CN108259182B - Android application repacking detection method and device - Google Patents

Android application repacking detection method and device Download PDF

Info

Publication number
CN108259182B
CN108259182B CN201810015873.8A CN201810015873A CN108259182B CN 108259182 B CN108259182 B CN 108259182B CN 201810015873 A CN201810015873 A CN 201810015873A CN 108259182 B CN108259182 B CN 108259182B
Authority
CN
China
Prior art keywords
application
authentication information
random number
code
local code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810015873.8A
Other languages
Chinese (zh)
Other versions
CN108259182A (en
Inventor
梁彬
谢斯坷夫
黄建军
石文昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Renmin University of China
Original Assignee
Renmin University of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Renmin University of China filed Critical Renmin University of China
Priority to CN201810015873.8A priority Critical patent/CN108259182B/en
Publication of CN108259182A publication Critical patent/CN108259182A/en
Application granted granted Critical
Publication of CN108259182B publication Critical patent/CN108259182B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Virology (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to an Android application repackaging detection method and device, which comprises the following steps: simulating and calling an API to acquire the credible authentication information by utilizing the interruption which cannot be hijacked at the application level in the application local code; after the authentication information is acquired from the application local code, the repackaging detection can be directly carried out in the application local code; the authentication information can also be transmitted to the upper layer code through a channel enhanced by using random numbers and encryption technology for repackaging detection; after the authentication information is transmitted by the local code by using the random number and the encryption technology, the upper layer code is applied to decrypt the acquired encrypted data to obtain decrypted authentication information and random number, and whether the transmitted data is replayed or not is judged by comparing the decrypted random number with the random number transmitted to the local code. The invention can enable the protected application to effectively resist the re-packaging behavior of bypassing the detection by utilizing API hijacking and replay.

Description

Android application repacking detection method and device
Technical Field
The invention relates to a repacking detection method and device, in particular to a repacking detection method and device for Android applications.
Background
Android applications face a serious repackaging threat. An attacker can unpack the published application by using a repackaging tool, add the code into the application, repackage the signature to generate the repackaged application and publish the repackaged application, so that the attacker pretends to be the original application and obtains benefits. In order to protect itself, some applications introduce code for detecting the repackaging, so that the application can detect the repackaged itself and prevent the application from running after the application is repackaged. Generally, these applications call the API to obtain some application-related authentication information as a basis for the application itself to detect whether to be repackaged. It is common to call an API such as getheadageinfo () to obtain an application signature and then use the signature to detect whether the application is repackaged.
But existing such re-packing detection methods can be bypassed. An attacker can introduce codes into the re-packaged application to hijack the API called by the application before the application calls the API to acquire information required by detection, and then replay information returned by the API when the application is not re-packaged to bypass the re-packaging detection of the application. If hijacking getPackageInfo (), when calling the API to acquire the application signature for detecting the repackaging, the original signature of the application is replayed, and the repackaging detection of the application is bypassed.
Disclosure of Invention
In view of the foregoing problems, an object of the present invention is to provide a method and an apparatus for detecting repackaging of Android applications, which can effectively resist the repackaging behavior of using API hijacking and replay bypass detection.
In order to achieve the purpose, the invention adopts the following technical scheme: an Android application repacking detection method is characterized by comprising the following steps: 1) simulating the process of calling an API to acquire authentication information to acquire credible authentication information of the application by using the interruption which cannot be hijacked at the application level in the application local code, and then entering the step 2) or the step 3) to detect in the application local code or in the application upper layer code; 2) after the authentication information is acquired from the application local code, the repackaging detection is directly carried out in the application local code; 3) after the authentication information is acquired from the application local code, the authentication information is transmitted to an application upper layer code in a random number and encryption mode; 4) and the application upper layer code decrypts the acquired encrypted data to obtain decrypted authentication information and a random number, judges whether the transmitted data is replayed or not by comparing the decrypted random number with the random number transmitted to the application local code, and finally judges whether the application is repackaged or not by the data which is not replayed.
Further, in the step 2), the detection process is as follows: and comparing the acquired authentication information with the authentication information provided by the application developer which is stored in advance, wherein if the acquired authentication information is the same as the authentication information provided by the developer, the application is not repackaged, and otherwise, the application is repackaged.
Further, in the step 3), the process of transmitting the authentication information by using the random number and the encryption method is as follows: 3.1) in the development process or after the development is completed, the application upper layer code generates a random number according to the selected random source, and then transmits the random number to the application local code; and 3.2) after the application local code obtains the credible authentication information of the application, encrypting the authentication information and the random number together to generate data and transmitting the data to the application upper layer code.
Further, in the step 3.1), an element which is related to the specific application main logic and has higher randomness or an element which is internally provided with higher randomness is adopted as a random source for generating random numbers.
Further, in the step 4), it is determined whether the transmitted data is replayed, where r is a random number transmitted by the application upper layer code to the application local code, r 'is a decrypted random number, s is application trusted authentication information obtained by the application local code, and s' is decrypted authentication information: if r ' is equal to r ', the data is not replayed, namely s ' is equal to s ', and the application is judged whether to be repackaged or not by using s '; if r ≠ r', it indicates that the data transmitted between the application upper layer code and the application native code has been replayed, i.e. the application has been repackaged.
Further, the method for judging whether the application is repackaged by using s' comprises the following steps: and comparing whether the decrypted authentication information s ' is the same as the authentication information Sig of the application developer stored in advance, if s ' ≠ Sig, the application is not repackaged, and if s ' ≠ Sig, the application is repackaged.
The utility model provides an Android application repackages detection device which characterized in that: the device comprises an authentication information acquisition module, an authentication information detection module, an authentication information transmission module and a random number verification module; the authentication information acquisition module is used for simulating and calling the process of acquiring the authentication information by the API to acquire the credible authentication information of the application by utilizing the interruption which cannot be hijacked at the application layer in the application local code; the authentication information transmission module is used for transmitting application credible authentication information between the application upper layer code and the local code by using a random number and an encryption mode; the random number checking module is used for judging whether the data transmitted from the application local code acquired by the authentication information transmission module is replayed or not according to the random number; the authentication information detection module is used for judging whether the application is repackaged according to the credible authentication information of the application.
Due to the adoption of the technical scheme, the invention has the following advantages: 1. the invention utilizes the interrupt mechanism, the encryption technology and the random number to enhance the safety of obtaining the application authentication information by the application repackaging detection code, so that the application can effectively resist the repackaging behavior of utilizing API hijacking and replay bypass detection. 2. The invention adopts the element which is specifically related to the application main logic and has higher randomness or the element which is internally applied and has higher randomness as the random source for generating the random number, can prevent an attacker from hijacking the API for acquiring the random source, and plays back the fixed random source so as to ensure that the generated random number is predictable.
Drawings
FIG. 1 is a schematic view of the overall structure of the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and examples.
As shown in fig. 1, the invention provides a repackaging detection method for Android applications, which includes the following steps:
1) the method comprises the steps that an interruption which cannot be hijacked at an application level is utilized in an application local code, namely the interruption is directly initiated through an ARM SWI instruction, after the process of obtaining the authentication information by simulating and calling the API obtains the credible authentication information s of the application, the step 2) or the step 3) is carried out to detect in the application local code or in the application upper layer code.
The application credible authentication information s is an application signature or an application installation file check value and the like. When using an application signature as authentication information, the present invention simulates the process of an application calling getPackageInfo () to obtain the application signature from the system Service Package Manager Service, also known as PMS, that manages the application Package. When the verification value of the installation file is used as authentication information, the method simulates the process of calculating the verification value by calling fopen () to open the original application installation file stored by the system. Without loss of generality, the application signature is taken as an example in the embodiment.
If the application signature is adopted as the authentication information, simulating the process that the application construction binder calls API ioctl () to communicate with the PMS to acquire the signature so as to acquire the application signature. The specific process comprises the following steps:
1.1) constructing a binder data structure for acquiring an application signature;
1.2) generating interruption through an ARM SWI instruction and sending the binder data structure to the PMS;
1.3) extracting a credible application signature from a binder data structure returned by the PMS to serve as authentication information.
2) After the authentication information s is acquired from the application local code, repackaging detection can be directly carried out in the application local code;
the specific detection process is as follows: and comparing the acquired authentication information s with pre-stored authentication information sig provided by an application developer, wherein if the acquired authentication information s is the same as the authentication information sig provided by the developer, the application is not repackaged, and otherwise, the application is repackaged.
3) The main logic implementation of most applications is to apply the upper layer code, the application may need to transmit the authentication information to the application upper layer code, after acquiring the authentication information s from the application local code, the authentication information s is transmitted to the application upper layer code through a random number and encryption mode, and the random number and encryption mode are used to enhance the channel for transmitting the authentication information between the application local code and the application upper layer code, so that the detection bypass behavior of data between the local code and the application upper layer code during hijacking and replaying normal operation of the application can be resisted, namely replay attack can be resisted;
the process of transmitting the authentication information by using the random number and the encryption mode is as follows:
3.1) the application upper layer code generates a random number r which is difficult to predict according to the selected random source rs, and then transmits the random number r to the application local code;
and 3.2) after the application local code obtains the credible authentication information s of the application, encrypting the authentication information s and the random number r together to generate data E (r + s) and transmitting the data E to the application upper layer code.
4) The application upper layer code is used for decrypting the acquired encrypted data to obtain decrypted authentication information s ' and a random number r ', whether the transmitted data are replayed or not can be judged by comparing the decrypted random number r ' with the random number r transmitted to the application local code, and whether the application is repackaged or not is judged by the data which are not replayed;
if r 'is r', it means that the data is not reproduced, i.e. s 'is s', and the decrypted authentication information s 'is used to determine whether the application is repackaged, i.e. to compare whether the decrypted authentication information s' is the same as the pre-stored authentication information Sig of the application developer. If s' ≠ Sig, the application is not repackaged, which indicates that the application has been repackaged. For example, when the application uses the application signature for repackaging detection, s' is the current application signature, Sig is the signature of the application developer, if the current application signature is equal to the application developer signature, it indicates that the application is not repackaged, and if not, it indicates that the application is repackaged. The detection method is similar when the application uses other authentication information such as a file check value;
if r ≠ r', it indicates that the data transmitted between the application upper layer code and the application native code has been replayed, i.e. the application has been repackaged.
In the step 3.1), the element which is related to the specific application main logic and has higher randomness or the element which is internally provided with higher randomness is used as a random source for generating random numbers, so that codes introduced by an attacker in the repackaged application cannot control the random source to generate the same random numbers. The high randomness is that the number of possible values of the element is not less than 10000, and the value of the random number generated in the runtime is difficult to predict by an attacker. For example, for a mapping application, the element that is relevant to its main logic, the user's location, may be selected as a random source. For applications that do not use the above elements, the coordinates of the elements inherent to the application, such as user screen clicks, may be used as a random source. When applications use these random sources, if an attacker hijacks the replay of these random sources, it can cause the repackaged application to run incorrectly, making repackaging meaningless.
In summary, the reason why the present invention can resist replay attack is that (1) in the process of obtaining the application authentication information, the present invention uses the interruption simulation application which cannot be hijacked in the application layer to call the API process in the local code to obtain the credible authentication information; (2) in the process of transmitting the application authentication information in the channel between the untrusted local code and the upper layer code, the invention introduces an encryption mode and a random number to enhance the safety of the channel. The invention binds the random number and the user authentication information by utilizing encryption, so that an attacker cannot directly modify the random number or the user authentication information in the data and can only replay the whole data. The random number in the data transmission is generated by a random source which has high randomness and cannot be replayed, so the random number also has high randomness, namely, an attacker is different from the random number generated in the application operation after repackaging by observing that the random number in the encrypted data transmitted by the application operation in normal operation is different from the random number generated in the application operation. If an attacker replays the encrypted data of the application in normal operation during the operation of the re-packaged application to bypass detection, the random number in the encrypted data is different from the random number transmitted to the application local code, and the attacker can be detected by the random number verification module. Therefore, the invention introduces the data transmission channel with random number and encryption mode to effectively resist replay attack. If the strength of the replay attack resistance is further enhanced, the authentication information and the random number can be encoded and then encrypted.
The invention also provides an Android application repackaging detection device which comprises an authentication information acquisition module, an authentication information detection module, an authentication information transmission module and a random number verification module. Wherein:
the authentication information acquisition module is used for simulating and calling the process of acquiring the authentication information by the API to acquire credible authentication information s by utilizing the interruption which cannot be hijacked at the application layer in the application local code;
the authentication information transmission module is used for transmitting credible authentication information between the application upper layer code and the local code by using a random number and an encryption mode;
the random number checking module is used for judging whether the data transmitted from the application local code acquired by the authentication information transmission module is replayed or not according to the random number;
the authentication information detection module is used for judging whether the application is repackaged according to the credible authentication information of the application.
The above embodiments are only for illustrating the present invention, and the steps may be changed, and on the basis of the technical solution of the present invention, the modification and equivalent changes of the individual components according to the principle of the present invention should not be excluded from the scope of the present invention.

Claims (7)

1. An Android application repacking detection method is characterized by comprising the following steps:
1) simulating the process of calling an API to acquire authentication information to acquire credible authentication information of the application by using the interruption which cannot be hijacked at the application level in the application local code, and then entering the step 2) or the step 3) to detect in the application local code or in the application upper layer code;
2) after the authentication information is acquired from the application local code, the repackaging detection is directly carried out in the application local code;
3) after the authentication information is acquired from the application local code, the authentication information is transmitted to an application upper layer code in a random number and encryption mode;
4) and the application upper layer code decrypts the acquired encrypted data to obtain decrypted authentication information and a random number, judges whether the transmitted data is replayed or not by comparing the decrypted random number with the random number transmitted to the application local code, and finally judges whether the application is repackaged or not by the data which is not replayed.
2. The Android application repackaging detection method of claim 1, characterized in that: in the step 2), the detection process is as follows: and comparing the acquired authentication information with the authentication information provided by the application developer which is stored in advance, wherein if the acquired authentication information is the same as the authentication information provided by the developer, the application is not repackaged, and otherwise, the application is repackaged.
3. The Android application repackaging detection method of claim 1, characterized in that: in the step 3), the process of transmitting the authentication information by using the random number and the encryption mode is as follows:
3.1) in the development process or after the development is completed, the application upper layer code generates a random number according to the selected random source, and then transmits the random number to the application local code;
and 3.2) after the application local code obtains the credible authentication information of the application, encrypting the authentication information and the random number together to generate data and transmitting the data to the application upper layer code.
4. The Android application repackaging detection method of claim 3, wherein: in the step 3.1), an element which is related to the specific application main logic and has higher randomness or an internal element with higher randomness is adopted as a random source for generating random numbers; the high randomness means that the number of possible values of the element is not less than 10000, and the value of the random number generated in the runtime is difficult to predict by an attacker.
5. The Android application repackaging detection method of claim 1, characterized in that: in the step 4), a process of judging whether the transmitted data is replayed is as follows, where r is a random number transmitted by the application upper layer code to the application local code, r 'is a decrypted random number, s is application credible authentication information acquired by the application local code, and s' is decrypted authentication information:
if r ' is equal to r ', the data is not replayed, namely s ' is equal to s ', and the application is judged whether to be repackaged or not by using s ';
if r ≠ r', it indicates that the data transmitted between the application upper layer code and the application native code has been replayed, i.e. the application has been repackaged.
6. The Android application repackaging detection method of claim 5, wherein: the method for judging whether the application is repackaged by utilizing the s' comprises the following steps: and comparing whether the decrypted authentication information s ' is the same as the authentication information Sig of the application developer stored in advance, if s ' ≠ Sig, the application is not repackaged, and if s ' ≠ Sig, the application is repackaged.
7. The utility model provides an Android application repackages detection device which characterized in that: the device comprises an authentication information acquisition module, an authentication information detection module, an authentication information transmission module and a random number verification module;
the authentication information acquisition module is used for simulating and calling the process of acquiring the authentication information by the API to acquire the credible authentication information of the application by utilizing the interruption which cannot be hijacked at the application layer in the application local code;
the authentication information transmission module is used for transmitting application credible authentication information between the application upper layer code and the local code by using a random number and an encryption mode;
the random number checking module is used for judging whether the data transmitted from the application local code acquired by the authentication information transmission module is replayed or not according to the random number;
the authentication information detection module is used for judging whether the application is repackaged according to the credible authentication information of the application.
CN201810015873.8A 2018-01-08 2018-01-08 Android application repacking detection method and device Active CN108259182B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810015873.8A CN108259182B (en) 2018-01-08 2018-01-08 Android application repacking detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810015873.8A CN108259182B (en) 2018-01-08 2018-01-08 Android application repacking detection method and device

Publications (2)

Publication Number Publication Date
CN108259182A CN108259182A (en) 2018-07-06
CN108259182B true CN108259182B (en) 2021-01-05

Family

ID=62726101

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810015873.8A Active CN108259182B (en) 2018-01-08 2018-01-08 Android application repacking detection method and device

Country Status (1)

Country Link
CN (1) CN108259182B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111464482B (en) * 2019-01-18 2022-11-08 中兴通讯股份有限公司 Authentication processing method, authentication processing device, storage medium, and electronic device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8756432B1 (en) * 2012-05-22 2014-06-17 Symantec Corporation Systems and methods for detecting malicious digitally-signed applications
KR101498820B1 (en) * 2013-11-06 2015-03-05 순천향대학교 산학협력단 Method for Detecting Application Repackaging in Android
CN104598823A (en) * 2015-01-21 2015-05-06 华东师范大学 Kernel level rootkit detection method and system in Andriod system
CN105956456A (en) * 2016-04-26 2016-09-21 南京邮电大学 Realization method for performing quadruple shared signature verification on Android system
CN106203120A (en) * 2016-07-15 2016-12-07 北京邮电大学 A kind of multiple spot Hook reverse method for Android reinforcement application
CN107180170A (en) * 2017-05-09 2017-09-19 深圳海云安网络安全技术有限公司 A kind of Android APP are without shell reinforcement means

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8756432B1 (en) * 2012-05-22 2014-06-17 Symantec Corporation Systems and methods for detecting malicious digitally-signed applications
KR101498820B1 (en) * 2013-11-06 2015-03-05 순천향대학교 산학협력단 Method for Detecting Application Repackaging in Android
CN104598823A (en) * 2015-01-21 2015-05-06 华东师范大学 Kernel level rootkit detection method and system in Andriod system
CN105956456A (en) * 2016-04-26 2016-09-21 南京邮电大学 Realization method for performing quadruple shared signature verification on Android system
CN106203120A (en) * 2016-07-15 2016-12-07 北京邮电大学 A kind of multiple spot Hook reverse method for Android reinforcement application
CN107180170A (en) * 2017-05-09 2017-09-19 深圳海云安网络安全技术有限公司 A kind of Android APP are without shell reinforcement means

Also Published As

Publication number Publication date
CN108259182A (en) 2018-07-06

Similar Documents

Publication Publication Date Title
KR101350390B1 (en) A apparatus for code obfuscation and method thereof
KR101067399B1 (en) Saving and retrieving data based on symmetric key encryption
US8332823B2 (en) Application program verification system, application program verification method and computer program
CN102576391B (en) Software license embedded in shell code
Sivakumaran et al. A Study of the Feasibility of Co-located App Attacks against {BLE} and a {Large-Scale} Analysis of the Current {Application-Layer} Security Landscape
JP2004005595A (en) Storage and retrieval of data based on public key coding
CN109960903A (en) A kind of method, apparatus, electronic equipment and storage medium that application is reinforced
CN110276198B (en) Embedded variable granularity control flow verification method and system based on probability prediction
CN111200589A (en) Data protection method and system for alliance chain
CN109284585B (en) Script encryption method, script decryption operation method and related device
CN104680039A (en) Data protection method and device of application installation package
CN106055936A (en) Method and device for encryption/decryption of executable program data package
CN113722683B (en) Model protection method, device, equipment, system and storage medium
CN110851800B (en) Code protection method, device, system and readable storage medium
Wang et al. Leakdoctor: Toward automatically diagnosing privacy leaks in mobile applications
JP4295684B2 (en) Program production device
JP4664055B2 (en) Program dividing device, program executing device, program dividing method, and program executing method
CN111159658B (en) Byte code processing method, system, device, computer equipment and storage medium
CN112613037A (en) Code checking method and device
Cho et al. DexMonitor: dynamically analyzing and monitoring obfuscated Android applications
CN110245464B (en) Method and device for protecting file
CN108259182B (en) Android application repacking detection method and device
CN110555303A (en) Method and device for preventing machine script from being maliciously accessed
EP2873023B1 (en) Technique for determining a malign or non-malign behavior of an executable file
CN113114681B (en) Test message processing method, device, computer system and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant