.e. the first encryption data and the second encryption data can be directly to being obtained after former data encryption, it is also possible to encryption data
Reprocessed, specifically how to process to be set according to actual needs.Likewise, can also be the encryption data
Can be with multiple, now specified location also corresponds to multiple.
In one embodiment of the invention, the former data are the number in the non-classes.dex files in former APK
According to that is, former data are unrelated with the data in the dex files of original APK, for example, former data can be the program global configuration of former APK
Run in indispensable data or data cube computation library directory lib when APK runs in file AndroidManifest.xml
During operation indispensable data, or when APK runs required some key informations used or other with
The application program of APK runs relevant data.
It is described right in step S130 when the data in the non-classes.dex files during the former data are former APK
The former APK carries out consolidation process, generates target APK, including:
The predeterminated position according to encryption data in target APK, encryption data is added to the corresponding position in former APK
Put;
Other files in former APK after by addition in addition to the former data carry out repacking signature, generate target
APK。
In one embodiment of the invention, if the predeterminated position is the position in the classes.dex files of target APK
Put, then it is described by addition after former APK in other files in addition to the former data carry out repacking signature, generate target
APK, including:
Recalculate and update addition encryption data after former APK classes.dex files File header information, obtain
A classes.dex files after renewal;
Other files in addition to the former data of first classes.dex files and original APK are repacked
Signature, generation target APK.
In the present embodiment, because former data are the data unrelated with the classes.dex of former APK, therefore, encryption data exists
Position in the classes.dex files of target APK be corresponding in the classes.dex files of original APK, will encryption
After data are added to the classes.dex files of former APK, for the classes.dex files after addition encryption data, it is only necessary to
Its File header information is recalculated and updated again, and the new classes.dex files that then will be obtained replace the former dex of original APK
File, and repack signature, generation target APK with other files in addition to former data of former APK.
Wherein, the required File header information for recalculating and updating and encryption data store target APK position
It is relevant, if for example, encryption data with file store target APK dex files file header header afterbody, if now plus
Ciphertext data file then needs the File header information for updating to include the total length of dex files as a part for file header
Filesize and file header size headersize, if now data file encryption needs more as a part for data field
Information in new file header then each offset address off fields in total length filesize and file header including dex files
Information etc.;If encryption data is stored in the afterbody of the data field of dex files with file, the information in the file header for updating is needed
Then include the total length filesize of dex files.The target APK generated using the reinforcement means in the present embodiment, its
Classes.dex files are a described classes.dex files.
For example, in one embodiment of the invention, Fig. 2 shows a structure for the classes.dex files of original APK
Schematic diagram, including file header header and data field (ellipsis part) two large divisions, the classes.dex files of former APK
Total length is fileSize, and file header size is headerSize, it is assumed that predeterminated position is encryption data depositing in target APK
Storage space be set to the file header header of the classes.dex files of target APK afterbody (in figure data size/off positions it
Afterwards), then the structural representation of the classes.dex files of target APK as shown in Figure 3, wherein, extra data are encryption
Data, encryption data is located at the afterbody of the file header header of the classes.dex files of target APK, and the position is with original APK's
Position in classes.dex files is identical, now, the total length of the dex files in file header header after renewal
It is the fileSize+extraSize (length of encryption data) of former APK, file header size is headerSize+extraSize,
Dex files after renewal are replaced the former dex files of original APK, is carried out again with other files in addition to former data in former APK
Packing signature, completes the generation of target APK.
It should be noted that the English field information in Fig. 2 and Fig. 3 is the general information of Android dex files, to ability
It is clearly, no longer to illustrate one by one herein for field technique personnel.
In one embodiment of the invention, the former data are the data in the classes.dex files of former APK, this
When, it is described that consolidation process is carried out to the former APK in step S130, target APK is generated, including:
Original position information of the former data of record in the classes.dex files of former APK;
The predeterminated position according to encryption data in target APK, encryption data and the original position information are added
To the correspondence position in former APK;
The described former data in the classes.dex files of original APK are deleted, the 2nd classes.dex files are obtained;
The File header information of the 2nd classes.dex files is recalculated and updated, the 3rd classes.dex texts are obtained
Part;
Other files in addition to its classes.dex file of 3rd classes.dex files and original APK are carried out again
Packing signature, generation target APK.
In the present embodiment, because former data are the data in dex files, in order to ensure that follow-up APK file can normally add
Carrying row, needs to restore the dex files of completion first in load operating, accordingly, it would be desirable to record the confidence in situ of former data
Breath.The target APK generated using the reinforcement means provided in the present embodiment, its classes.dex file is the described 3rd
Classes.dex files.
In the present embodiment, in a schematic diagram for the dex files of original APK shown in Fig. 2, it is necessary to protection data
I.e. former data are a part of data therein, specifically which part data, can be selected as needed, can be file headers
The data in the data field not shown in data and/or Fig. 2 in header.For example, it is assumed that the former data are in Fig. 2
Data (data of ellipsis part, the function generation in the classes.dex files of former APK in the whole data field of dex files
Code), by the partial data encrypt after, it is assumed that it is determined that encryption data position for target APK classes.dex files number
It is the afterbody of file header header according to the head in area, then adds the original position-information of encryption data and its corresponding former data
To the lower section of the datasize/off positions shown in Fig. 2, and the data field in the dex files of former APK is deleted, after updating modification
Dex files File header information, then the dex files after renewal are replaced the former dex of original APK, with former APK except dex is literary
Other parts outside part are signed packing again, obtain target APK, when APK is run, then first in the number of dex files
Encryption data is extracted according to the lower section that area's head is datasize/off, then decryption obtains the data of data field, and according to original position
Confidence breath is added to data zone position, obtains complete dex files.
The reinforcement means of the APK provided in the embodiment of the present invention, is entered by will run the indispensable former data of APK
After row encryption, encryption data is hidden in the specified location being stored in target APK file, when APK runs, exist first
The specified location in target APK finds encryption data, to complete the whole load operating process of APK.Using the reinforcing
Method, the storage that improve encryption data is disguised, increased the difficulty of decompiling, dramatically improves APK file
Security.
In one embodiment of the invention, a kind of bracing means of APK file is additionally provided, as shown in figure 4, described add
It is fixedly mounted with and puts including encryption data generation module 110 and target APK generation modules 120.Wherein:
Encryption data generation module 110, need former data to be protected in former APK to be reinforced, by the original for obtaining
Data are encrypted, and obtain encryption data;
Target APK generation modules 120, for carrying out consolidation process to the former APK, generate target APK, wherein, it is described
Encryption data is stored in the predeterminated position of the target APK with document form.
Using the bracing means provided in the present embodiment, the APK application programs under Android can be carried out at reinforcing
Reason, is hidden in the predeterminated position of target APK after making former data encryption necessary to operation APK with document form, can effectively be advised
The decompiling of the reverse instruments of Android is kept away, increases the difficulty of decompiling, improve the security of target APK.
In one embodiment of the invention, the predeterminated position can be in the classes.dex files of target APK
Position.
In one embodiment of the invention, the file header of the classes.dex files for being preset as target APK and/
Or N number of specified location of data field, N >=1.In actual applications, specifically chosen several specified locations and specific selecting file
Where head or data field can be selected according to actual needs.
In one embodiment of the invention, the N=1, the specified location is the head or afterbody of the data field.
In one embodiment of the invention, the N=2, i.e., described specified location includes the first specified location and second
Specified location, corresponding, the encryption data includes the first encryption data and the second encryption data, now, the first encryption data
Position in the classes.dex files of target APK is first specified location, and the second encryption data is target APK's
Position in classes.dex files is second specified location.
In one embodiment of the invention, first specified location is the head i.e. dex files of the data field
The afterbody of file header header, second specified location is the afterbody of the data field.
In one embodiment of the invention, the former data can be the number in the non-classes.dex files of original APK
According to.Now, the target APK generation modules 120 can include that the first encryption data inserts unit 121 and first object APK lifes
Into unit 122, as shown in Figure 5.Wherein:
First encryption data inserts unit 121, and the predeterminated position according to encryption data in target APK will be encrypted
Data are added to the correspondence position in former APK;
First object APK generation units 122, for other texts in the former APK after by addition in addition to the former data
Part carries out repacking signature, generation target APK.
In one embodiment of the invention, if the predeterminated position is the position in the classes.dex files of target APK
Put, the first object APK generation units 122 include that target dex generates subelement and target APK generation subelements.Wherein:
Target dex generates subelement, for recalculating and updates the former APK after addition encryption data
The File header information of classes.dex files, the classes.dex files after being updated;
Target APK generates subelement, for by a classes.dex files and original APK in addition to the former data
Other files repack signature, generation target APK.
In one embodiment of the invention, the former data can be the number in the classes.dex files of original APK
According to;Now, the target APK generation modules 120 include original position recording unit 123, the second encryption data insertion unit 124,
Former data delete unit 125, target dex generation units 126 and the second target APK generation units 127, as shown in Figure 6.Wherein:
Original position recording unit 123, for recording in situ confidence of the former data in the classes.dex files of former APK
Breath;
Second encryption data inserts unit 124, for the predeterminated position according to encryption data in target APK, will
Encryption data and the original position information are added to the correspondence position in former APK;
Former data delete unit 125, for the described former data in the classes.dex files for deleting former APK, obtain the
Two classes.dex files;
Target dex generation units 126, for recalculating and update the File header information of the 2nd classes.dex files,
Obtain the 3rd classes.dex files;
Second target APK generation units 127, for by the 3rd classes.dex files and original APK except it
Other files outside classes.dex files carry out repacking signature, generation target APK.
In one embodiment of the invention, a kind of dynamic loading method of reinforcing APK is additionally provided, wherein, it is described to add
Gu APK is the target APK, Fig. 7 generated using the reinforcement means of APK in any of the above-described embodiment or bracing means shows this hair
A kind of flow chart of the dynamic loading method of the reinforcing APK in bright one embodiment, the dynamic loading method includes following step
Suddenly:
Step S710:Decompress the target APK;
Step S720:According to encryption data in the storage location of target APK, the encryption data is extracted, and to encryption
Data are decrypted and obtain former data;
Step S730:According to the target APK after the former data and decompression, by dex Classloaders to target APK's
Classes.dex files carry out dynamic load.
Loading method provided in the present embodiment, decompresses target APK first, and APK file refers to the compression of zip forms
Bag, apk after simply suffix name is changed therefore, it can be obtained by decompression the catalogue file of APK file, and basis adds after decompression
Storage location (predeterminated position i.e. hereinbefore) of the ciphertext data in target APK, you can extraction obtains the encryption data,
Treatment is decrypted to encryption data and obtains corresponding former data.The manner of decryption of the decryption processing is to be generated with encryption data
The cipher mode of Shi Caiyong is corresponding.After decryption obtains former data, just can be led to according to the target APK after former data and decompression
The classes.dex files for crossing the dex Classloader DexClassLoader classes completion target APK of Android API offers add
Carrying row.Wherein, specific load operating step has all differences according to the difference of former data.
In one embodiment of the invention, if the former data are the data in the non-classes.dex files of former APK
When, encryption data is extracted from dex, after decryption encryption data obtains former data, just with reference to former data and the dex of target APK
The operation of file other data completion APK.According to the difference of former data, former data participate in also different, example the step of APK runs
Such as, it is assumed that former data are the dynamic base .so files of former APK, then dex Classloaders DexClassLoader classes are loading dex's
During, it is necessary to call the former data can to complete the loading of dex.
In one embodiment of the invention, if the former data are the number in the classes.dex files in former APK
According to the storage location according to encryption data in target APK extracts the encryption data, also includes:Obtain encryption number
According to the original position information of corresponding former data;Now, according to the target APK after the former data and decompression, added by dex classes
Carry out dynamic load of the device to the classes.dex files of target APK is carried, including:
According to the original position-information of the former data, the former data are put back into the 3rd classes.dex files
Correspondence position, obtain the complete classes.dex files of target APK;
Dynamic load is carried out to the complete classes.dex files of target APK by dex Classloaders.
Due to the data in dex files that former data are former APK, therefore, in order to the normal load for ensureing target APK is transported
Row, it is necessary to restore the dex files of completion, then complete adding for dex files by dex Classloader DexClassLoader classes first
Carry.
In one embodiment of invention, if the former data are the data in the classes.dex files in former APK,
It is described by dex Classloaders to when the carrying out dynamic load of complete classes.dex files of target APK, when described complete
After classes.dex files Central Plains data are loaded into memory headroom, the institute in the complete classes.dex files is deleted
State former data.
In the present embodiment, because former data are the data in dex files, therefore can be loaded into memory headroom, work as original
Data have been loaded and have stored to after memory headroom, are deleted from complete classes.dex files by by the former data, enter one
Step avoids the instruments such as dexdump can steal the risk of former data from internal memory.
Corresponding to the dynamic loading method shown in Fig. 7, a kind of reinforcing is additionally provided in one embodiment of the invention
The dynamic loading device of APK, as shown in figure 8, the dynamic loading device includes that target APK decompression modules 810, former data extract mould
Block 820 and APK dlm (dynamic loading module)s 830.Wherein:
Target APK decompression modules 810, for decompressing the target APK;
Former data extraction module 820, for the storage location according to encryption data in target APK, extracts the encryption
Data, and encryption data is decrypted obtains former data;
APK dlm (dynamic loading module)s 830, for according to the target APK after the former data and decompression, being loaded by dex classes
Device carries out dynamic load to the classes.dex files of target APK.
In one embodiment of the invention, if the former data are the number in the classes.dex files in former APK
According to the former data extraction module 820 is additionally operable to obtain the original position information of the former data corresponding to encryption data;Now, institute
Stating APK dlm (dynamic loading module)s 830 includes complete dex acquiring units 831 and dex dynamic loads unit 832, as shown in Figure 9.Its
In:
Complete dex acquiring units 831, for the original position-information according to the former data, the former data are put back to
To the correspondence position in the 3rd classes.dex files, the complete classes.dex files of target APK are obtained;
Dex dynamic loads unit 832, for by dex Classloaders to the complete classes.dex files of target APK
Carry out dynamic load.
In one embodiment of the invention, the dex dynamic loads unit 832 can also include that former data delete son list
Unit 8321, as shown in Figure 10.Wherein:
The former data delete subelement 8321, are added for the former data in the complete classes.dex files
After being downloaded in memory headroom, the described former data in the complete classes.dex files are deleted.
The reinforcement means and device and dynamic loading method and device of the APK file provided in the embodiment of the present invention,
Suitable for numerous general or special purpose computing system environments and configuration, including but not limited to personal computer, server, hand
Holding equipment or portable set, laptop device, the electronic equipment based on Android system etc..
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality
Body or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or deposited between operating
In any this actual relation or order.And, term " including ", "comprising" or its any other variant be intended to
Nonexcludability is included, so that process, method, article or equipment including a series of key elements not only will including those
Element, but also other key elements including being not expressly set out, or also include being this process, method, article or equipment
Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that
Also there is other identical element in process, method, article or equipment including the key element.
Each embodiment in this specification is described by the way of correlation, identical similar portion between each embodiment
Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.Especially for device reality
Apply for example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method
Part explanation.
One of ordinary skill in the art will appreciate that realizing that all or part of each several part in said apparatus implementation method can
Realized with hardware, or realized with the software module run on one or more hardware, it is complete in method implementation method
Portion or part steps can be by program to instruct the hardware of correlation to complete.It will be understood by those skilled in the art that this hair
Bright described method and apparatus are not limited to the embodiment described in specific embodiment, and specific descriptions above are intended merely to solution
The purpose of the present invention is released, the present invention is not intended to limit.Those skilled in the art's technology according to the present invention scheme draws other
Implementation method, also belong to technological innovation scope of the invention, protection scope of the present invention is by claim and its equivalent
Limit.
Embodiment of the invention discloses that:A1, a kind of reinforcement means of APK file, the method include:
Obtain and need former data to be protected in former APK to be reinforced;
The former data are encrypted, encryption data is obtained;
Consolidation process is carried out to the former APK, target APK is generated, wherein, the encryption data is stored in document form
The predeterminated position of the target APK.
A2, the reinforcement means according to A1, the predeterminated position are the position in the classes.dex files of target APK
Put.
A3, the reinforcement means according to A2, the predeterminated position are the file of the classes.dex files of target APK
Head and/or N number of specified location of data field, N >=1.
A4, the reinforcement means according to A3, the N=1, the specified location is the head or tail of the data field
Portion.
A5, the reinforcement means according to A3, the N=2;The encryption data includes that the first encryption data and second adds
Ciphertext data;
The specified location includes the first specified location and the second specified location, and the first encryption data is target APK's
Position in classes.dex files is first specified location, classes.dex of second encryption data in target APK
Position in file is second specified location.
A6, the reinforcement means according to A5, first specified location are the head of the data field, and described second refers to
Positioning is set to the afterbody of the data field
A7, the reinforcement means according to A1, the former data are the number in the non-classes.dex files in former APK
According to;
It is described that consolidation process is carried out to the former APK, target APK is generated, including:
The predeterminated position according to encryption data in target APK, encryption data is added to the corresponding position in former APK
Put;
Other files in former APK after by addition in addition to the former data carry out repacking signature, generate target
APK。
A8, the reinforcement means according to A7, if the predeterminated position is in the classes.dex files of target APK
Position, it is described by addition after former APK in other files in addition to the former data carry out repacking signature, generate target
APK, including:
Recalculate and update addition encryption data after former APK classes.dex files File header information, obtain
A classes.dex files after renewal;
Other files in addition to the former data of first classes.dex files and original APK are repacked
Signature, generation target APK.
A9, the reinforcement means according to A1, the former data are the data in the classes.dex files of former APK;
It is described that consolidation process is carried out to the former APK, target APK is generated, including:
Original position information of the former data of record in the classes.dex files of former APK;
The predeterminated position according to encryption data in target APK, encryption data and the original position information are added
To the correspondence position in former APK;
The described former data in the classes.dex files of original APK are deleted, the 2nd classes.dex files are obtained;
The File header information of the 2nd classes.dex files is recalculated and updated, the 3rd classes.dex texts are obtained
Part;
Other files in addition to its classes.dex file of 3rd classes.dex files and original APK are carried out again
Packing signature, generation target APK.
Disclosed in embodiments of the invention:B10, a kind of bracing means of APK file, including:
Encryption data generation module, need former data to be protected in former APK to be reinforced, by the former data for obtaining
It is encrypted, obtains encryption data;
Target APK generation modules, for carrying out consolidation process to the former APK, generate target APK, wherein, the encryption
Data are stored in the predeterminated position of the target APK with document form.
B11, the bracing means according to B10, the predeterminated position is in the classes.dex files of target APK
Position.
B12, the bracing means according to B11, the predeterminated position are the text of the classes.dex files of target APK
Part head and/or N number of specified location of data field, N >=1.
B13, the bracing means according to B12, the N=1, the specified location is the head or tail of the data field
Portion.
B14, the bracing means according to B12, the N=2;The encryption data includes the first encryption data and second
Encryption data;
The specified location includes the first specified location and the second specified location, and the first encryption data is target APK's
Position in classes.dex files is first specified location, classes.dex of second encryption data in target APK
Position in file is second specified location.
B15, the bracing means according to B14, first specified location are the head of the data field, described second
Specified location is the afterbody of the data field.
B16, the bracing means according to 10, the former data are the number in the non-classes.dex files in former APK
According to;
The target APK generation modules include:
First encryption data inserts unit, for the predeterminated position according to encryption data in target APK, will encrypt
Data are added to the correspondence position in former APK;
First object APK generation units, enter for other files in the former APK after by addition in addition to the former data
Row repacks signature, generation target APK.
B17, the bracing means according to B16, if the predeterminated position is in the classes.dex files of target APK
Position, the first object APK generation units include:
Target dex generates subelement, for recalculating and updates the former APK after addition encryption data
The File header information of classes.dex files, the classes.dex files after being updated;
Target APK generates subelement, for by a classes.dex files and original APK in addition to the former data
Other files repack signature, generation target APK.
B18, the bracing means according to B10, the former data are the data in the classes.dex files of former APK;
The target APK generation modules include:
Original position recording unit, for recording original position information of the former data in the classes.dex files of former APK;
Second encryption data inserts unit, for the predeterminated position according to encryption data in target APK, will encrypt
Data and the original position information are added to the correspondence position in former APK;
Former data delete unit, for the described former data in the classes.dex files for deleting former APK, obtain second
Classes.dex files;
Target dex generation units, for recalculating and update the File header information of the 2nd classes.dex files, obtain
To the 3rd classes.dex files;
Second target APK generation units, for by the 3rd classes.dex files and original APK except its classes.dex
Other files outside file carry out repacking signature, generation target APK.
Disclosed in embodiments of the invention:C19, a kind of dynamic loading method of reinforcing APK, the reinforcing APK are to adopt
The target APK generated with the reinforcement means of any APK file in A1-A9, the dynamic loading method includes:
Decompress the target APK;
According to encryption data in the storage location of target APK, the encryption data is extracted, and encryption data is decrypted
Obtain former data;
According to the target APK after the former data and decompression, by dex Classloaders to the classes.dex of target APK
File carries out dynamic load.
C20, the dynamic loading method according to C19, if the former data are the classes.dex files in former APK
In data, it is described according to encryption data in the storage location of target APK, extract the encryption data, also include:Obtain encryption
The original position information of the former data corresponding to data;
The target APK according to after the former data and decompression, by dex Classloaders to target APK's
Classes.dex files carry out dynamic load, including:
According to the original position-information of the former data, the former data are put back into the 3rd classes.dex files
Correspondence position, obtain the complete classes.dex files of target APK;
Dynamic load is carried out to the complete classes.dex files of target APK by dex Classloaders.
C21, the dynamic loading method according to C20, it is described by dex Classloaders to the complete of target APK
Classes.dex files carry out dynamic load, including:
After former data in the complete classes.dex files are loaded into memory headroom, delete described complete
Described former data in classes.dex files
Disclosed in embodiments of the invention:D22, a kind of dynamic loading device of reinforcing APK, including:
Target APK decompression modules, for decompressing the target APK;
Former data extraction module, for the storage location according to encryption data in target APK, extracts the encryption number
According to, and encryption data is decrypted obtains former data;
APK dlm (dynamic loading module)s, for according to the target APK after the former data and decompression, by dex Classloaders pair
The classes.dex files of target APK carry out dynamic load.
D23, the dynamic loading device according to D22, if the former data are the classes.dex files in former APK
In data, the former data extraction module be additionally operable to obtain encryption data corresponding to former data original position information;
The APK dlm (dynamic loading module)s include:
The former data for the original position-information according to the former data, are put back into the by complete dex acquiring units
Correspondence position in three classes.dex files, obtains the complete classes.dex files of target APK;
Dex dynamic load units, for the entering to the complete classes.dex files of target APK by dex Classloaders
Mobile state is loaded.
D24, the dynamic loading device according to D23, the dex dynamic loads unit include:
Former data delete subelement, and internal memory is loaded into for the former data in the complete classes.dex files
After in space, the described former data in the complete classes.dex files are deleted.
Obviously, those skilled in the art can carry out various changes and modification without deviating from essence of the invention to the present invention
God and scope.So, if these modifications of the invention and modification belong to the scope of the claims in the present invention and its equivalent technology
Within, then the present invention is also intended to comprising these changes and modification.
Claims (10)
1. a kind of reinforcement means of APK file, it is characterised in that including:
Obtain and need former data to be protected in former APK to be reinforced;
The former data are encrypted, encryption data is obtained;
Consolidation process is carried out to the former APK, target APK is generated, wherein, the encryption data is stored in described with document form
The predeterminated position of target APK.
2. reinforcement means according to claim 1, it is characterised in that the predeterminated position is target APK's
Position in classes.dex files.
3. reinforcement means according to claim 2, it is characterised in that the predeterminated position is target APK's
The file header of classes.dex files and/or N number of specified location of data field, N >=1.
4. reinforcement means according to claim 3, it is characterised in that:The N=1, the specified location is the data
The head or afterbody in area.
5. reinforcement means according to claim 3, it is characterised in that the N=2;The encryption data includes that first adds
Ciphertext data and the second encryption data;
The specified location includes the first specified location and the second specified location, and the first encryption data is target APK's
Position in classes.dex files is first specified location, classes.dex of second encryption data in target APK
Position in file is second specified location.
6. reinforcement means according to claim 1, it is characterised in that:The former data are non-in former APK
Data in classes.dex files;
It is described that consolidation process is carried out to the former APK, target APK is generated, including:
The predeterminated position according to encryption data in target APK, the correspondence position in former APK is added to by encryption data;
Other files in former APK after by addition in addition to the former data carry out repacking signature, generation target APK.
7. reinforcement means according to claim 1, it is characterised in that the former data are the classes.dex texts of former APK
Data in part;
It is described that consolidation process is carried out to the former APK, target APK is generated, including:
Original position information of the former data of record in the classes.dex files of former APK;
The predeterminated position according to encryption data in target APK, original is added to by encryption data and the original position information
Correspondence position in APK;
The described former data in the classes.dex files of original APK are deleted, the 2nd classes.dex files are obtained;
The File header information of the 2nd classes.dex files is recalculated and updated, the 3rd classes.dex files are obtained;
Other files in addition to its classes.dex file of 3rd classes.dex files and original APK are repacked
Signature, generation target APK.
8. a kind of bracing means of APK file, it is characterised in that including:
Encryption data generation module, need former data to be protected in former APK to be reinforced for being obtained, and the former data are carried out
Encryption, obtains encryption data;
Target APK generation modules, for carrying out consolidation process to the former APK, generate target APK, wherein, the encryption data
The predeterminated position of the target APK is stored in document form.
9. a kind of dynamic loading method of reinforcing APK, it is characterised in that the reinforcing APK is using any in claim 1-7
The target APK of the reinforcement means generation of APK file, the dynamic loading method includes:
Decompress the target APK;
According to storage location of the encryption data in target APK, the encryption data is extracted, and encryption data is decrypted
To former data;
According to the target APK after the former data and decompression, by dex Classloaders to the classes.dex files of target APK
Carry out dynamic load.
10. a kind of dynamic loading device of reinforcing APK, it is characterised in that including:
Target APK decompression modules, for decompressing the target APK;
Former data extraction module, for the storage location according to encryption data in target APK, extracts the encryption data, and
Encryption data is decrypted and obtains former data;
APK dlm (dynamic loading module)s, for according to the target APK after the former data and decompression, by dex Classloaders to target
The classes.dex files of APK carry out dynamic load.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611139477.3A CN106845167A (en) | 2016-12-12 | 2016-12-12 | The reinforcement means and device of a kind of APK, and dynamic loading method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611139477.3A CN106845167A (en) | 2016-12-12 | 2016-12-12 | The reinforcement means and device of a kind of APK, and dynamic loading method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106845167A true CN106845167A (en) | 2017-06-13 |
Family
ID=59139916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611139477.3A Pending CN106845167A (en) | 2016-12-12 | 2016-12-12 | The reinforcement means and device of a kind of APK, and dynamic loading method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106845167A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107480479A (en) * | 2017-08-15 | 2017-12-15 | 北京奇虎科技有限公司 | Reinforcement means and device, computing device, the computer-readable storage medium of application program |
CN107820129A (en) * | 2017-11-16 | 2018-03-20 | 四川长虹电器股份有限公司 | A kind of automatic method for safeguarding smart machine application data bag |
CN108090368A (en) * | 2017-12-20 | 2018-05-29 | 北京小牛互联科技有限公司 | The guard method of APK program files and system |
CN108985017A (en) * | 2018-09-26 | 2018-12-11 | 北京京东金融科技控股有限公司 | The reinforcement means and device of application program |
CN109086063A (en) * | 2018-07-27 | 2018-12-25 | 中国联合网络通信集团有限公司 | Oftware updating method, file encrypting method, device and storage medium |
CN109409039A (en) * | 2018-10-24 | 2019-03-01 | 北京奇虎科技有限公司 | The method and device reinforced for the compression data packet comprising resource file |
CN109598107A (en) * | 2018-11-20 | 2019-04-09 | 江苏通付盾信息安全技术有限公司 | A kind of code conversion method and device based on application installation package file |
CN110427756A (en) * | 2019-06-20 | 2019-11-08 | 中国人民解放军战略支援部队信息工程大学 | Android malware detection method and device based on capsule network |
CN110769008A (en) * | 2019-11-05 | 2020-02-07 | 长沙豆芽文化科技有限公司 | Data security protection method and device and service equipment |
CN112084469A (en) * | 2020-08-06 | 2020-12-15 | 华帝股份有限公司 | Encryption method for preventing application program from being reverse engineered |
CN112115496A (en) * | 2020-09-27 | 2020-12-22 | 万兴科技集团股份有限公司 | Data decryption mode identification method and device, computer equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
CN104317625A (en) * | 2014-11-09 | 2015-01-28 | 刘鹏 | Dynamic loading method for APK files |
CN104462959A (en) * | 2014-12-04 | 2015-03-25 | 北京奇虎科技有限公司 | Reinforcement protection method, sever and system for android app |
CN106203006A (en) * | 2016-08-31 | 2016-12-07 | 北京鼎源科技有限公司 | Android application reinforcement means based on dex Yu so file Dynamic Execution |
-
2016
- 2016-12-12 CN CN201611139477.3A patent/CN106845167A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
CN104317625A (en) * | 2014-11-09 | 2015-01-28 | 刘鹏 | Dynamic loading method for APK files |
CN104462959A (en) * | 2014-12-04 | 2015-03-25 | 北京奇虎科技有限公司 | Reinforcement protection method, sever and system for android app |
CN106203006A (en) * | 2016-08-31 | 2016-12-07 | 北京鼎源科技有限公司 | Android application reinforcement means based on dex Yu so file Dynamic Execution |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107480479B (en) * | 2017-08-15 | 2020-08-07 | 北京奇虎科技有限公司 | Application program reinforcing method and device, computing equipment and computer storage medium |
CN107480479A (en) * | 2017-08-15 | 2017-12-15 | 北京奇虎科技有限公司 | Reinforcement means and device, computing device, the computer-readable storage medium of application program |
CN107820129A (en) * | 2017-11-16 | 2018-03-20 | 四川长虹电器股份有限公司 | A kind of automatic method for safeguarding smart machine application data bag |
CN108090368A (en) * | 2017-12-20 | 2018-05-29 | 北京小牛互联科技有限公司 | The guard method of APK program files and system |
CN109086063A (en) * | 2018-07-27 | 2018-12-25 | 中国联合网络通信集团有限公司 | Oftware updating method, file encrypting method, device and storage medium |
CN108985017A (en) * | 2018-09-26 | 2018-12-11 | 北京京东金融科技控股有限公司 | The reinforcement means and device of application program |
CN109409039A (en) * | 2018-10-24 | 2019-03-01 | 北京奇虎科技有限公司 | The method and device reinforced for the compression data packet comprising resource file |
CN109598107A (en) * | 2018-11-20 | 2019-04-09 | 江苏通付盾信息安全技术有限公司 | A kind of code conversion method and device based on application installation package file |
CN109598107B (en) * | 2018-11-20 | 2021-02-02 | 江苏通付盾信息安全技术有限公司 | Code conversion method and device based on application installation package file |
CN110427756A (en) * | 2019-06-20 | 2019-11-08 | 中国人民解放军战略支援部队信息工程大学 | Android malware detection method and device based on capsule network |
CN110769008A (en) * | 2019-11-05 | 2020-02-07 | 长沙豆芽文化科技有限公司 | Data security protection method and device and service equipment |
CN112084469A (en) * | 2020-08-06 | 2020-12-15 | 华帝股份有限公司 | Encryption method for preventing application program from being reverse engineered |
CN112115496A (en) * | 2020-09-27 | 2020-12-22 | 万兴科技集团股份有限公司 | Data decryption mode identification method and device, computer equipment and storage medium |
CN112115496B (en) * | 2020-09-27 | 2024-04-12 | 万兴科技集团股份有限公司 | Data decryption pattern recognition method and device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106845167A (en) | The reinforcement means and device of a kind of APK, and dynamic loading method and device | |
CN111143869B (en) | Application package processing method and device, electronic equipment and storage medium | |
CN106295255B (en) | Application program reinforcing method and device | |
WO2016078130A1 (en) | Dynamic loading method for preventing reverse of apk file | |
CN109871704B (en) | Android resource file protection method, equipment and storage medium based on Hook | |
CN106203006A (en) | Android application reinforcement means based on dex Yu so file Dynamic Execution | |
CN106663018A (en) | Method to modify ANDROID application life cycle to control its execution in a containerized workspace environment | |
CN103530535A (en) | Shell adding and removing method for Android platform application program protection | |
CN107070656B (en) | Method and system for encrypting and decrypting so file in application program | |
CN103136458B (en) | A kind of (SuSE) Linux OS dynamic base code protection method and device thereof | |
ES2746127T3 (en) | On-demand code decryption integrity | |
CN104408337A (en) | Reinforcement method for preventing reverse of APK (Android package) file | |
CN107291485B (en) | Dynamic link library reinforcing method, operation method, reinforcing device and safety system | |
US9256756B2 (en) | Method of encryption and decryption for shared library in open operating system | |
CN107040520B (en) | Cloud computing data sharing system and method | |
CN106599629A (en) | Strengthening method and apparatus for Android application program | |
CN104834835A (en) | Universal digital rights protection method under Windows platform | |
CN110620657A (en) | Webpage word processing method, system and device | |
Kim et al. | Android Application Protection against Static Reverse Engineering based on Multidexing. | |
US20220360442A1 (en) | On demand code decryption | |
CN105760721B (en) | A kind of software reinforcement method and system | |
CN116235174A (en) | Apparatus and method for performing encryption algorithm | |
US20230351050A1 (en) | Method and apparatus for custom development of payment application, computer device, and storage medium | |
CN111291001A (en) | Reading method and device of computer file, computer system and storage medium | |
CN113221077B (en) | Class file encryption method and equipment based on spring container |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170613 |
|
RJ01 | Rejection of invention patent application after publication |