CN113378123A - Method and system for realizing android terminal extracting shell - Google Patents

Method and system for realizing android terminal extracting shell Download PDF

Info

Publication number
CN113378123A
CN113378123A CN202110647219.0A CN202110647219A CN113378123A CN 113378123 A CN113378123 A CN 113378123A CN 202110647219 A CN202110647219 A CN 202110647219A CN 113378123 A CN113378123 A CN 113378123A
Authority
CN
China
Prior art keywords
function
instruction
dex file
code
checksum value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110647219.0A
Other languages
Chinese (zh)
Inventor
刘德建
丁铖
何巍巍
陈宏展
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tianyi Network Technology Co ltd
Original Assignee
Fujian Tianyi Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tianyi Network Technology Co ltd filed Critical Fujian Tianyi Network Technology Co ltd
Priority to CN202110647219.0A priority Critical patent/CN113378123A/en
Publication of CN113378123A publication Critical patent/CN113378123A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Detection And Correction Of Errors (AREA)

Abstract

The invention provides a method for realizing an android-terminal extracting shell, which comprises the following steps: step S1, extracting functions of the source APK, and analyzing the code structure of the Dex file; step S2, searching the code structure information through the appointed method of the appointed class, and getting the codeltem of the extracted function; step S3, constructing a null instruction set by taking the instruction number and the instruction offset address of the extracted function, covering the original instruction, and storing the function instruction; step S4, recalculating the checksum value in the Dex file, and backfilling the checksum value into the extracted function; step S5, after function backfilling, disabling Dex2oat in the Dex file, and taking the ArtMethod object pointer and function instruction of each method by the hook loadmethod function; step S6, the original instruction of the function to be pumped is backfilled by the aid of the function to be pumped obtained by screening of the ArtMethod object pointer and positioning of the function instruction; the invention can realize APP shell extraction operation.

Description

Method and system for realizing android terminal extracting shell
Technical Field
The invention relates to the technical field of computers, in particular to a method and a system for realizing an android-end extracting shell.
Background
At the android end, security of games and applications is increasingly important. The reinforcement technique is continuously iterated, and is integrally reinforced from the first generation of DEX, the second generation of DEX extracts the function of the source APK, and the third generation of DEX introduces VMP to reinforce the application (
The code protected by the software is partially executed on the virtual machine, so that the protected program is difficult to analyze and crack, the application of the disassembling program and the MAP file enables a user to quickly select the code which needs to be protected so as to avoid cracking), and then the functions of the source APK are extracted and VMP reinforced and mixed; the purpose of reinforcing the game and the application is to increase the difficulty of reverse analysis, protect the game and the application data from being modified or protect the running logic from being utilized and cracked, and increase the benefit of the application and the game.
Disclosure of Invention
In order to overcome the problems, the invention aims to provide a method for realizing an android-end extraction shell capable of realizing APP extraction shell operation.
The invention is realized by adopting the following scheme: a realization method of an android-terminal extraction shell comprises the following steps:
step S1, extracting functions of the source APK, and analyzing the code structure of the Dex file;
step S2, searching the code structure information through the appointed method of the appointed class, and getting the codeltem of the extracted function;
step S3, constructing a null instruction set by taking the instruction number and the instruction offset address of the extracted function, covering the original instruction, and storing the function instruction;
step S4, recalculating the checksum value in the Dex file, and backfilling the checksum value into the extracted function;
step S5, after function backfilling, disabling Dex2oat in the Dex file, and taking the ArtMethod object pointer and function instruction of each method by the hook loadmethod function;
step S6, the original instruction of the evacuated function is backfilled by the extracted function screened by the ArtMethod object pointer and located by the function instruction.
Further, the step S2 is further specifically: and traversing the Dex file according to the structure of the Dex file, and retrieving the code structure information of the Dex file by a specified method of a specified class, namely parsing the Dex file byte by byte according to the structure of the Dex file and taking the code element and the function instruction of the extracted function.
Further, the step S3 is further specifically: the composition of codeltem of the decimated function includes: the number of parameters required by the code to call other methods is ushort outsSize; number of the structure of try _ item in ushort triesSize; the agent debug InfoOff points to the debug information storage position of the section of code and is a debug _ info _ item structure offset address; uininssSize, the size of the instruction list, using 16-bit as a unit, ushort insns, code instructions; the value of ushort padding is 0 and is used for aligning bytes; trylten, exception correlation; encodedCatchHandlerList is abnormally related; in each function method, because the first 16 bytes of codeItem are fixed, a null instruction is constructed directly from a code instruction, all instructions behind the function method are set as null instructions, that is to say, the code instruction and the following parts of the method are all 00 under the 16-system; the instruction of the nullifying instruction portion is then saved.
Further, the step S4 is further specifically: the android art mode of the Dex file verifies the checksum and the checksum value of the Dex file when the Dex file is loaded, and the loading is stopped if the checksum is not correct, so that the checksum and the checksum value need to be recalculated; and recalculating the checksum value of the Dex file after the extraction method, taking the recalculated checksum value and backfilling the recalculated checksum value to cover the original checksum value.
Further, the step S5 is further specifically: since the Dex2 at pre-compilation process in the Dex file can generate a complete Dex file, the Dex2 at pre-compilation process in the Dex file needs to be disabled, and the Dex2 at pre-compilation process in the Dex file can be disabled by using the execute function method at the kernel layer hook.
Further, the step S6 is further specifically: when the system function loadmethod function is executed, a function instruction is obtained according to the ArtMethod object pointer, then the evacuated function is screened, the codeItem offset of the evacuated function in the memory is found according to the ArtMethod object pointer of the evacuated function, and the stored original instruction is backfilled.
The invention also provides a system for extracting the shell by the android terminal, which comprises an extraction module, a retrieval module, a construction module, a calculation module, a forbidding module and a backfilling module, wherein the extraction module extracts the function of the source APK and analyzes the code structure of the Dex file; the retrieval module retrieves the code structure information of the code structure through a specified method of a specified class and takes the code structure information of the extracted function; the constructing module constructs a null instruction set by taking the instruction number and the instruction offset address of the extracted function, covers the original instruction and stores the function instruction; the calculation module recalculates the checksum value in the Dex file and backfills the checksum value into the extracted function; after the function is backfilled, the prohibition module forbids the Dex2oat in the Dex file, and the hook loadmethod function takes the ArtMethod object pointer and the function instruction of each method; the backfill module backfills the original instruction of the evacuated function by the aid of the extracted function screened by the ArtMethod object pointer and located by the function instruction.
Further, the retrieval module is further specifically: and traversing the Dex file according to the structure of the Dex file, and retrieving the code structure information of the Dex file by a specified method of a specified class, namely parsing the Dex file byte by byte according to the structure of the Dex file and taking the code element and the function instruction of the extracted function.
Further, the construction module is further specifically: the composition of codeltem of the decimated function includes: the number of parameters required by the code to call other methods is ushort outsSize; number of the structure of try _ item in ushort triesSize; the agent debug InfoOff points to the debug information storage position of the section of code and is a debug _ info _ item structure offset address; uininssSize, the size of the instruction list, using 16-bit as a unit, ushort insns, code instructions; the value of ushort padding is 0 and is used for aligning bytes; trylten, exception correlation; encodedCatchHandlerList is abnormally related; in each function method, because the first 16 bytes of codeItem are fixed, a null instruction is constructed directly from a code instruction, all instructions behind the function method are set as null instructions, that is to say, the code instruction and the following parts of the method are all 00 under the 16-system; the instruction of the nullifying instruction portion is then saved.
Further, the calculation module is further specifically: the android art mode of the Dex file verifies the checksum and the checksum value of the Dex file when the Dex file is loaded, and the loading is stopped if the checksum is not correct, so that the checksum and the checksum value need to be recalculated; and recalculating the checksum value of the Dex file after the extraction method, taking the recalculated checksum value and backfilling the recalculated checksum value to cover the original checksum value.
Further, the disabling module is further specifically: since the Dex2 at pre-compilation process in the Dex file can generate a complete Dex file, the Dex2 at pre-compilation process in the Dex file needs to be disabled, and the Dex2 at pre-compilation process in the Dex file can be disabled by using the execute function method at the kernel layer hook.
Further, the backfill module further specifically comprises: when the system function loadmethod function is executed, a function instruction is obtained according to the ArtMethod object pointer, then the evacuated function is screened, the codeItem offset of the evacuated function in the memory is found according to the ArtMethod object pointer of the evacuated function, and the stored original instruction is backfilled.
The invention has the beneficial effects that: after the extraction shell is realized, the function of the source APK can be extracted, so that a reverse analyst cannot obtain a complete code when the APK is statically reversed; the application safety of APP is increased; because the dex is extracted and protected on the source APP, the method can be used for realizing the extraction shell of the APP, and a reinforced platform can be made for extracting and protecting the APP in batches; the extraction shell has obvious protection effect, and the protection effect can be realized without consuming the running performance of the App, so the extraction shell is suitable for the protection of various Apps.
Drawings
FIG. 1 is a schematic flow diagram of the process of the present invention.
Fig. 2 is a schematic block diagram of the system of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
Referring to fig. 1, the implementation method of the android-end extracting shell of the present invention includes the following steps:
step S1, extracting functions of the source APK, and analyzing the code structure of the Dex file;
step S2, searching the code structure information through the appointed method of the appointed class, and getting the codeltem of the extracted function;
step S3, constructing a null instruction set by taking the instruction number and the instruction offset address of the extracted function, covering the original instruction, and storing the function instruction;
step S4, recalculating the checksum value in the Dex file, and backfilling the checksum value into the extracted function;
step S5, after function backfilling, disabling Dex2oat in the Dex file, and taking the ArtMethod object pointer and function instruction of each method by the hook loadmethod function;
step S6, the original instruction of the evacuated function is backfilled by the extracted function screened by the ArtMethod object pointer and located by the function instruction.
The invention is further illustrated by the following example:
1. traversing the Dex file according to the structure of the Dex file, and retrieving the code structure information of the Dex file by a specified method of a specified class, namely parsing the Dex file byte by byte according to the structure of the Dex file and taking the code element and the function instruction of the extracted function.
2. The composition of codeltem of the decimated function includes: the number of parameters required by the code to call other methods is ushort outsSize; number of try _ item structures (this size is used to record try-cache/find information); the agent debug InfoOff points to the debug information storage position of the section of code and is a debug _ info _ item structure offset address; uininssSize, the size of the instruction list, using 16-bit as a unit, ushort insns, code instructions; the value of ushort padding is 0 and is used for aligning bytes; trylten, exception correlation; encodedCatchHandlerList is abnormally related; in each function method, because the first 16 bytes of codeItem are fixed, a null instruction is constructed directly from a code instruction, all instructions behind the function method are set as null instructions, that is to say, the code instruction and the following parts of the method are all 00 under the 16-system; the instruction of the nullifying instruction portion is then saved.
3. Since the android art mode of the dex file can check the checksum and checksum value of the dex file when the dex file is loaded, and the loading is stopped if the checksum is not correct, the checksum and checksum value of the dex file needs to be recalculated. The calculation method is that a Dex file is read from a position of 0x0C to the end of the file, and the result, namely the checksum field, of the read byte array is calculated by using an Adler-32 verification algorithm. And recalculating the checksum value of the Dex after the extraction method, taking the recalculated checksum value and backfilling the recalculated checksum value to cover the original checksum value.
4. Since the Dex2 at precompilation process of the Dex file can generate a complete Dex file, and if the application does not disable the Dex2 at precompilation process of the Dex file, the implementation of extracting the shell is meaningless, the Dex2 at precompilation process of the Dex file needs to be disabled, namely the Dex2 at precompilation process of the Dex file can be disabled by using the method of an inline hook function to disable the execute layer hook in the execute function method.
5. Then the opportunity to backfill the instructions. This selects the system function loadmethod function execution here. The benefit here is that the ArtMethod object pointer of the function to be executed and its function instruction (i.e. the ID number of the function method, each unique to the function method) are available here.
6. And a hook loadmethod function obtains a function instruction according to the ArtMethod object pointer, then finds out the codeItem offset of the evacuated function in the memory according to the evacuated function screened out, and backfills the stored original instruction.
The invention is further illustrated by the following specific examples:
some functions of some source APP need to be protected, for example, the function test (), i.e., the function extraction shell protection. Writing a shell APP, and reading a dex file of the APK. The code structure information of test is retrieved according to the specified method through the specified class, and the code item of the test is 030001000200000030081400800000001A 00ED 341A 0143327120910510000E 00. There are 32 bytes, and the first 16 bytes are fixed bytes according to the structure of codeItem. The byte that needs to be evacuated is the last 16 bytes, 1A 00ED 341A 0143327120910510000E 00. It is completely emptied. The new codeItem of test () is 0300010002000000300814008000000000000000000000000000000000000000. 1A 00ED 341A 0143327120910510000E 00 is saved and then the function instruction of test () is saved simultaneously, here 15203. Then looking at the checksum of Dex of the source APP, which is 8912846E, recalculating the checksum of the modified Dex to be 2785815E, overwriting the newly obtained checksum on the original checksum shell APP, disabling the Dex2oat function, then using a hook loadmethod function, taking parameters of the loadmethod, which is ArtMethod dst of the functional method, screening the functional instruction according to the function instruction that the function can be taken by the taken ArtMethod object pointer, when the functional instruction is 15203, proving that the taken ArtMethod object pointer is the extracted function, then obtaining the codeItem of the test () in the memory according to the ArtMethod object pointer, and then backfilling the saved 1A 00ED 341A 0143327120910510000E 00.
Referring to fig. 2, the present invention further provides a system for extracting a shell from an android terminal, including an extraction module, a retrieval module, a construction module, a calculation module, a disabling module, and a backfill module, where the extraction module extracts a function of a source APK and analyzes a code structure of a Dex file; the retrieval module retrieves the code structure information of the code structure through a specified method of a specified class and takes the code structure information of the extracted function; the constructing module constructs a null instruction set by taking the instruction number and the instruction offset address of the extracted function, covers the original instruction and stores the function instruction; the calculation module recalculates the checksum value in the Dex file and backfills the checksum value into the extracted function; after the function is backfilled, the prohibition module forbids the Dex2oat in the Dex file, and the hook loadmethod function takes the ArtMethod object pointer and the function instruction of each method; the backfill module backfills the original instruction of the evacuated function by the aid of the extracted function screened by the ArtMethod object pointer and located by the function instruction.
The retrieval module is further specifically: traversing the Dex file according to the Dex file structure, and retrieving the code structure information of the Dex file by a specified method of a specified class, namely parsing the Dex file byte by byte according to the structure of the Dex file and taking the code element and the function instruction of the extracted function.
The construction module is further embodied as follows: the composition of codeltem of the decimated function includes: the number of parameters required by the code to call other methods is ushort outsSize; number of the structure of try _ item in ushort triesSize; the agent debug InfoOff points to the debug information storage position of the section of code and is a debug _ info _ item structure offset address; uininssSize, the size of the instruction list, using 16-bit as a unit, ushort insns, code instructions; the value of ushort padding is 0 and is used for aligning bytes; trylten, exception correlation; encodedCatchHandlerList is abnormally related; in each function method, because the first 16 bytes of codeItem are fixed, a null instruction is constructed directly from a code instruction, all instructions behind the function method are set as null instructions, that is to say, the code instruction and the following parts of the method are all 00 under the 16-system; the instruction of the nullifying instruction portion is then saved.
The calculation module is further specifically: the android art mode of the Dex file verifies the checksum and the checksum value of the Dex file when the Dex file is loaded, and the loading is stopped if the checksum is not correct, so that the checksum and the checksum value need to be recalculated; and recalculating the checksum value of the Dex file after the extraction method, taking the recalculated checksum value and backfilling the recalculated checksum value to cover the original checksum value.
The disabling module is further specifically: since the Dex2 at pre-compilation process in the Dex file can generate a complete Dex file, the Dex2 at pre-compilation process in the Dex file needs to be disabled, and the Dex2 at pre-compilation process in the Dex file can be disabled by using the execute function method at the kernel layer hook.
The backfill module further comprises: when the system function loadmethod function is executed, a function instruction is obtained according to the ArtMethod object pointer, then the evacuated function is screened, the codeItem offset of the evacuated function in the memory is found according to the ArtMethod object pointer of the evacuated function, and the stored original instruction is backfilled.
The above description is only a preferred embodiment of the present invention, and all equivalent changes and modifications made in accordance with the claims of the present invention should be covered by the present invention.

Claims (12)

1. A realization method of an android-terminal extraction shell is characterized by comprising the following steps:
step S1, extracting functions of the source APK, and analyzing the code structure of the Dex file;
step S2, searching the code structure information through the appointed method of the appointed class, and getting the codeltem of the extracted function;
step S3, constructing a null instruction set by taking the instruction number and the instruction offset address of the extracted function, covering the original instruction, and storing the function instruction;
step S4, recalculating the checksum value in the Dex file, and backfilling the checksum value into the extracted function;
step S5, after function backfilling, disabling Dex2oat in the Dex file, and taking the ArtMethod object pointer and function instruction of each method by the hook loadmethod function;
step S6, the original instruction of the evacuated function is backfilled by the extracted function screened by the ArtMethod object pointer and located by the function instruction.
2. The implementation method of the android-terminated extraction shell according to claim 1, characterized in that: the step S2 further includes: and traversing the Dex file according to the structure of the Dex file, and retrieving the code structure information of the Dex file by a specified method of a specified class, namely parsing the Dex file byte by byte according to the structure of the Dex file and taking the code element and the function instruction of the extracted function.
3. The implementation method of the android-terminated extraction shell according to claim 1, characterized in that: the step S3 further includes: the composition of codeltem of the decimated function includes: the number of parameters required by the code to call other methods is ushort outsSize; number of the structure of try _ item in ushort triesSize; the agent debug InfoOff points to the debug information storage position of the section of code and is a debug _ info _ item structure offset address; uininssSize, the size of the instruction list, using 16-bit as a unit, ushort insns, code instructions; the value of ushort padding is 0 and is used for aligning bytes; trylten, exception correlation; encodedCatchHandlerList is abnormally related; in each function method, because the first 16 bytes of codeItem are fixed, a null instruction is constructed directly from a code instruction, all instructions behind the function method are set as null instructions, that is to say, the code instruction and the following parts of the method are all 00 under the 16-system; the instruction of the nullifying instruction portion is then saved.
4. The implementation method of the android-terminated extraction shell according to claim 1, characterized in that: the step S4 further includes: the android art mode of the Dex file verifies the checksum and the checksum value of the Dex file when the Dex file is loaded, and the loading is stopped if the checksum is not correct, so that the checksum and the checksum value need to be recalculated; and recalculating the checksum value of the Dex file after the extraction method, taking the recalculated checksum value and backfilling the recalculated checksum value to cover the original checksum value.
5. The implementation method of the android-terminated extraction shell according to claim 1, characterized in that: the step S5 further includes: since the Dex2 at pre-compilation process in the Dex file can generate a complete Dex file, the Dex2 at pre-compilation process in the Dex file needs to be disabled, and the Dex2 at pre-compilation process in the Dex file can be disabled by using the execute function method at the kernel layer hook.
6. The implementation method of the android-terminated extraction shell according to claim 1, characterized in that: the step S6 further includes: when the system function loadmethod function is executed, a function instruction is obtained according to the ArtMethod object pointer, then the evacuated function is screened, the codeItem offset of the evacuated function in the memory is found according to the ArtMethod object pointer of the evacuated function, and the stored original instruction is backfilled.
7. The utility model provides a system of tall and erect end extraction shell which characterized in that: the extraction module extracts a function of a source APK and analyzes a code structure of a Dex file; the retrieval module retrieves the code structure information of the code structure through a specified method of a specified class and takes the code structure information of the extracted function; the constructing module constructs a null instruction set by taking the instruction number and the instruction offset address of the extracted function, covers the original instruction and stores the function instruction; the calculation module recalculates the checksum value in the Dex file and backfills the checksum value into the extracted function; after the function is backfilled, the prohibition module forbids the Dex2oat in the Dex file, and the hook loadmethod function takes the ArtMethod object pointer and the function instruction of each method; the backfill module backfills the original instruction of the evacuated function by the aid of the extracted function screened by the ArtMethod object pointer and located by the function instruction.
8. The system of claim 7, wherein the android-terminated extraction shell comprises: the retrieval module is further specifically: and traversing the Dex file according to the structure of the Dex file, and retrieving the code structure information of the Dex file by a specified method of a specified class, namely parsing the Dex file byte by byte according to the structure of the Dex file and taking the code element and the function instruction of the extracted function.
9. The system of claim 7, wherein the android-terminated extraction shell comprises: the construction module is further embodied as follows: the composition of codeltem of the decimated function includes: the number of parameters required by the code to call other methods is ushort outsSize; number of the structure of try _ item in ushort triesSize; the agent debug InfoOff points to the debug information storage position of the section of code and is a debug _ info _ item structure offset address; uininssSize, the size of the instruction list, using 16-bit as a unit, ushort insns, code instructions; the value of ushort padding is 0 and is used for aligning bytes; trylten, exception correlation; encodedCatchHandlerList is abnormally related; in each function method, because the first 16 bytes of codeItem are fixed, a null instruction is constructed directly from a code instruction, all instructions behind the function method are set as null instructions, that is to say, the code instruction and the following parts of the method are all 00 under the 16-system; the instruction of the nullifying instruction portion is then saved.
10. The system of claim 7, wherein the android-terminated extraction shell comprises: the calculation module is further specifically: the android art mode of the Dex file verifies the checksum and the checksum value of the Dex file when the Dex file is loaded, and the loading is stopped if the checksum is not correct, so that the checksum and the checksum value need to be recalculated; and recalculating the checksum value of the Dex file after the extraction method, taking the recalculated checksum value and backfilling the recalculated checksum value to cover the original checksum value.
11. The system of claim 7, wherein the android-terminated extraction shell comprises: the disabling module is further specifically: since the Dex2 at pre-compilation process in the Dex file can generate a complete Dex file, the Dex2 at pre-compilation process in the Dex file needs to be disabled, and the Dex2 at pre-compilation process in the Dex file can be disabled by using the execute function method at the kernel layer hook.
12. The system of claim 7, wherein the android-terminated extraction shell comprises: the backfill module further comprises: when the system function loadmethod function is executed, a function instruction is obtained according to the ArtMethod object pointer, then the evacuated function is screened, the codeItem offset of the evacuated function in the memory is found according to the ArtMethod object pointer of the evacuated function, and the stored original instruction is backfilled.
CN202110647219.0A 2021-06-10 2021-06-10 Method and system for realizing android terminal extracting shell Pending CN113378123A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110647219.0A CN113378123A (en) 2021-06-10 2021-06-10 Method and system for realizing android terminal extracting shell

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110647219.0A CN113378123A (en) 2021-06-10 2021-06-10 Method and system for realizing android terminal extracting shell

Publications (1)

Publication Number Publication Date
CN113378123A true CN113378123A (en) 2021-09-10

Family

ID=77573599

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110647219.0A Pending CN113378123A (en) 2021-06-10 2021-06-10 Method and system for realizing android terminal extracting shell

Country Status (1)

Country Link
CN (1) CN113378123A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108491235A (en) * 2018-03-21 2018-09-04 北京理工大学 In conjunction with the DEX guard methods of dynamic load and function Nativeization
CN110046497A (en) * 2018-01-16 2019-07-23 腾讯科技(深圳)有限公司 A kind of function hook implementation method, device and storage medium
CN110232262A (en) * 2019-06-17 2019-09-13 中金金融认证中心有限公司 A kind of reinforcement means and system of Android application
CN112214266A (en) * 2020-10-12 2021-01-12 广州大学 Android shelling method and device for deception call chain, storage medium and computer equipment
CN112214267A (en) * 2020-10-12 2021-01-12 广州大学 Android shelling acceleration method and device, storage medium and computer equipment
CN112883374A (en) * 2021-02-02 2021-06-01 电子科技大学 General Android platform application program shelling method and system based on ART environment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110046497A (en) * 2018-01-16 2019-07-23 腾讯科技(深圳)有限公司 A kind of function hook implementation method, device and storage medium
CN108491235A (en) * 2018-03-21 2018-09-04 北京理工大学 In conjunction with the DEX guard methods of dynamic load and function Nativeization
CN110232262A (en) * 2019-06-17 2019-09-13 中金金融认证中心有限公司 A kind of reinforcement means and system of Android application
CN112214266A (en) * 2020-10-12 2021-01-12 广州大学 Android shelling method and device for deception call chain, storage medium and computer equipment
CN112214267A (en) * 2020-10-12 2021-01-12 广州大学 Android shelling acceleration method and device, storage medium and computer equipment
CN112883374A (en) * 2021-02-02 2021-06-01 电子科技大学 General Android platform application program shelling method and system based on ART environment

Similar Documents

Publication Publication Date Title
CN106203120B (en) A kind of multiple spot Hook reverse method for Android reinforcement application
US11687645B2 (en) Security control method and computer system
US8327100B2 (en) Execute only access rights on a Von Neuman architectures
CN107480476B (en) Android native layer instruction compiling virtualization shell adding method based on ELF infection
CN109255235B (en) Mobile application third-party library isolation method based on user state sandbox
CN110232262A (en) A kind of reinforcement means and system of Android application
David et al. Specification of concretization and symbolization policies in symbolic execution
US8595680B1 (en) Constrained random error injection for functional verification
US20200183809A1 (en) Usage amount monitoring method and monitoring unit of electronic control unit for vehicle
CN108595950A (en) A kind of safe Enhancement Methods of SGX of combination remote authentication
CN105760721B (en) A kind of software reinforcement method and system
CN115659333A (en) Sandbox based on binary instrumentation, memory isolation method and storage medium
CN112214267A (en) Android shelling acceleration method and device, storage medium and computer equipment
Dofferhoff et al. iscanu: A portable scanner for undocumented instructions on risc processors
CN108763924A (en) Insincere third party library access right control method in a kind of Android application program
CN105205398A (en) Shell checking method based on dynamic behaviors of APK (android package) packing software
CN106127054B (en) A kind of system-level safety protecting method towards smart machine control instruction
CN113378123A (en) Method and system for realizing android terminal extracting shell
CN109214184B (en) Universal automatic shelling method and device for Android reinforced application program
Chen et al. Security analysis of x86 processor microcode
CN115758356A (en) Method, storage medium and equipment for implementing credible static measurement on Android application
CN113419734B (en) Application program reinforcing method and device and electronic equipment
CN104615935A (en) Hiding method geared to Xen virtualization platform
CN105988811B (en) The method and apparatus for obtaining the kernel control flow chart of operating system
KR20210057239A (en) Apparatus and method for disabling anti-debugging

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination