CN112214736A - Code encryption method and related assembly - Google Patents

Code encryption method and related assembly Download PDF

Info

Publication number
CN112214736A
CN112214736A CN202011203396.1A CN202011203396A CN112214736A CN 112214736 A CN112214736 A CN 112214736A CN 202011203396 A CN202011203396 A CN 202011203396A CN 112214736 A CN112214736 A CN 112214736A
Authority
CN
China
Prior art keywords
code
encrypted
function
binary file
calling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011203396.1A
Other languages
Chinese (zh)
Inventor
孙方正
范渊
苗春雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN202011203396.1A priority Critical patent/CN112214736A/en
Publication of CN112214736A publication Critical patent/CN112214736A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Abstract

The application discloses a code encryption method, wherein after a code to be encrypted is determined, the code is compiled into a binary file, the requirement for protecting the code is met by utilizing the characteristic that the binary file is difficult to decode, compared with the traditional js obfuscated encryption mode, the difficulty for cracking the logic of the code is greatly improved, meanwhile, obfuscated codes are not introduced, the binary file can be directly operated when the function is called and executed, the performance can be improved to the greatest extent, the execution of the code can fully exert the hardware performance, so that the native efficiency is achieved, and the execution efficiency is improved. The application also provides a code encryption device, equipment and a readable storage medium, which have the beneficial effects.

Description

Code encryption method and related assembly
Technical Field
The present application relates to the field of computer software technologies, and in particular, to a code encryption method, apparatus, device, and readable storage medium.
Background
At present, some secret implementation methods (or business secrets) possibly exist in the running code of each company and enterprise, which are not expected to be known by others, and the running code needs to be encrypted due to the need of protecting the code logic.
In the related art, code encryption is realized by obfuscating code by JavaScript (hereinafter, js).
But the obfuscated code is still the code which can be modified secondarily, even some existing anti-obfuscating tools can be obfuscated reversely to a certain extent, and a user can easily deduce the code logic or modify the code logic by matching with the powerful internal debugging of js, so that the obfuscated pseudo encryption cannot ensure the security of the code, and hidden danger is brought to the project security. Meanwhile, the obfuscated encryption is realized by introducing redundant codes, and the original abstract syntax tree needs to be modified, so that the performance consumption is caused, and the execution efficiency of the codes is greatly influenced.
Therefore, how to achieve effective code encryption protection while ensuring code execution efficiency is an urgent problem to be solved by those skilled in the art.
Disclosure of Invention
The method aims to provide a code encryption method, which can realize effective code encryption protection while ensuring code execution efficiency; another object of the present application is to provide a code encryption apparatus, a device and a readable storage medium.
In order to solve the above technical problem, the present application provides a code encryption method, including:
determining a code to be encrypted;
calling a compiler to compile the code to be encrypted into a binary file;
adding the binary file to a destination address in a destination project;
and calling the binary file to perform function execution in the target project according to the binary file operation rule.
Optionally, the determining a code to be encrypted includes:
determining an original code to be protected;
determining a logic operation to be protected in the original code;
converting the logic operation to be protected into a function as a function to be encrypted;
performing programming language conversion on the function to be encrypted to obtain a function code to be encrypted;
and taking the function code to be encrypted as the code to be encrypted.
Optionally, performing programming language conversion on the function to be encrypted includes: and performing programming language conversion on the function to be encrypted according to Rust or C + + programming language.
Optionally, when the code to be encrypted is vue project code, the calling compiler compiles the code to be encrypted into a binary file, including: and calling an Emscript compiler to compile the code to be encrypted into a wasm binary file.
The present application also provides a code encryption apparatus, the apparatus including:
a code determination unit for determining a code to be encrypted;
the code compiling unit is used for calling a compiler to compile the code to be encrypted into a binary file;
the file adding unit is used for adding the binary file to a destination address in a destination project;
and the file calling unit is used for calling the binary file to perform function execution in the target item according to the binary file operation rule.
Optionally, the code determination unit includes:
an original code determining subunit, configured to determine an original code to be protected;
a logic operation determining subunit, configured to determine a logic operation to be protected in the original code;
the function conversion subunit is used for converting the logic operation to be protected into a function which is used as a function to be encrypted;
the language conversion subunit is used for performing programming language conversion on the function to be encrypted to obtain a function code to be encrypted;
and the code acquiring subunit is used for taking the function code to be encrypted as the code to be encrypted.
Optionally, the language conversion subunit is specifically: a first language conversion subunit to: and performing programming language conversion on the function to be encrypted according to Rust or C + + programming language.
Optionally, when the code to be encrypted is an vue project code, the code compiling unit is specifically a first compiling unit, and the first compiling unit is configured to: and calling an Emscript compiler to compile the code to be encrypted into a wasm binary file.
The present application also provides a code encryption apparatus, including:
a memory for storing a computer program;
a processor for implementing the steps of the code encryption method when executing the computer program.
The present application also provides a readable storage medium having a program stored thereon, which when executed by a processor implements the steps of the code encryption method.
According to the code encryption method, after the code to be encrypted is determined, the code is compiled into the binary file, the requirement for protecting the code is met by utilizing the characteristic that the binary file is difficult to decode, compared with the traditional js obfuscated encryption mode, the difficulty for decoding the code logic is greatly improved, meanwhile, obfuscated codes are not introduced, the binary file can be directly operated when the function is called and executed, the performance can be improved to the greatest extent, the execution of the code can fully exert the hardware performance, so that the primary efficiency is achieved, and the execution efficiency is improved.
The application also provides a code encryption device, equipment and a readable storage medium, which have the beneficial effects and are not described again.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a code encryption method provided in an embodiment of the present application;
FIG. 2 is a schematic diagram of item vue according to an embodiment of the present application;
fig. 3 is a block diagram of a code encryption apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a code encryption device according to an embodiment of the present application.
Detailed Description
The core of the application is to provide a code encryption method, which can improve the accuracy and the efficiency of website protection and simultaneously maximally reduce the false interception; at the other core of the application, a code encryption device, equipment and a readable storage medium are provided.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a flowchart of a code encryption method provided in this embodiment, where the method mainly includes the following steps:
step s110, determining a code to be encrypted;
the code to be encrypted is a code portion to be encrypted and protected, and may be a certain specified function code or a completed code portion implementing a certain function. The codes to be encrypted are all guaranteed to be js codes as far as possible, so that normal conversion and execution of subsequent binary systems are guaranteed.
In this embodiment, a determination implementation manner of the code to be encrypted is not limited, for example, the imported code may be received and used as the code to be encrypted, or the complete code may be extracted through logic operation, and the extracted code is used as the code to be encrypted.
Optionally, an implementation manner of determining a code to be encrypted mainly includes the following steps:
(1) determining an original code to be protected;
(2) determining logic operation to be protected in an original code;
(3) converting the logic operation to be protected into a function as a function to be encrypted;
(4) performing programming language conversion on a function to be encrypted to obtain a function code to be encrypted;
the process of performing programming language conversion on the function to be encrypted may specifically be: and converting the programming language of the function to be encrypted according to the Rust or C + + programming language. The two programming language types can realize excellent reading and language conversion under compatible effect, in this embodiment, only the above language conversion mode is taken as an example for introduction, and other functions and modules capable of realizing language conversion are not described herein again.
(5) And taking the function code to be encrypted as the code to be encrypted.
In the code determination mode, encryption of a key logic part (namely logic operation) can be realized, the encrypted key logic part can be conveniently called, and input and output data can be written in a traditional mode, so that subsequent program calling is facilitated.
In this embodiment, only the code determination method is taken as an example for detailed description, and other processes for determining a code to be encrypted based on the present application can refer to the above description, and are not described herein again.
Step s120, calling a compiler to compile the code to be encrypted into a binary file;
the compiler is used to convert the code into a binary file, and the specific type of the compiler is not limited in this embodiment, and may be an javascript compiler, for example, which may implement the above functions.
In the embodiment, the codes to be encrypted are compiled into the binary file, and the binary file is greatly improved in the decoding difficulty of code logic compared with the traditional js obfuscated encryption mode, so that the codes to be encrypted are compiled into the binary file to be stored, the reliable encryption of the codes can be realized, and meanwhile, when the codes are encrypted through binary conversion, additional obfuscated codes or an original abstract syntax tree is not introduced, the execution influence of the obfuscated codes and the modification of an original language book on the original codes is avoided, and the binary file can be directly called to realize functional response, so that the encryption processing mode can ensure the safety of the codes and can also ensure efficient code execution.
Step s130, adding the binary file to a destination address in a destination project;
the target item is the item of the code to be protected, which is called to realize the function response, and the target address is the area of the binary file stored in the target item.
After the binary file is added to the destination address in the destination project, the destination project can directly realize the call of the binary file from the destination address.
And step s140, calling the binary file to perform function execution according to the binary file operation rule in the target project.
The binary file operation rule is used for realizing direct calling of the binary code file, and specific setting of the operation rule may refer to introduction of related technologies, which is not limited herein.
In this embodiment, the secure encrypted and stored binary file is directly called to implement function calling while ensuring normal function implementation of the code to be protected, and a specific calling implementation manner based on the binary file may refer to the description of the related art and is not described herein again.
Based on the above description, in the code encryption method provided in this embodiment, after the code to be encrypted is determined, the code is compiled into a binary file, and the requirement for protecting the code is met by using the characteristic that the binary file is difficult to decode.
In the foregoing embodiment, specific function implementation under different application scenarios is not limited, and in this embodiment, an optimized implementation scheme applied to the vue project is described, and specifically, a method for encrypting a vue logic function based on WebAssembly is provided, which is directed to solving security risks and copyright risks caused by exposure of logic codes in the Vue project, and improving code execution efficiency.
In this embodiment, the vue project is applied, the vue project is a commonly used browser, as shown in fig. 2, a vue project schematic diagram is shown, and the vue project is divided into three parts: a UI interface, a JavaScript layer and a WebAssembly layer. The UI interface is responsible for displaying data and obtaining operation of a user; the JavaScript layer is used as an intermediate layer between the wap and the UI and is responsible for acquiring the operation of a user of the UI, acquiring corresponding data and transmitting the data into the WebAssembly layer, and acquiring processed data of the WebAssembly layer and displaying the processed data on the UI; the WebAssembly layer is mainly responsible for corresponding processing operations of data, code encryption is mainly performed through WebAssembly in the embodiment, and logical functions in vue browser projects are extracted and compiled into a wap binary file, so that function code logics can be effectively prevented from being decoded, meanwhile, the binary format is directly operated, hardware capability can be fully played, and program performance can be improved.
It should be noted that, in this embodiment, the escripten compiler is called to perform code compilation, and the escripten SDK needs to be installed and the environment variable needs to be configured when the operating condition of the escripten compiler is met, so that the code compilation operation can be performed only after the escripten SDK is installed and the environment variable is configured.
The specific implementation steps are as follows:
(1) converting the logic operation to be protected in the vue item into a function as a function to be encrypted;
for example: an operation item needs to be added after each column of data in a certain table, and the operation can be extracted and used as a logic operation to be protected to make a table operation item adding function, so that the logic operation is encrypted and normal input and output processing of the logic operation is guaranteed.
And the analysis logic operation needs the input parameters, the operation is carried out and the parameters need to be returned, and the situation that the parameters do not need to be input or returned or are not needed in actual use can be judged by a coding person according to the situation. For example, if there is a part of logic that needs to obtain the sum of two parameters, the part of the function that operates the abstraction needs A, B that needs to be added as an incoming parameter, C needs a + B as an operation, and C needs to be returned as a sum. The purpose of executing the operation of the part can be achieved by inputting the parameters.
It should be noted that, if the actual encoding experience is rich, or the code to be protected is an entire segment of code, this step may be skipped.
(2) Performing programming language conversion on a function to be encrypted to obtain a program file;
and (4) performing programming language conversion on the function to be encrypted so as to ensure that input data can obtain a required correct result.
The purpose of this step is to convert the logic operation into the logic code, in this embodiment, only Rust/C + is taken as an example of the programming language type, that is, the programming language conversion of the function to be encrypted can specifically implement the function according to the programming languages such as Rust/C + +, and the like, and the two language forms have strong compatibility, and can ensure a better browser support effect.
Specifically, the process of implementing the function according to the programming language may refer to the description of the related art, and will not be described herein again.
(3) Calling an Emscript compiler to compile the program file compiled in the step (2) into a wasm binary file;
in this embodiment, an emscript compiler is used to compile the program file, and the compiler can achieve a better browser support effect, and the compiler type is taken as an example here.
WebAssembly (abbreviated wasm) is an open standard developed by the community group of W3C that is a secure, portable, low-level code designed for efficient execution and compact representation. Its main goal is to enable high performance applications on the Web without the need for network specific assumptions or to provide specific customized network functions so it can be used directly in other environments, i.e. good cross-platform characteristics.
In this embodiment, the file type encrypted by the wasm binary file and the file type realized by the function are selected, and the main reason is that the wasm is a binary file supported by a browser specified by the association of W3C, the binary file has extremely high security and huge decompilation difficulty, and meanwhile, the performance of the binary file is extremely high, so that the native performance can be almost achieved. Or may be compiled into other types of binary files, which are not described in detail in this embodiment.
And a specific implementation manner of compiling the program file written in the second step into a wasm binary file by using an Emscript compiler is as follows: the terminal window in the emscript compiles the program file into a WASM binary file by inputting a command 'emcc hello.c-s WASM ═ 1-o hello.js', wherein hello.c is a file name required to be compiled, and hello.js is an example file name for importing the binary file.
(4) And (4) introducing the wasm file generated in the step (3) into the project, and calling to realize the function through js where required.
The embodiment collects the direct operation binary files, can ensure the confidentiality of codes in the operation process and simultaneously ensures the realization of normal service functions.
The implementation process of directly invoking and running the binary file may refer to an implementation manner of the related art, which is not limited herein. For a better understanding, an implementation of step (4) is introduced here: loading a file through a catch (path) function, converting the file into an ArrayBuffer by using an ArrayBuffer () subfunction, and finally obtaining a file instance module (the instance name can be customized) by using a WebAssembly. compact (ArrayBuffer) function; secondly, initializing a variable environment by ' images, env, memorybase, | { } ', and creating a variable map by executing ' images, env, memorybase, | new webassistant, | memory ({ initial:256} ' statement memory space, and ' images, env, tablebase | |0 ' and ' images, env, memoryband, | new webassistant, | memory 0 ' and ' images, env, tabletree, | new webtable |0 ', and ' images, env, tabletree, | webtable. And thirdly, creating a WebAssembly instance through a new WebAssembly.Instance (module, objects), wherein the instance is named as instance, module and objects are respectively a file instance and a variable Object after the previous two steps of operations, and a required function can be derived through the instance. Wherein: path is the file path and objects is the incoming variable Object.
In the embodiment, the logic operation in the vue project is converted into the wsm binary file, the requirement for protecting the code is met due to the characteristic that the binary file is difficult to decode, and meanwhile, the hardware performance can be fully played when the wsm runs on the browser, so that the performance is greatly improved compared with the traditional js obfuscated encryption mode.
Referring to fig. 3, fig. 3 is a block diagram of a code encryption apparatus provided in the present embodiment; the device mainly includes: a code determination unit 110, a code compiling unit 120, a file adding unit 130, and a file calling unit 140. The code encryption device provided by the embodiment can be mutually compared with the code encryption method.
The code determination unit 110 is mainly used for determining a code to be encrypted;
the code compiling unit 120 is mainly used for calling a compiler to compile the code to be encrypted into a binary file;
the file adding unit 130 is mainly used for adding the binary file to a destination address in a destination project;
the file calling unit 140 is mainly used for calling the binary file to perform function execution according to the binary file operation rule in the destination project.
Optionally, the code determining unit may specifically include:
an original code determining subunit, configured to determine an original code to be protected;
the logic operation determining subunit is used for determining the logic operation to be protected in the original code;
the function conversion subunit is used for converting the logic operation to be protected into a function which is used as a function to be encrypted;
the language conversion subunit is used for performing programming language conversion on the function to be encrypted to obtain a function code to be encrypted;
and the code acquiring subunit is used for taking the function code to be encrypted as the code to be encrypted.
Optionally, the language conversion subunit may specifically be: a first language conversion subunit to: and converting the programming language of the function to be encrypted according to the Rust or C + + programming language.
Optionally, when the code to be encrypted is vue project code, the code compiling unit may specifically be a first compiling unit, and the first compiling unit is configured to: and calling an Emscript compiler to compile the code to be encrypted into a wasm binary file.
The present embodiment provides a code encryption device, which mainly includes: a memory and a processor.
Wherein, the memory is used for storing programs;
the processor is configured to implement the steps of the code encryption method described in the above embodiments when executing the program, and specifically, reference may be made to the description of the code encryption method.
Referring to fig. 4, a schematic structural diagram of a code encryption apparatus provided in this embodiment is shown, where the code encryption apparatus may generate a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 322 (e.g., one or more processors) and a memory 332, where the memory 332 stores one or more computer applications 342 or data 344. Memory 332 may be, among other things, transient or persistent storage. The program stored in memory 332 may include one or more modules (not shown), each of which may include a sequence of instructions operating on a data processing device. Still further, the central processor 322 may be configured to communicate with the memory 332 to execute a series of instruction operations in the storage medium 330 on the code encryption device 301.
The code encryption apparatus 301 may also include one or more power supplies 326, one or more wired or wireless network interfaces 350, one or more input-output interfaces 358, and/or one or more operating systems 341, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and so forth.
The steps in the code encryption method described above in fig. 1 can be implemented by the structure of the code encryption device introduced in the present embodiment.
The present embodiment discloses a readable storage medium, on which a program is stored, and the program, when executed by a processor, implements the steps of the code encryption method described in the above embodiments, which can be referred to in the description of the code encryption method in the above embodiments.
The readable storage medium may be a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and various other readable storage media capable of storing program codes.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The code encryption method, device, equipment and readable storage medium provided by the application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.

Claims (10)

1. A method for encrypting code, the method comprising:
determining a code to be encrypted;
calling a compiler to compile the code to be encrypted into a binary file;
adding the binary file to a destination address in a destination project;
and calling the binary file to perform function execution in the target project according to the binary file operation rule.
2. The code encryption method of claim 1, wherein said determining a code to be encrypted comprises:
determining an original code to be protected;
determining a logic operation to be protected in the original code;
converting the logic operation to be protected into a function as a function to be encrypted;
performing programming language conversion on the function to be encrypted to obtain a function code to be encrypted;
and taking the function code to be encrypted as the code to be encrypted.
3. The code encryption method of claim 2, wherein performing programming language conversion on the function to be encrypted comprises: and performing programming language conversion on the function to be encrypted according to Rust or C + + programming language.
4. The code encryption method according to any one of claims 1 to 3, wherein when the code to be encrypted is vue project code, the calling compiler compiles the code to be encrypted into a binary file including: and calling an Emscript compiler to compile the code to be encrypted into a wasm binary file.
5. A code encryption apparatus, characterized in that the apparatus comprises:
a code determination unit for determining a code to be encrypted;
the code compiling unit is used for calling a compiler to compile the code to be encrypted into a binary file;
the file adding unit is used for adding the binary file to a destination address in a destination project;
and the file calling unit is used for calling the binary file to perform function execution in the target item according to the binary file operation rule.
6. The code encryption apparatus according to claim 5, wherein the code determination unit includes:
an original code determining subunit, configured to determine an original code to be protected;
a logic operation determining subunit, configured to determine a logic operation to be protected in the original code;
the function conversion subunit is used for converting the logic operation to be protected into a function which is used as a function to be encrypted;
the language conversion subunit is used for performing programming language conversion on the function to be encrypted to obtain a function code to be encrypted;
and the code acquiring subunit is used for taking the function code to be encrypted as the code to be encrypted.
7. The code encryption apparatus according to claim 6, wherein the language conversion subunit is specifically: a first language conversion subunit to: and performing programming language conversion on the function to be encrypted according to Rust or C + + programming language.
8. The code encryption apparatus according to any one of claims 5 to 7, wherein when the code to be encrypted is vue project code, the code compiling unit is specifically a first compiling unit, and the first compiling unit is configured to: and calling an Emscript compiler to compile the code to be encrypted into a wasm binary file.
9. A code encryption apparatus, characterized by comprising:
a memory for storing a computer program;
a processor for implementing the steps of the code encryption method of any one of claims 1 to 4 when executing said computer program.
10. A readable storage medium, characterized in that the readable storage medium has stored thereon a program which, when executed by a processor, implements the steps of the code encryption method according to any one of claims 1 to 4.
CN202011203396.1A 2020-11-02 2020-11-02 Code encryption method and related assembly Pending CN112214736A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011203396.1A CN112214736A (en) 2020-11-02 2020-11-02 Code encryption method and related assembly

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011203396.1A CN112214736A (en) 2020-11-02 2020-11-02 Code encryption method and related assembly

Publications (1)

Publication Number Publication Date
CN112214736A true CN112214736A (en) 2021-01-12

Family

ID=74057964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011203396.1A Pending CN112214736A (en) 2020-11-02 2020-11-02 Code encryption method and related assembly

Country Status (1)

Country Link
CN (1) CN112214736A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113608746A (en) * 2021-08-16 2021-11-05 北京字节跳动网络技术有限公司 Code conversion processing method and device, computer equipment and storage medium
CN113961240A (en) * 2021-12-20 2022-01-21 杭州安恒信息技术股份有限公司 Reverse analysis method for virtualization encryption program and related components
CN114189369A (en) * 2021-11-30 2022-03-15 中国建设银行股份有限公司 Secure communication method and device under browser
CN114307165A (en) * 2021-12-30 2022-04-12 完美世界(北京)软件科技发展有限公司 Plug-in detection method, device, equipment and medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113608746A (en) * 2021-08-16 2021-11-05 北京字节跳动网络技术有限公司 Code conversion processing method and device, computer equipment and storage medium
CN113608746B (en) * 2021-08-16 2023-10-27 北京字节跳动网络技术有限公司 Code conversion processing method, device, computer equipment and storage medium
CN114189369A (en) * 2021-11-30 2022-03-15 中国建设银行股份有限公司 Secure communication method and device under browser
CN114189369B (en) * 2021-11-30 2024-04-26 中国建设银行股份有限公司 Secure communication method and device under browser
CN113961240A (en) * 2021-12-20 2022-01-21 杭州安恒信息技术股份有限公司 Reverse analysis method for virtualization encryption program and related components
CN114307165A (en) * 2021-12-30 2022-04-12 完美世界(北京)软件科技发展有限公司 Plug-in detection method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN112214736A (en) Code encryption method and related assembly
CN108681457B (en) Android application program protection method based on code sinking and residual code interpretation
Kim et al. ScanDal: Static analyzer for detecting privacy leaks in android applications
CN110414261B (en) Data desensitization method, device, equipment and readable storage medium
CN104680039B (en) A kind of data guard method and device of application program installation kit
CN109255209B (en) Data processing method, device, equipment and storage medium
KR101861341B1 (en) Deobfuscation apparatus of application code and method of deobfuscating application code using the same
US20170116396A1 (en) Optimizing and protecting software
CN107229848A (en) A kind of code reinforcement means and device
CN112597454A (en) Code obfuscation method, code operation method, device, medium, and apparatus
CN104091100A (en) Software protection method based on intermediate result compiling
CN109948308A (en) Code security guard method, device, electronic equipment and computer readable storage medium
CN101158911A (en) .Net program protection method and device
CN109740315A (en) Constant guard method, device, equipment and storage medium based on Android platform
KR102176742B1 (en) Method of call graph extraction in android apps, recording medium and apparatus for performing the method
WO2021175053A1 (en) Method and apparatus for executing functional module in virtual machine
Menguy et al. Search-based local black-box deobfuscation: understand, improve and mitigate
KR20080021071A (en) Translating expressions in a computing environment
CN110309631B (en) Programming language structure confusion processing method, intelligent terminal and storage medium
JP2005182562A (en) Compiling method and apparatus, and compiler
CN110032838B (en) Script file reinforcement method, device and equipment
CN113626773A (en) Code protection method based on intermediate language
CN108021790B (en) File protection method and device, computing equipment and computer storage medium
KR101436741B1 (en) The method and system for applying security solution program
CN116257867A (en) Secret key encryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination