CN112685697B - Method and terminal for preventing cracking and tampering of Ann Zhuo Ying application - Google Patents

Method and terminal for preventing cracking and tampering of Ann Zhuo Ying application Download PDF

Info

Publication number
CN112685697B
CN112685697B CN201910987549.7A CN201910987549A CN112685697B CN 112685697 B CN112685697 B CN 112685697B CN 201910987549 A CN201910987549 A CN 201910987549A CN 112685697 B CN112685697 B CN 112685697B
Authority
CN
China
Prior art keywords
calling
android application
starting
logic
preset number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910987549.7A
Other languages
Chinese (zh)
Other versions
CN112685697A (en
Inventor
刘德建
苏昌骏
王杰光
郭玉湖
陈宏�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian TQ Digital Co Ltd
Original Assignee
Fujian TQ Digital Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian TQ Digital Co Ltd filed Critical Fujian TQ Digital Co Ltd
Priority to CN201910987549.7A priority Critical patent/CN112685697B/en
Publication of CN112685697A publication Critical patent/CN112685697A/en
Application granted granted Critical
Publication of CN112685697B publication Critical patent/CN112685697B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a terminal for preventing cracking and tampering of an android Zhuo Ying application, wherein a preset number of key starting processes of the android application are determined, and a calling sequence of the preset number of key starting processes is set to form a corresponding calling logic; packaging and compiling the calling logic into a so file; the android application is modified and can only be started through the so file; and the android application is limited to be normally started only according to the calling sequence of the preset number of key starting processes, so that the difficulty of cracking and tampering the android application is improved.

Description

Method and terminal for preventing cracking and tampering of Ann Zhuo Ying application
Technical Field
The invention relates to the technical field of android application security, in particular to a method for preventing an android Zhuo Ying application from being cracked and tampered.
Background
At present, malicious attacks to android applications in the market are more and more violent, installation packages of the android applications are stored in an APK file format, source codes of the android programs can be obtained by using a compression tool or a reverse tool, some key algorithms and business logic in the application programs can be known by analyzing the source codes, and even malicious tampering and destruction can be performed on software by inserting codes. In order to solve the problems, the android application is generally subjected to shell processing to prevent the APK file from being decompiled. And encrypting the source APK file by using an encryption algorithm, combining the shell APK with the source APK to obtain a new dex file, and replacing the dex file in the shell program to obtain the new APK. We call the new APK file as a decapsulation program APK, which is responsible for decrypting the source APK file and loading the APK so that it can run normally. Although this approach can effectively prevent the inverse tool from decompiling the android program, it still needs to make a shell removal program in the APK itself for decryption, which affects the application start performance, and the shell addition technology at present is mostly provided by a third party platform, for example: encryption is favored, slit reinforcement is tied, and the like, fixed shell adding schemes are easy to be cracked by others, and meanwhile, some potential safety hazards also exist.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the method and the terminal for preventing the android Zhuo Ying from being cracked and tampered are provided, and the safety of the android application can be improved.
In order to solve the technical problem, the invention adopts a technical scheme that:
a method for preventing hacking and tampering of an ann Zhuo Ying, comprising the steps of:
s1, determining a preset number of key starting processes of the android application, and setting a calling sequence of the preset number of key starting processes to form a corresponding calling logic;
s2, packaging and compiling the calling logic into a so file;
and S3, modifying the android application and starting only through the so file.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a terminal for preventing android applications from being cracked, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
s1, determining a preset number of key starting processes of the android application, and setting a calling sequence of the preset number of key starting processes to form a corresponding calling logic;
s2, packaging and compiling the calling logic into a so file;
and S3, modifying the android application and starting only through the so file.
The invention has the beneficial effects that: by identifying and carding key starting processes of the android application and self-defining the number of the key starting processes of the android application and the calling sequence, the complexity can be freely controlled to improve the difficulty of cracking and tampering of the android application; modifying the key starting process of the android application must be called according to a certain sequence, and even if the android application is damaged and tampered by the outside, a user can not normally start and use the android application after downloading and installing the android application; the calling logic is packaged in the C + + program for compiling, the so file generated after compiling is unreadable in a binary system, when the system is limited to be started and the program can only be loaded through the so file, a malicious attacker cannot check the calling logic of the key starting flow of the android application in the so file due to the self attribute of the so file, so that the android application can be effectively prevented from being cracked and tampered, and the safety of the android application is improved.
Drawings
FIG. 1 is a flow chart of steps in a method of preventing hacking Zhuo Ying tampering, in accordance with an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a terminal for preventing android applications from being cracked and tampered according to an embodiment of the present invention;
description of reference numerals:
1. a terminal for preventing android applications from being cracked and tampered; 2. a memory; 3. a processor.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1, a method for preventing hacking and tampering of an ann Zhuo Ying, the method comprises:
a method for preventing security Zhuo Ying tampering, comprising the steps of:
s1, determining key starting processes of a preset number of the android applications, and setting a calling sequence of the key starting processes of the preset number to form corresponding calling logic;
s2, packaging and compiling the calling logic into a so file;
and S3, modifying the android application and starting only through the so file.
From the above description, the beneficial effects of the present invention are: by identifying and carding key starting processes of the android application and self-defining the number and calling sequence of the key starting processes of the android application, the complexity can be freely controlled to improve the difficulty of cracking and tampering of the android application; modifying the key starting process of the android application must be called according to a certain sequence, and even if the application program is damaged and tampered by the outside, a user can not normally start and use the downloading and installation; the calling logic is packaged in the C + + program for compiling, the so file generated after compiling is unreadable in a binary system, when the system is limited to be started and the program can only be loaded through the so file, a malicious attacker cannot check the calling logic of the key starting process of the application in the so file due to the self attribute of the so file, so that the android application can be effectively prevented from being cracked and tampered, and the safety of the android application is improved.
Further, the step S1 includes:
determining all starting processes which can independently run in the android application and determine whether business logic can normally run after the android application is started;
randomly selecting a preset number of starting processes from all the determined starting processes of the android application;
determining all possible calling sequences of the preset number of starting processes according to the preset number of starting processes;
randomly selecting one of all possible calling sequences as a set calling sequence;
and forming corresponding calling logics according to the randomly selected preset number of starting processes and the corresponding calling sequences.
According to the description, the independently-operated starting process which can influence whether the android application can be normally started is selected as the key starting process with the preset number of the android applications, so that the situation that the android application cannot be normally started when the set key starting process cannot be completely executed can be ensured, and the application safety is improved; and randomly selecting a preset number of key starting processes from all the key starting processes, randomly arranging the selected key starting processes, and selecting one of the key starting processes as a calling sequence, so that the complexity of cracking and tampering of the android application is increased.
Further, the step S1 further includes:
adding a security procedure to the call logic;
the security process is used for pre-embedding a piece of data in the starting process of the android application;
and the data is used for being read and applied by the corresponding business logic after the android application is started, and if the corresponding business logic is not read correctly, the android application exits.
According to the above description, a security process is added as one of the key starting processes with the preset number of android applications, the originally set calling sequence of the key starting processes of the application starting is disassembled, a part of data is initialized and separated to the front of the key process, the complexity of the key starting processes of the application is increased, the data is buried in the application starting process, if the follow-up business logic needs to be executed normally, the data needs to be read correctly, if the data is read incorrectly, the android application exits, and on the premise that the application program can be executed normally only according to the set calling sequence of the key process, a layer of security guarantee is provided, and the security of the android application is further improved.
Further, the step S1 includes:
after the calling logic is determined, modifying a key starting process of the android application, so that the android application can be normally started only according to the determined calling logic;
the step S3 is followed by the step of:
receiving input call logic;
and judging whether the calling sequence of each starting flow and each starting flow contained in the input calling logic is consistent with the calling sequence of each determined key starting flow and each determined key starting flow, and if not, not starting the android application.
According to the description, the android application can be normally operated only by modifying the android application and calling the key starting process according to a certain sequence, and the aim of doing so is that even if the application program is cracked and tampered by the outside, the calling logic related to the key starting process and newly set after tampering is not consistent with the calling logic set by the original android application, and a user downloads and installs the application.
Further, the step S2 includes:
and before packaging the calling logic, performing code obfuscation on the calling logic program.
As can be seen from the above description, the purpose of code obfuscation is to make the call logic become more difficult to understand, so that the call logic program is more difficult to read after being compiled into binary code, and a malicious attacker cannot understand the call logic file to crack and tamper the application program by reading the binary code.
Referring to fig. 2, a terminal for preventing android applications from being hacked and tampered includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the following steps:
s1, determining a preset number of key starting processes of the android application, and setting a calling sequence of the preset number of key starting processes to form a corresponding calling logic;
s2, packaging and compiling the calling logic into a so file;
and S3, modifying the android application and starting only through the so file.
From the above description, the beneficial effects of the present invention are: by identifying and carding key starting processes of the android application and self-defining the number of the key starting processes of the android application and the calling sequence, the complexity can be freely controlled to improve the difficulty of cracking and tampering of the android application; modifying the key starting process of the android application must be called according to a certain sequence, and even if the application program is damaged and tampered by the outside, a user can not normally start and use the downloading and installation; the calling logic is packaged in the C + + program for compiling, the so file generated after compiling is unreadable in a binary system, when the system is limited to be started and the program can only be loaded through the so file, a malicious attacker cannot check the calling logic of the key starting process of the application in the so file due to the self attribute of the so file, so that the android application can be effectively prevented from being cracked and tampered, and the safety of the android application is improved.
Further, the step S1 includes:
determining a starting process which can independently run in the android application and determines whether the business logic can normally run after the android application is started;
randomly selecting a preset number of starting processes from all the determined starting processes of the android application;
determining all possible calling sequences of the preset number of starting processes according to the preset number of starting processes;
randomly selecting one of all possible calling sequences as a set calling sequence;
and forming corresponding calling logics according to the randomly selected preset number of starting processes and the corresponding calling sequence.
According to the description, the independently-operated program which can influence the normal starting of the android application is selected as the key starting process of the preset number of the android applications, so that the situation that the android application cannot be normally started when the set key starting process cannot be completely executed can be ensured, and the application safety is improved. And randomly arranging preset key flows, and selecting one of the preset key flows as a calling sequence, so that the complexity of cracking and tampering the android application is increased.
Further, the step S1 further includes:
adding a security procedure to the call logic;
the security process is used for pre-burying a datum in the starting process of the android application;
and the data is used for being read and applied by the corresponding business logic after the android application is started, and if the corresponding business logic is not read correctly, the android application exits.
According to the above description, a security process is added as one of the key starting processes with the preset number of the android applications, the calling sequence of the originally set key starting processes of the applications is disassembled, a part of data is initialized and separated to the front of the key processes, the complexity of the key starting processes of the applications is increased, the data is buried in the application starting process, if the subsequent services are executed normally, the data needs to be read, applied and judged, the judgment is wrong, the applications exit, and a layer of security guarantee is provided on the premise that the applications can be executed normally only according to the set calling sequence of the key processes.
Further, the step S1 includes:
after the calling logic is determined, modifying a key starting process of the android application, so that the android application can be normally started only according to the determined calling logic;
the step S3 is followed by the step of:
call logic to receive input;
and judging whether the calling sequence of each starting flow and each starting flow contained in the input calling logic is consistent with the calling sequence of each determined key starting flow and each determined key starting flow, and if not, not starting the android application.
According to the description, the android application can be normally operated only by modifying the android application and calling the key starting process according to a certain sequence, and the aim of doing so is that even if the application program is cracked and tampered by the outside, the calling logic related to the key starting process and newly set after tampering is not consistent with the calling logic set by the original android application, a user downloads and installs the application, the android application cannot be executed according to the originally specified key starting process calling sequence, the android application cannot be normally started and used, and the method is equivalent to the failure of tampering the android application, and the safety of the android application is improved.
Further, the step S2 includes:
and before packaging the calling logic, performing code obfuscation on the calling logic program.
As can be seen from the above description, the purpose of code obfuscation is to make the call logic become more difficult to understand, so that the call logic program is more difficult to read after being compiled into binary code, and a malicious attacker cannot understand the call logic file to crack and tamper the application program by reading the binary code.
Example one
Referring to fig. 1, a method for preventing an illegal tampering 5363 by an ann Zhuo Ying includes the following steps:
s1, determining a preset number of key starting processes of the android application, and setting a calling sequence of the preset number of key starting processes to form a corresponding calling logic;
specifically, the step S1 includes:
determining a starting process which can independently run in the android application and determines whether the business logic can normally run after the android application is started;
for example, if a large amount of configuration information is available in the android application, the initialization of the configuration information is a key process, and if no initialization exists, subsequent dependence cannot be performed, so that the initialization process of the configuration information can be used as a key starting process; the login process is also a key starting process which is authority verification, and if the authority verification is not passed, correct login cannot be completed;
randomly selecting a preset number of starting processes from all the determined starting processes of the android application;
determining all possible calling sequences of the preset number of starting processes according to the preset number of starting processes;
randomly selecting one of all possible calling sequences as a set calling sequence;
forming corresponding calling logics according to the randomly selected preset number of starting processes and the corresponding calling sequences;
assuming that all the starting processes of the android application are set to be A, B, C, D, E, F;
randomly selecting 5 starting processes A, B, C, D, E from all the determined starting processes A, B, C, D, E, F of the android application as key starting processes of the preset number of the android application;
determining all possible calling sequences of the preset number of starting processes to be 5 × 4 × 3 × 2=120 types according to the preset number of starting processes;
randomly selecting one A → B → C → D → E from all possible 120 calling orders as a set calling order;
after the calling sequence is determined, modifying a key starting process of the android application, wherein the next process can be normally executed only by the output result of the previous process, so that the android application can be normally started only according to the determined calling logic;
if the call sequence a → B → C → D → E is determined as above, the output result of the flow a is required for the normal execution of the flow B, and if the output result of the flow a is not obtained, the execution of the flow B will report an error. After the modification, the flow E depends on the flow D to output the result, the flow D depends on the flow C to output the result, the flow C depends on the flow B to output the result, and the flow B depends on the flow A to output the result. After the modification, the key flow can only be normally operated after being sequentially executed according to the sequence A → B → C → D → E, otherwise, the key flow cannot be normally started;
s2, packaging and compiling the calling logic into a so file;
wherein the call logic is implemented by a C + + program;
after the calling logic is packaged, code confusion is carried out on the C + + program, the C + + code confusion can be carried out by using tools or artificially, the artificial confusion can be realized by modifying class names, method names and variable names into meaningless unreadable names, the internal calling logic is artificially interfered, and some meaningless and difficultly understood logics are added;
compiling the C + + calling logic program through an NDK (named data link) package provided by android to generate a file with a suffix so;
s3, modifying the android application and starting only through the so file;
specifically, the so library file is loaded into an onCreate () method to be executed;
when the android application is maliciously cracked and tampered by the outside, modifying a key starting flow, and judging whether the modified key starting flow is consistent with a specific key starting flow packaged in the so base file or not, if not, the android application cannot be normally started;
specifically, receiving input call logic;
judging whether the calling sequence of each starting flow and each starting flow contained in the input calling logic is consistent with the calling sequence of each determined key starting flow and each determined key starting flow, and if not, not starting the android application;
the android application is modified, and only a specific key starting process is called according to a specific sequence, so that the android application can be started, namely, a lock is set on the android application; the calling logic of the corresponding key starting process which is packaged in C + + and compiled into the so file is the key corresponding to the lock; the android application can be started only by unlocking the lock through the key, so that the android application cannot be started correctly even if the android application is cracked, the android application cannot be tampered, and the safety of the android application is ensured; the key starting process is mutually bound with the android application, different android applications have different key starting processes, the number of the key starting processes can be customized, and the calling sequence can also be customized, so that the lock has enough complexity, and the decoding difficulty is improved;
preferably, the android application can be further subjected to shell adding processing so as to further improve the security of the android application.
Example two
The method for preventing the security Zhuo Ying from being cracked and tampered is different from the embodiment 1 in that:
the step S1 further includes:
adding a security procedure to the call logic;
the security process is used for pre-burying a datum in the starting process of the android application;
the data is used for being read and applied by the corresponding business logic after the android application is started, and if the corresponding business logic is not read correctly, the android application exits;
specifically, after determining that the preset number of key starting processes A, B, C, D, E of the android application have sequence requirements, that is, when the process B needs to normally execute the output result of the required process a, the complexity of the preset number of key starting processes of the android application is reduced to 1/4 × 3 × 2, and at this time, in order to increase the complexity of the call logic, a security process F may be added to the call logic;
pre-burying a data a in the starting process of the android application in the security process;
and the data a is read and applied by the corresponding business logic after the android application is started, and the android application exits if the corresponding business logic is not read correctly.
EXAMPLE III
Referring to fig. 2, a terminal 1 for preventing android applications from being hacked and tampered includes a memory 2, a processor 3, and a computer program stored in the memory 2 and capable of running on the processor 3, where the processor 3 implements the steps in the first embodiment or the second embodiment when executing the computer program.
In summary, the invention provides a method and a terminal for preventing cracking and tampering of an android Zhuo Ying application, wherein the starting of the android application is limited to be performed according to a set key starting flow sequence, wherein the key starting flow is selected from all key flows which can run independently in the android application and determine whether the android application service logic can run normally, so that the key starting flow is ensured to be executed completely, otherwise, the android application cannot be started normally, and the number and the arrangement sequence of the selected key starting flows are artificially limited, so that the complexity of cracking and tampering of the android application is increased, in order to improve the complexity, a security flow added in the key starting flow provides double guarantee for the android application, and meanwhile, the key starting flow of the android application is reformed according to a calling sequence, even if the android application is cracked and tampered, the android application cannot be started according to the set key starting flow calling sequence; in order to protect the call logic generated by the call sequence of the key starting flow from being stolen, the call logic is packaged and confused by a C + + program and compiled into a binary unreadable so file, so that the difficulty of cracking and tampering the android application is improved, and the safety of the android application is improved.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (8)

1. A method for preventing an Ann Zhuo Ying from being cracked and tampered is characterized by comprising the following steps:
s1, determining a preset number of key starting processes of the android application, and setting a calling sequence of the preset number of key starting processes to form a corresponding calling logic;
s2, packaging and compiling the calling logic into so files;
s3, modifying the android application and starting only through the so file;
the step S1 further includes:
after the calling logic is determined, modifying a key starting process of the android application, so that the android application can be normally started only according to the determined calling logic;
the step S3 is followed by the step of:
call logic to receive input;
and judging whether the calling sequence of each starting flow and each starting flow contained in the input calling logic is consistent with the calling sequence of each determined key starting flow and each determined key starting flow, and if not, not starting the android application.
2. The method for preventing hacking tampering of an ann Zhuo Ying as claimed in claim 1, wherein said step S1 comprises:
determining all starting processes which can independently run in the android application and determine whether business logic can normally run after the android application is started;
randomly selecting a preset number of starting processes from all the determined starting processes of the android application;
determining all possible calling sequences of the preset number of starting processes according to the preset number of starting processes;
randomly selecting one of all possible calling sequences as a set calling sequence;
and forming corresponding calling logics according to the randomly selected preset number of starting processes and the corresponding calling sequence.
3. The method for preventing hacking tampering of an ann Zhuo Ying as claimed in claim 1, wherein said step S1 further comprises:
adding a security flow to the call logic;
the security process is used for pre-embedding a piece of data in the starting process of the android application;
and the data is used for being read and applied by the corresponding business logic after the android application is started, and if the corresponding business logic is not read correctly, the android application quits.
4. The method for preventing hacking tampering of an ann Zhuo Ying as claimed in claim 1, wherein said step S2 further comprises:
and after the calling logic is packaged, performing code obfuscation on the calling logic program.
5. A terminal for preventing hacking and tampering of an android application, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the following steps when executing the computer program:
s1, determining a preset number of key starting processes of the android application, and setting a calling sequence of the preset number of key starting processes to form a corresponding calling logic;
s2, packaging and compiling the calling logic into a so file;
s3, modifying the android application and starting only through the so file;
the step S1 further includes:
after the calling logic is determined, modifying a key starting process of the android application, so that the android application can be normally started only according to the determined calling logic;
the step S3 is followed by the step of:
call logic to receive input;
and judging whether the calling sequence of each starting flow and each starting flow contained in the input calling logic is consistent with the calling sequence of each determined key starting flow and each determined key starting flow, and if not, not starting the android application.
6. The terminal for preventing android applications from being hacked and tampered according to claim 5, wherein the step S1 comprises:
determining all starting processes which can independently run in the android application and determine whether business logic can normally run after the android application is started;
randomly selecting a preset number of starting processes from all the determined starting processes of the android application;
determining all possible calling sequences of the starting processes according to the preset number of the starting processes;
randomly selecting one of all possible calling sequences as a set calling sequence;
and forming corresponding calling logics according to the randomly selected preset number of starting processes and the corresponding calling sequence.
7. The terminal for preventing hacking and tampering of android applications according to claim 5, wherein the step S1 further comprises:
adding a security procedure to the call logic;
the security process is used for pre-embedding a piece of data in the starting process of the android application;
and the data is used for being read and applied by the corresponding business logic after the android application is started, and if the corresponding business logic is not read correctly, the android application exits.
8. The terminal for preventing android applications from being hacked and tampered according to claim 5, wherein the step S2 further comprises:
and before packaging the calling logic, performing code obfuscation on the calling logic program.
CN201910987549.7A 2019-10-17 2019-10-17 Method and terminal for preventing cracking and tampering of Ann Zhuo Ying application Active CN112685697B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910987549.7A CN112685697B (en) 2019-10-17 2019-10-17 Method and terminal for preventing cracking and tampering of Ann Zhuo Ying application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910987549.7A CN112685697B (en) 2019-10-17 2019-10-17 Method and terminal for preventing cracking and tampering of Ann Zhuo Ying application

Publications (2)

Publication Number Publication Date
CN112685697A CN112685697A (en) 2021-04-20
CN112685697B true CN112685697B (en) 2022-10-21

Family

ID=75444491

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910987549.7A Active CN112685697B (en) 2019-10-17 2019-10-17 Method and terminal for preventing cracking and tampering of Ann Zhuo Ying application

Country Status (1)

Country Link
CN (1) CN112685697B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102779255A (en) * 2012-07-16 2012-11-14 腾讯科技(深圳)有限公司 Method and device for judging malicious program
WO2013163903A1 (en) * 2012-05-04 2013-11-07 惠州Tcl移动通信有限公司 Android system-based application program starting method and system
CN107977552A (en) * 2017-12-04 2018-05-01 北京奇虎科技有限公司 A kind of reinforcement means and device of Android application
CN108133126A (en) * 2017-12-04 2018-06-08 北京奇虎科技有限公司 A kind of reinforcement means and device of Android application

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10284575B2 (en) * 2015-11-10 2019-05-07 Fireeye, Inc. Launcher for setting analysis environment variations for malware detection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013163903A1 (en) * 2012-05-04 2013-11-07 惠州Tcl移动通信有限公司 Android system-based application program starting method and system
CN102779255A (en) * 2012-07-16 2012-11-14 腾讯科技(深圳)有限公司 Method and device for judging malicious program
CN107977552A (en) * 2017-12-04 2018-05-01 北京奇虎科技有限公司 A kind of reinforcement means and device of Android application
CN108133126A (en) * 2017-12-04 2018-06-08 北京奇虎科技有限公司 A kind of reinforcement means and device of Android application

Also Published As

Publication number Publication date
CN112685697A (en) 2021-04-20

Similar Documents

Publication Publication Date Title
KR101159487B1 (en) Securing software
KR100946042B1 (en) Tamper-resistant trusted virtual machine
KR101503785B1 (en) Method And Apparatus For Protecting Dynamic Library
US20150095653A1 (en) Method and apparatus of creating application package, method and apparatus of executing application package, and recording medium storing application package
JP5734685B2 (en) Program, method, and storage medium for generating software for checking integrity during execution
KR101216995B1 (en) A code encryption and decryption device against reverse engineering based on indexed table and the method thereof
US8392724B2 (en) Information terminal, security device, data protection method, and data protection program
KR20120032477A (en) Interlocked binary protection using whitebox cryptography
CN104866739A (en) Application program encryption method and application program encryption system in Android system
US9489541B2 (en) Content protection via online servers and code execution in a secure operating system
US20060005248A1 (en) Registry protection
US20110271350A1 (en) method for protecting software
CN103971034A (en) Method and device for protecting Java software
CN112685697B (en) Method and terminal for preventing cracking and tampering of Ann Zhuo Ying application
KR101203245B1 (en) Securing software
CN111611551A (en) Dynamic link library protection method and system based on state cryptographic algorithm
CN114880651A (en) Process white list implementation method and device based on file extension attributes
CN117763587A (en) Algorithm encryption processing method, device, equipment and medium
CN117892319A (en) Method and device for reading encrypted data of solid state disk and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant