CN109933410A - A kind of fictitious order delivery method and system based on virtualization technology - Google Patents

A kind of fictitious order delivery method and system based on virtualization technology Download PDF

Info

Publication number
CN109933410A
CN109933410A CN201910220540.3A CN201910220540A CN109933410A CN 109933410 A CN109933410 A CN 109933410A CN 201910220540 A CN201910220540 A CN 201910220540A CN 109933410 A CN109933410 A CN 109933410A
Authority
CN
China
Prior art keywords
protection function
bytecode
processing information
compiler
new bytecode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910220540.3A
Other languages
Chinese (zh)
Other versions
CN109933410B (en
Inventor
方令
廖兴龙
肖巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhiyouwang'an Technology Co Ltd
Original Assignee
Beijing Zhiyouwang'an Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhiyouwang'an Technology Co Ltd filed Critical Beijing Zhiyouwang'an Technology Co Ltd
Priority to CN201910220540.3A priority Critical patent/CN109933410B/en
Publication of CN109933410A publication Critical patent/CN109933410A/en
Application granted granted Critical
Publication of CN109933410B publication Critical patent/CN109933410B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention provides a kind of fictitious order delivery method and system based on virtualization technology compiles option by compiler inspection, obtain modified realization by protection function name, obtain modified by protection function list;The compiler successively handles all source files, generates new bytecode by protection function to be modified in all source files, while generating the processing information for containing new bytecode;Terminal obtains the processing information, explains the new bytecode for executing and containing in the processing information.It is achieved that dynamic change is by the realization of protection function when any; even if program it is same run time it is interior, the same bytecode by protection function can also update at any time, substantially prolong guard time; the effect of software protection is enhanced, safety is improved.

Description

A kind of fictitious order delivery method and system based on virtualization technology
Technical field
The present invention relates to originating parties under information security field more particularly to a kind of fictitious order based on virtualization technology Method and system.
Background technique
Virtual machine protection is the new Software Protection Technique of one kind of information security field, and programmer is for the quilt in source file Written in code program is protected, will be all unrecognized by protection code conversion machine and people, the bytecode run on a virtual machine, Execution is explained to these bytecodes by virtual machine again in program operation, realizes the protection to software.
But used virtualization protection technique, the bytecode of generation are fixed not there are in dynamic base currently on the market Become, APP can only be waited to update dynamic base when upgrading next time, and APP is when upgrading, black production personnel have sufficient time to crack, The protecting effect of the prior art can only maintain a period of time.
Therefore the existing technology needs further improvement.
Summary of the invention
In view of the above shortcomings in the prior art, a kind of based on virtualization it is an object of the invention to be provided for user The fictitious order delivery method and system of technology, with solve the bytecode that existing virtual machine protection technique generates immobilize and Cause guard time short, the defect of safety difference, first embodiment provided by the invention is a kind of void based on virtualization technology Pseudoinstruction delivery method, wherein the described method includes:
A, by compiler inspection compile option, obtain modified realization by protection function name, obtain modified protected Protect function list;
B, the compiler successively handles all source files, generates new byte by protection function to be modified in all source files Code, while generating the processing information for containing new bytecode;
C, terminal obtains the processing information, explains the new bytecode for executing and containing in the processing information.
Optionally, between the step B and step C further include:
Processing information write-in first is recorded file by C01, the compiler;
C02, cloud obtain the processing information in the first record file, and the processing information is issued to terminal.
Optionally, before the step A further include:
A0, pass through compiler, output calls the second of signature form to record file comprising virtual machine interpreter and locally.
Optionally, the step B further include:
B1, judge in currently processed source file whether containing with it is described it is modified by protection function list by protection letter Several titles are identical by protection function, if so, thening follow the steps B2;If nothing, next source file is handled;
B2, in currently processed source file with it is described modified by identical by protection function name in protection function list New bytecode is generated by protection function, reprocess next source file.
Optionally, the step B2 further include:
B21, the second record file is read in, obtain the virtual machine interpreter in the second record file and locally calls signature Table, modified to be protected in protection function list by protection function is identical with described in currently processed source file Function generates new bytecode.
Optionally, the processing information in the step B includes: current source filename, index functions, new bytecode and new word Save the length of code.
Optionally, the step C includes:
C1, terminal are by the processing information update to memory pool;
C2, detect that control interpreter checks in memory pool whether have and be called when software operation is called by protection function By the corresponding new bytecode of protection function;Interpreter is controlled if having explains that execution is corresponding by protection function with what is be called New bytecode;
The step C further include:
If not having in memory pool and being called by the corresponding new bytecode of protection function, controls interpreter explanation and execute dynamic With called by the corresponding bytecode of protection function in library.
Second embodiment provided by the invention is a kind of fictitious order sending system based on virtualization technology, wherein institute The system of stating includes: compiler and terminal;
The compiler, for check compiling option, obtain modified realization by protection function name, obtain modified quilt Protect function list;
All source files are successively handled, new bytecode is generated by protection function to be modified in all source files, is generated simultaneously Processing information containing new bytecode;
The terminal explains the new bytecode for executing and containing in the processing information for obtaining the processing information.
Optionally, the system also includes clouds;
The compiler is also used to that the first record file is written the processing information into;
The compiler is also used to export comprising virtual machine interpreter and local the second record file for calling signature form;
The processing information is issued to terminal for obtaining the processing information in the first record file by the cloud.
Optionally, the terminal further includes interpreter;
The interpreter, for the quilt for whether having and being called in memory pool to be checked when software operation is called by protection function Protect the corresponding new bytecode of function;It executes and is called by the corresponding new bytecode of protection function if so, explaining;If It is no, then control interpreter explain execute in dynamic base be called by the corresponding bytecode of protection function.
Beneficial effect, the present invention provides a kind of fictitious order delivery method and system based on virtualization technology pass through Compiler inspection compile option, obtain modified realization by protection function name, obtain modified by protection function list; The compiler successively handles all source files, generates new bytecode by protection function to be modified in all source files, together Shi Shengcheng contains the processing information of new bytecode;Terminal obtains the processing information, explains to execute and contain in the processing information The new bytecode.It is achieved that dynamic change is by the realization of protection function when any, even if in the same of program Run time it is interior, the same bytecode by protection function can also update at any time, substantially prolong guard time, enhance software The effect of protection, improves safety.
Detailed description of the invention
Fig. 1 is a kind of step process of fictitious order delivery method based on virtualization technology of first embodiment of the invention Figure;
Fig. 2 is the step flow chart of situation 2 in first embodiment of the invention;
Fig. 3 is a kind of theory structure frame of fictitious order sending system based on virtualization technology of second embodiment of the invention Figure.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer and more explicit, right as follows in conjunction with drawings and embodiments The present invention is further described.It should be appreciated that specific embodiment described herein is used only for explaining the present invention, and do not have to It is of the invention in limiting.
As shown in Figure 1, first embodiment provided by the invention is originating party under a kind of fictitious order based on virtualization technology Method, including following steps:
S1, by compiler inspection compile option, obtain modified realization by protection function name, obtain modified protected Protect function list;
Step S1 is carried out on the basis of existing virtualization software protection technique, existing virtualization software protection technique It is: virtualization process is carried out by protection function to what is specified in source file by compiler, after all source files are compiled To a dynamic base, to by the bytecode of generation when protection function progress virtualization process, there are in dynamic base, dynamic base can be put Enter software installation packet, be installed on mobile phone, software is protected.
Specified from a source file by protection function, there are two types of modes, and one is own defined in a certain source file Function is required to protect, then source filename is added in configuration file;Another kind is, in the function that a certain source file defines In, only partial function needs to protect, for needing partial function to be protected to add customized attribute, for example, can choose After the parameter list that its function defines, addition _ _ attribute ((_ _ annotate__ before function body ((" ivmp ")))), the attribute of making by oneself added herein is ivmp, it can choose other legal attributes when practical operation, It is not limited in ivmp.
Compiler reads configuration file in compiling, and function defined in the source file recorded is used as by protection letter Number;For the source file being not present in configuration file, defined in function have attribute be _ _ attribute ((_ _ Annotate__ ((" ivmp ")))), then it is assumed that it is to be protected function, passes through the method, it is possible to specify is in multiple source files more A function be by protection function, it is all it is specified a set is formed by protection function, be denoted as PS.
Modification part is by the realization of protection function in PS, that is, only modification part is in the prior art in the present application By the realization of protection function, compiler used in the present patent application is LLVM compiler, and the LLVM compiler has one to be used for The modified compiling option by protection function list is obtained, this compiling option is customized name, such as is named as-hot- Update-funcs, compiler compile-time check-hot-update-funcs compile option, obtain the quilt that all modifications are realized Protect function name, at the same obtain it is modified by protection function list, it is described modified to be listed by protection function list The title by protection function that all modifications are realized, when being listed by-hot-update-funcs by protection function name, letter It is several be referred to as between separated with comma, such as-hot-update-funcs=func1, func2, func3, func4.
Before step S1 further include:
S0, pass through compiler, output calls the second of signature form to record file comprising virtual machine interpreter and locally.
A dynamic base is obtained after the prior art compiles each source file, bytecode is generated there are in dynamic base, compiles simultaneously Virtual machine interpreter that one uses when having recorded for compiling each source file can be exported and local call the of signature form by translating device Two record files, each source file have the virtual machine interpreter of oneself and locally call signature form, the second record file Title and format there is no limit can customize setting, such as record file for second and be named as ivmp_record_json, lattice Formula is json.
S2, the compiler successively handle all source files, are generated to be modified in all source files by protection function New bytecode, while generating the processing information for containing new bytecode;
The step S2 further include:
S21, judge in currently processed source file whether containing with it is described modified by being protected in protection function list Function name is identical by protection function, if so, thening follow the steps S22;If nothing, next source file is handled;
S22, in currently processed source file with it is described it is modified by protection function list by protection function name phase Same generates new bytecode by protection function, reprocesses next source file.
Compiler successively handles each source file, when the current source file of compiler processes, traverses being protected in current source file Function is protected, if being had one or more titles by protection function being protected after the modification in protection function in current source file It protects in function list, then new bytecode is generated by protection function to be one or more of, reprocess next source file.
If the title by protection function in current source file not after the modification by protection function list, directly Handle next source file.
While for one or more of generation new bytecodes by protection function, the processing for containing new bytecode is generated Information, the processing information include: current source filename, index functions, the length of new bytecode and new bytecode.
The step S22 further include:
S221, the second record file is read in, obtain the virtual machine interpreter in the second record file and locally calls signature Table, be in currently processed source file with it is described it is modified by protection function list by the identical quilt of protection function name Function is protected to generate new bytecode.
Between step S2 and step S3 also:
Processing information write-in first is recorded file by S301, the compiler;.
Successively handle all source files by LLVM compiler, every processing one source file will just generate in treatment process Processing information write-in the first record file comprising new bytecode, there is no limit for the title and format of the second record file, It can customize setting, such as the first record file be named as ivmp_hot_update_bytecode_json, format For json, after having handled all source files, then file is recorded by first by developer and uploads to cloud.Here the first record The name of file and the second record file is only for distinguishing two different record files, does not represent the time sequencing of appearance Or severity level.
S302, cloud obtain the processing information in the first record file, and the processing information is issued to terminal.
Beyond the clouds, the content of ivmp_hot_update_bytecode_json file is extracted, as unit of function Be issued to terminal, i.e., processing information as unit of function, in a unit include source filename, index functions (with by protection letter Number is defined in current source file the corresponding serial number of appearance sequence, is incremented by since 0), the length of new bytecode, new bytecode Degree.
S3, terminal obtain the processing information, explain the new bytecode for executing and containing in the processing information.
The terminal can be computer, embedded device, mobile phone, IPAD, smartwatch etc., and all can be with runs software simultaneously Support the terminal device of function of surfing the Net, the processing information containing new bytecode is issued to terminal by cloud, in the soft of terminal operating Part detects that the processing information that cloud issues, the terminal obtain the processing information.
The step S3 further include:
S31, terminal are by the processing information update to memory pool;
S32, detect that control interpreter checks in memory pool whether have and be called when software operation is called by protection function By the corresponding new bytecode of protection function;Interpreter is controlled if having explains that execution is corresponding by protection function with what is be called New bytecode;
The step S3 further include:
If not having in memory pool and being called by the corresponding new bytecode of protection function, controls interpreter explanation and execute dynamic With called by the corresponding bytecode of protection function in library.
The terminal updates the new bytecode in the processing information to memory pool, comprising: terminal judges the new word Whether corresponding bytecode has been had in memory pool by protection function belonging to section code, has directly stored bytecode if without if Into memory pool;Judge that whether already existing bytecode is identical in new bytecode and memory pool, does not do if they are the same again if having Any processing, judges whether current time already present bytecode uses by interpreter again if different, if otherwise directly will The new bytecode handled in information replaces current time already present bytecode;If then first by current time already present byte Code labeling is out-of-date, then updates the new bytecode in information is handled to memory pool, and after interpreter explanation has executed, will be marked Out-of-date bytecode is denoted as to delete from memory pool.
The operation of software needs to call a series of functions, and when a certain called by protection function, interpreter will be explained and be held Row is described by protection function, be arranged the interpreter first go in memory pool to have checked whether it is described by the corresponding new word of protection function Save code, by the source filename for including in processing information, index functions, terminal can be quickly found out in memory pool whether have it is described By the corresponding new bytecode of protection function, have, execute, otherwise interpreter goes to explain the bytecode executed in dynamic base.
Rear end developer selected part can be updated its bytecode by protection function at any time in this way, pass through cloud It issues, terminal updates new bytecode to memory pool, in software run time call by protection function, explains and executes by protection function New bytecode, it is achieved that when any dynamic change by the realization of protection function, overcome in the prior art, byte Code changeless defect in dynamic base.
The technical solution of first embodiment in order to better understand the present invention, in conjunction with Fig. 2, citing is in practical application below Several situations that can be potentially encountered: it is applied to mobile phone terminal;
A. all source files are compiled by LLVM compiler, output ivmp_record_json(second records file);
B. developer modifies PS and concentrates by the realization of protection function p1, p2, p3, p4, setting compiling option-hot-update- funcs=p1,p2,p3,p4;The LLVM compiler run-time check compiling option, obtain modified realization by protection function, It obtains modified by protection function list;
C. compiler successively handles each source file, if having in current source file by protection function after the modification by protection letter In ordered series of numbers table, then new bytecode is generated by protection function for this, need to read in ivmp_record_json in compilation process, so All source files have been handled, while ivmp_hot_update_bytecode_ is written into the processing information containing new bytecode Json(first records file);
D. by ivmp_hot_update_bytecode_json and cloud is uploaded to by developer;
E. cloud extracts the content of ivmp_hot_update_bytecode_json, is issued to mobile phone terminal;
Situation 1:
F. the new bytecode that the software detection run in mobile phone terminal is issued to cloud, detect it is all by protection function p1, p2, P3, p4 then will all new bytecode be updated to memory pool without corresponding bytecode in memory pool;
G. for software run time call by protection function p1, interpreter goes memory pool to check, there is a corresponding new bytecode of p1, solves It releases and executes this new bytecode.
Situation 2:
F1. the new bytecode that the software detection run in mobile phone terminal is issued to cloud, detection p1, p2, p3 do not have corresponding byte Code is in memory pool, then by the new bytecode update of p1, p2, p3 to memory pool, p4 has corresponding bytecode X in memory pool;
F2. detect that bytecode X corresponding with p4 is explained execution in memory pool, it is out-of-date that X is labeled as, then by p4's New bytecode X1 is updated to memory pool, and after the completion of waiting X to execute, X is deleted;
G1. software run time call goes memory pool to check by protection function p5, interpreter, without the corresponding new bytecode of p5, then It goes to explain the corresponding bytecode of p5 executed in dynamic base.
Situation 3:
F1. the new bytecode that the software detection run in mobile phone terminal is issued to cloud, detection p1, p2, p3 do not have corresponding byte Code is in memory pool, then by the new bytecode update of p1, p2, p3 to memory pool, p4 has corresponding bytecode X in memory pool;
F21. detect that bytecode corresponding with p4 currently has not been explained device execution in memory pool, directly replaces X and issues for cloud New bytecode X1;
G. for software run time call by protection function p1, interpreter goes memory pool to check, there is a corresponding new bytecode of p1, solves It releases and executes this new bytecode.
Foregoing provide the combination of several situations existing for first embodiment step f, g, but first embodiment and not only It is limited to above-mentioned several situations.
As shown in figure 3, being a kind of based on virtual the present invention also provides second embodiment based under the premise of the above method The fictitious order sending system of change technology, wherein the system comprises: compiler 10 and terminal 20;
The compiler 10, for check compiling option, obtain modified realization by protection function name, obtain modified By protection function list;
All source files are successively handled, new bytecode is generated by protection function to be modified in all source files, is generated simultaneously Processing information containing new bytecode;
The terminal 20 explains the new bytecode for executing and containing in the processing information for obtaining the processing information.
Optionally, the system also includes clouds 30;
The compiler 10 is also used to that the first record file is written the processing information into;
The compiler 10 is also used to export comprising virtual machine interpreter and local the second record file for calling signature form;
The processing information is issued to terminal for obtaining the processing information in the first record file by the cloud 30 20。
Optionally, the terminal 20 further includes interpreter 201;
The interpreter 201, for whether when software operation is called by protection function, checking to have and be called in memory pool By the corresponding new bytecode of protection function;It executes and is called by the corresponding new bytecode of protection function if so, explaining;If It is no, then control interpreter explain execute in dynamic base be called by the corresponding bytecode of protection function.
All bytecodes of the prior art update dynamic base in upgrading, could update bytecode, lead to there are in dynamic base Technical solution of the present invention is crossed, does not have to update dynamic base, if cloud has issued new bytecode, software simultaneously arrives the update of new bytecode Memory pool, setting interpreter will explain whether when executing a certain function by protection first checking in memory pool has corresponding new word Code is saved, dynamic base is checked if not.Rear end developer can be chosen with any time arbitrarily by protection function to it in this way Bytecode is updated, and is issued by cloud, and the workload that the present invention updates bytecode is compared to be upgraded by the entirety of software The workload for updating bytecode is much smaller.
The present invention provides a kind of fictitious order delivery method and system based on virtualization technology, passes through compiler inspection Compile option, obtain modified realization by protection function name, obtain modified by protection function list;Pass through the volume It translates device and successively handles all source files, new bytecode is generated by the compiling of protection function to be modified in all source files, simultaneously Generate the processing information for containing new bytecode;Terminal obtains the processing information, contains in the explanation execution processing information The new bytecode.It is achieved that dynamic change is by the realization of protection function when any, even if in the same fortune of program In row period, the same bytecode by protection function can also update at any time, substantially prolong guard time, enhance software guarantor The effect of shield, improves safety.
It, can according to the technique and scheme of the present invention and its hair it is understood that for those of ordinary skills Bright design is subject to equivalent substitution or change, and all these changes or replacement all should belong to the guarantor of appended claims of the invention Protect range.

Claims (10)

1. a kind of fictitious order delivery method based on virtualization technology, which is characterized in that the described method includes:
A, by compiler inspection compile option, obtain modified realization by protection function name, obtain modified protected Protect function list;
B, all source files are successively handled by the compiler, is generated newly to be modified in all source files by protection function Bytecode, while generating the processing information for containing new bytecode;
C, terminal obtains the processing information, explains the new bytecode for executing and containing in the processing information.
2. the fictitious order delivery method according to claim 1 based on virtualization technology, which is characterized in that the step Between B and step C further include:
Processing information write-in first is recorded file by C01, the compiler;
C02, cloud obtain the processing information in the first record file, and the processing information is issued to terminal.
3. the fictitious order delivery method according to claim 1 based on virtualization technology, which is characterized in that the step Before A further include:
A0, pass through compiler, output calls the second of signature form to record file comprising virtual machine interpreter and locally.
4. the fictitious order delivery method according to claim 1 based on virtualization technology, which is characterized in that the step B further include:
B1, judge in currently processed source file whether containing with it is described it is modified by protection function list by protection letter Several titles are identical by protection function, if so, thening follow the steps B2;If nothing, next source file is handled;
B2, in currently processed source file with it is described modified by identical by protection function name in protection function list New bytecode is generated by protection function, reprocess next source file.
5. the fictitious order delivery method according to claim 4 based on virtualization technology, which is characterized in that the step B2 further include:
B21, the second record file is read in, obtain the virtual machine interpreter in the second record file and locally calls signature Table, be in currently processed source file with it is described it is modified by protection function list by the identical quilt of protection function name Function is protected to generate new bytecode.
6. the fictitious order delivery method according to claim 1 based on virtualization technology, which is characterized in that the step Processing information in B includes: current source filename, index functions, the length of new bytecode and new bytecode.
7. the fictitious order delivery method according to claim 1 based on virtualization technology, which is characterized in that the step C includes:
C1, terminal are by the processing information update to memory pool;
C2, detect that control interpreter checks in memory pool whether have and be called when software operation is called by protection function By the corresponding new bytecode of protection function;If so, control interpreter explain execute be called it is corresponding by protection function New bytecode;
The step C further include:
If not having in memory pool and being called by the corresponding new bytecode of protection function, controls interpreter explanation and execute dynamic With called by the corresponding bytecode of protection function in library.
8. a kind of fictitious order sending system based on virtualization technology characterized by comprising compiler and terminal;
The compiler, for check compiling option, obtain modified realization by protection function, obtain modified protected Function list;
All source files are successively handled, new bytecode is generated by protection function to be modified in all source files, is generated simultaneously Processing information containing new bytecode;
The terminal explains the new bytecode for executing and containing in the processing information for obtaining the processing information.
9. the fictitious order sending system according to claim 8 based on virtualization technology, which is characterized in that the system It further include cloud;
The compiler is also used to that the first record file is written the processing information into;
The compiler is also used to export virtual machine interpreter for compiling all source files and local calls the of signature form Two record files;
The processing information is issued to terminal for obtaining the processing information in the first record file by the cloud.
10. the fictitious order sending system according to claim 8 based on virtualization technology, which is characterized in that the end End further includes interpreter;
The interpreter, for the quilt for whether having and being called in memory pool to be checked when software operation is called by protection function Protect the corresponding new bytecode of function;It executes and is called by the corresponding new bytecode of protection function if so, explaining;If It is no, then control interpreter explain execute in dynamic base be called by the corresponding bytecode of protection function.
CN201910220540.3A 2019-03-22 2019-03-22 Virtual instruction issuing method and system based on virtualization technology Active CN109933410B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910220540.3A CN109933410B (en) 2019-03-22 2019-03-22 Virtual instruction issuing method and system based on virtualization technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910220540.3A CN109933410B (en) 2019-03-22 2019-03-22 Virtual instruction issuing method and system based on virtualization technology

Publications (2)

Publication Number Publication Date
CN109933410A true CN109933410A (en) 2019-06-25
CN109933410B CN109933410B (en) 2021-06-01

Family

ID=66988058

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910220540.3A Active CN109933410B (en) 2019-03-22 2019-03-22 Virtual instruction issuing method and system based on virtualization technology

Country Status (1)

Country Link
CN (1) CN109933410B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110673929A (en) * 2019-09-29 2020-01-10 北京智游网安科技有限公司 Method for protecting abnormal mechanism, intelligent terminal and storage medium
CN110675256A (en) * 2019-08-30 2020-01-10 阿里巴巴集团控股有限公司 Method and device for deploying and executing intelligent contracts
US10783082B2 (en) 2019-08-30 2020-09-22 Alibaba Group Holding Limited Deploying a smart contract

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070083274A (en) * 2006-02-07 2007-08-24 에스케이 텔레콤주식회사 Method for excuting java virtual machine on mobile communication terminal by using fast memory access bytecode
US20140245275A1 (en) * 2013-02-26 2014-08-28 Red Hat, Inc. Bytecode modification
CN104504341A (en) * 2015-01-21 2015-04-08 联想(北京)有限公司 Operating system bug repairing method and device
CN107592338A (en) * 2017-08-08 2018-01-16 新智云数据服务有限公司 More new system, method and the relevant device of a kind of dynamic base
CN108196852A (en) * 2017-12-26 2018-06-22 北京华为数字技术有限公司 A kind of software running method, update method and relevant apparatus
CN108614714A (en) * 2018-04-25 2018-10-02 咪咕文化科技有限公司 A kind of dynamic base update method, device and storage medium
US10146515B1 (en) * 2015-03-10 2018-12-04 Twitter, Inc. Live code updates
CN108932406A (en) * 2017-05-18 2018-12-04 北京梆梆安全科技有限公司 Virtualization software guard method and device
CN109445807A (en) * 2017-08-28 2019-03-08 腾讯科技(深圳)有限公司 Realize the method, apparatus and computer readable storage medium of application program update

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070083274A (en) * 2006-02-07 2007-08-24 에스케이 텔레콤주식회사 Method for excuting java virtual machine on mobile communication terminal by using fast memory access bytecode
US20140245275A1 (en) * 2013-02-26 2014-08-28 Red Hat, Inc. Bytecode modification
CN104504341A (en) * 2015-01-21 2015-04-08 联想(北京)有限公司 Operating system bug repairing method and device
US10146515B1 (en) * 2015-03-10 2018-12-04 Twitter, Inc. Live code updates
CN108932406A (en) * 2017-05-18 2018-12-04 北京梆梆安全科技有限公司 Virtualization software guard method and device
CN107592338A (en) * 2017-08-08 2018-01-16 新智云数据服务有限公司 More new system, method and the relevant device of a kind of dynamic base
CN109445807A (en) * 2017-08-28 2019-03-08 腾讯科技(深圳)有限公司 Realize the method, apparatus and computer readable storage medium of application program update
CN108196852A (en) * 2017-12-26 2018-06-22 北京华为数字技术有限公司 A kind of software running method, update method and relevant apparatus
CN108614714A (en) * 2018-04-25 2018-10-02 咪咕文化科技有限公司 A kind of dynamic base update method, device and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
徐小辉: "《构件化软件动态更新与验证技术》", 30 June 2018, 天津大学出版社 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110675256A (en) * 2019-08-30 2020-01-10 阿里巴巴集团控股有限公司 Method and device for deploying and executing intelligent contracts
US10783082B2 (en) 2019-08-30 2020-09-22 Alibaba Group Holding Limited Deploying a smart contract
US11010303B2 (en) 2019-08-30 2021-05-18 Advanced New Technologies Co., Ltd. Deploying a smart contract
US11307990B2 (en) 2019-08-30 2022-04-19 Advanced New Technologies Co., Ltd. Deploying a smart contract
CN110673929A (en) * 2019-09-29 2020-01-10 北京智游网安科技有限公司 Method for protecting abnormal mechanism, intelligent terminal and storage medium

Also Published As

Publication number Publication date
CN109933410B (en) 2021-06-01

Similar Documents

Publication Publication Date Title
CN106775723B (en) Android platform-based system firmware customization method and Android device
CN103955363B (en) A kind of manufacture method of program upgrade installation package
US11579856B2 (en) Multi-chip compatible compiling method and device
CN108733988A (en) The guard method of executable program on Android platform
CN109933410A (en) A kind of fictitious order delivery method and system based on virtualization technology
US10684846B2 (en) Using semantic annotations to control compatibility behaviors
CN107480476B (en) Android native layer instruction compiling virtualization shell adding method based on ELF infection
CN110187910B (en) Thermal updating method, device, equipment and computer readable storage medium
CN110716715A (en) Application program development method, device, equipment and medium
CN100492387C (en) Method and system for software protected development based on Keil C51
CN106648755B (en) Method and device for dynamically loading dex in android art environment
CN111740948B (en) Data packet issuing method, dynamic updating method, device, equipment and medium
CN109670299A (en) A kind of method and electronic equipment creating Python sandbox environment
CN110059456A (en) Code protection method, code protection device, storage medium and electronic equipment
CN114610640A (en) Fuzzy testing method and system for trusted execution environment of Internet of things
CN112612502A (en) Patch generation method, device, equipment and storage medium
CN111782334B (en) Dynamic link library file virtualization method, storage medium and terminal equipment
CN108845864B (en) Spring frame-based JVM garbage recycling method and device
CN105005497A (en) Method and apparatus for calling local function in Java card virtual machine
CN102999371A (en) Lua script-based human-computer interface development method and system
CN111880804A (en) Application program code processing method and device
JP2006163686A (en) Compiling method, compiling program, compiling device and recording medium for compile
US20170083298A1 (en) Resilient format for distribution of ahead-of-time compiled code components
CN111796832B (en) Hot patch file generation method, device, equipment and storage medium
CN115220873A (en) Method for running Open Harmony application in Android system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant