CN104866740A - Static analysis preventing method and device for files - Google Patents
Static analysis preventing method and device for files Download PDFInfo
- Publication number
- CN104866740A CN104866740A CN201410064828.3A CN201410064828A CN104866740A CN 104866740 A CN104866740 A CN 104866740A CN 201410064828 A CN201410064828 A CN 201410064828A CN 104866740 A CN104866740 A CN 104866740A
- Authority
- CN
- China
- Prior art keywords
- code
- protected
- ciphertext
- static analysis
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 230000003068 static effect Effects 0.000 title abstract description 8
- 230000006870 function Effects 0.000 description 25
- 238000003860 storage Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000002427 irreversible effect Effects 0.000 description 4
- 239000000203 mixture Substances 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000000151 deposition Methods 0.000 description 2
- 238000005336 cracking Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a static analysis preventing method and device for files, and relates to the technical field of computer software, in particular to a file protection technology. To-be-protected codes in original files are encrypted and stored in a black box, random garbage code blocks are stored in original code positions, so that hackers are prevented from modifying program logics through static analysis of programs, and safety of original codes is guaranteed. The method comprises steps as follows: acquiring addresses of the to-be-protected codes; acquiring random codes according to a preset rule; finding out the to-be-protected codes according to the addresses of the to-be-protected codes and replacing the to-be-protected codes with the random codes. The method and the device are mainly used for static analysis preventing protection of codes of DEX files and SO files in an Android system.
Description
Technical field
The present invention relates to computer software technical field, be specifically related to file protection technique, particularly relate to a kind of method and device of anti-static analysis file.
Background technology
Along with android system is applied more and more widely, make much to arise at the historic moment to applying the instrument carrying out decompiling and static analysis, the application program of some profitabilities is maliciously analyzed, the code logic representing privacy of user can be seized in application by this approach, thus obtain the privacy of user, or the interests etc. of infringement user.
ANDROID APMB package APK is carried out decompress(ion) by zip mode and obtains DEX file and SO file by cracker, thus analyzes the code of DEX file and SO file further.For DEX file, cracker uses the executable file DEX of decompiler to Android to carry out decompiling, thus obtains the code logic of executable file DEX, and carries out malicious modification and reach illegal objective.For SO file, cracker uses the dynamic base SO file of reverse instrument to Android to process, the execution flow process of reverse acquisition dynamic base SO file and logic, thus reach cracking SO file core, and the operations such as patch installing amendment are carried out to SO file, thus change the primitive logic of SO file.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of method and device of anti-static analysis file, solves the technical matters that above background technology part is mentioned.
On the one hand, embodiments provide a kind of method of anti-static analysis file, described method comprises:
Obtain the address of code to be protected;
Random code is obtained according to predetermined rule;
According to the address search of described code to be protected to described code to be protected, and described code to be protected is replaced to described random code.
On the other hand, embodiments provide a kind of device of anti-static analysis file, described device comprises:
Address acquisition module, for obtaining the address of code to be protected;
Random code obtains module, for obtaining random code according to predetermined rule;
Replacement module, for according to the address search of code described to be protected obtained by described address acquisition module to described code to be protected, and described code to be protected is replaced to the described random code being obtained module acquisition by described random code.
The invention provides a kind of method and device of anti-static analysis file; by code encryption to be protected in source document is kept in black box; and original code position deposits random rubbish code block; thus prevent hacker from passing through, to the static analysis update routine logic of program, to ensure that the safety of source code.
Accompanying drawing explanation
Fig. 1 is the method flow diagram of a kind of anti-static analysis file that the embodiment of the present invention provides;
Fig. 2 is the method flow diagram of the anti-static analysis file of another kind that the embodiment of the present invention provides;
Fig. 3 is the method flow diagram of the anti-static analysis file of another kind that the embodiment of the present invention provides;
Fig. 4 is the method flow diagram of the anti-static analysis file of another kind that the embodiment of the present invention provides;
Fig. 5 is the device composition frame chart of a kind of anti-static analysis file that the embodiment of the present invention provides;
Fig. 6 is the device composition frame chart of the anti-static analysis file of another kind that the embodiment of the present invention provides;
Fig. 7 is the device composition frame chart of the anti-static analysis file of another kind that the embodiment of the present invention provides;
Fig. 8 is the device composition frame chart of the anti-static analysis file of another kind that the embodiment of the present invention provides.
Embodiment
In order to make the object, technical solutions and advantages of the present invention clearly, below in conjunction with drawings and Examples, the present invention is described in further detail.Be understandable that, specific embodiment described herein, only for explaining the present invention, but not limitation of the invention.
The specific embodiment of the present invention, as shown in Figure 1, provide a kind of method of anti-static analysis file, as shown in Figure 1, described method comprises:
Step 101: the address obtaining code to be protected.
Particularly; DEX file and SO file can be obtained after ANDROID APMB package APK is carried out decompress(ion); in order to the code preventing cracker from analyzing DEX file and SO file further; in one embodiment of the invention; first will obtain the address of code to be protected in DEX file or SO file, code to be protected normally needs the core code protected, certainly; what code to be protected was concrete chooses mode and selection range, and the embodiment of the present invention does not limit this.
Step 102: obtain random code according to predetermined rule.
Wherein, random code is invalid but meets the code of original coding rule, random code is inserted into after in valid code, programmer cannot distinguish which is valid code, which is invalid random code, but, can random code be skipped when program runs to random code place, so the insertion of random code can't affect the operation of original program.
Particularly, in one embodiment of the invention, first according to the coding rule of original, obtain code invalid in a large number, then by these invalid code storage in the random code database corresponding with the coding rule of original, when needs use random code, from corresponding database, extract code at random.In another embodiment of the invention, adopt the random code generator corresponding with the coding rule of original to generate random code, when needs use random code, directly obtain random code by random code generator.It should be noted that, concrete which kind of mode that adopts obtains random code, and the embodiment of the present invention does not all limit this.
Step 103: according to the address search of described code to be protected to described code to be protected, and described code to be protected is replaced to described random code.
Particularly; in one embodiment of the invention; according to the address search of code to be protected to code to be protected; then code to be protected is deleted from original; it should be noted that; can not delete or change the function name of code to be protected, add random code at the address place of original code to be protected.
The invention provides a kind of method of anti-static analysis file; by code to be protected in source document being replaced to invalid but meeting the random code of original coding rule; thus prevent hacker from passing through, to the static analysis update routine logic of program, to ensure that the safety of source code.
In the embodiment of the present invention, provide the method for another kind of anti-static analysis file, as shown in Figure 2, the method comprises:
Step 201: the address obtaining code to be protected.
Step 202: code to be protected according to the address acquisition of described code to be protected.
Step 203: described code to be protected is encrypted, obtains ciphertext.
Preferably, the embodiment of the present invention adopts Hash cryptographic algorithm to treat protecting code to be encrypted.Hash cryptographic algorithm is a kind of irreversible encryption algorithm, and the feature of irreversible encryption algorithm does not need to use key in ciphering process, after input expressly, directly expressly will be processed into ciphertext through cryptographic algorithm by system.Ciphertext after this encryption cannot be decrypted, only re-enters expressly, and again pass through same irreversible cryptographic algorithm process, just can obtain identical encrypted cipher text, and after again being identified by system, could really decipher.Generally, that applies more irreversible encryption algorithm has MD5 algorithm and SHS(Secure HashStandard, safe gibberish standard) etc.Certainly, the concrete mode adopting which kind of encryption, the embodiment of the present invention does not limit this.
Step 204: described ciphertext is stored, and obtain the address storing described ciphertext.
Particularly, in one embodiment of the invention, ciphertext can be stored in the file of one or more new establishment, store the file layout of ciphertext can be any can the file layout of record support ciphertext.Certainly, concrete which kind of stored in file format ciphertext of employing, the embodiment of the present invention does not limit this.It should be noted that, the file storing ciphertext will leave identical storage medium in needing the file protected, so that follow-up when needing the file of protection to call ciphertext, can searching and obtain ciphertext.When there being a large amount of code to be protected, adopting and in this way ciphertext being stored, original data volume can not be made excessive.
In another embodiment of the invention, ciphertext can be stored into the data block of original.In original, generally comprise code block, data block and other several modules, ciphertext can only be stored in the data block portions of original, and code block and other several modules can not deposit ciphertext.When code to be protected is few, adopts and in this way ciphertext is stored, making follow-up when calling ciphertext, more convenient.
It should be noted that, concrete which kind of mode that adopts stores ciphertext, and the embodiment of the present invention does not all limit this.
Step 205: obtain random code according to predetermined rule.
Particularly, in one embodiment of the invention, when needs use random code, from corresponding database, code is extracted at random.In another embodiment of the invention, obtain random code by random code generator.It should be noted that, concrete which kind of mode that adopts obtains random code, and the embodiment of the present invention does not all limit this.
Step 206: according to the address search of described code to be protected to described code to be protected, and described code to be protected is replaced to described random code.
Particularly; in one embodiment of the invention; according to the address search of code to be protected to code to be protected; then code to be protected is deleted from original; it should be noted that; can not delete or change the function name of code to be protected, add random code at the address place of original code to be protected.
It should be noted that, step 202 can be placed on before step 205, also can be placed on after step 205, step 203 ~ step 204 can be placed on before step 205, also can be placed on after step 205, can also be placed on after step 206, concrete which kind of order that adopts performs step 201 ~ step 206, and the embodiment of the present invention does not all limit this.
In the embodiment of the present invention, additionally provide the method for another kind of anti-static analysis file, as shown in Figure 3, the method comprises:
Step 301: the address obtaining code to be protected.
Step 302: code to be protected according to the address acquisition of described code to be protected.
Step 303: described code to be protected is encrypted, obtains ciphertext.
Preferably, the embodiment of the present invention adopts Hash cryptographic algorithm to treat protecting code to be encrypted.Certainly, the concrete mode adopting which kind of encryption, the embodiment of the present invention does not limit this.
Step 304: described ciphertext is stored, and obtain the address storing described ciphertext.
Particularly, in one embodiment of the invention, ciphertext can be stored in the file of one or more new establishment, store the file layout of ciphertext can be any can the file layout of record support ciphertext.Which kind of stored in file format ciphertext of concrete employing, the embodiment of the present invention does not limit this.In another embodiment of the invention, ciphertext can be stored into the data block of original.It should be noted that, concrete which kind of mode that adopts stores ciphertext, and the embodiment of the present invention does not all limit this.
Step 305: obtain random code according to predetermined rule.
Particularly, in one embodiment of the invention, when needs use random code, from corresponding database, code is extracted at random.In another embodiment of the invention, obtain random code by random code generator.It should be noted that, concrete which kind of mode that adopts obtains random code, and the embodiment of the present invention does not all limit this.
Step 306: according to the address search of described code to be protected to described code to be protected, and described code to be protected is replaced to described random code.
Particularly; in one embodiment of the invention; according to the address search of code to be protected to code to be protected; then code to be protected is deleted from original; it should be noted that; can not delete or change the function name of code to be protected, add random code at the address place of original code to be protected.
Step 307: add call instruction and key acquisition code block in the file after described code to be protected is replaced, described call instruction is used for searching and decipher corresponding ciphertext.
Can use normally to make original; need in the file after code to be protected is replaced; add call instruction; add the key be used for decrypt ciphertext simultaneously and obtain code block; wherein; if run key to obtain code block, can key be calculated, can be decrypted ciphertext by this key.Particularly, before the random code that substituted for code to be protected or below, interpolation call instruction and key obtain code block.
When program runs to the position of the random code that substituted for code to be protected; program skips random code; when program runs to call instruction; start call instruction; search the ciphertext corresponding to this position; acquisition source code is decrypted to ciphertext, by source code stored in internal memory, and in internal memory run time version program.
It should be noted that, step 302 can be placed on before step 305, also can be placed on after step 305, step 303 ~ step 304 can be placed on before step 305, also can be placed on after step 305, can also be placed on after step 306, concrete which kind of order that adopts performs step 301 ~ step 307, and the embodiment of the present invention does not all limit this.
The method of a kind of anti-static analysis file that the embodiment of the present invention provides, is mainly used in protecting the code of DEX file and SO file in android system.Certainly, specifically for which kind of file, the embodiment of the present invention does not all limit this.
For DEX file, the embodiment of the method for the preferred a kind of anti-static analysis file of the present invention, as shown in institute Fig. 4, the method comprises:
Step 401: create a configuration file table, by corresponding being stored in configuration file table in address of the code of function signature all in DEX file and respective function.
Wherein, in configuration file table, function signature and the respective function address one_to_one corresponding in original.This configuration file table can leave in a file newly created, file layout can be any can the file layout of record support configuration file table.Certainly, concrete which kind of file layout of employing, the embodiment of the present invention does not limit this.It should be noted that, the file depositing configuration file table will leave identical storage medium in original.
Configuration file table also can be stored into the data block of original.Generally comprise code block, data block and other several modules in DEX file, configuration file table can only be stored in the data block portions of DEX file, and code block and other several modules can not deposit configuration file table.
It should be noted that, concrete which kind of mode that adopts stores configuration file table, and the embodiment of the present invention does not all limit this.
Step 402: in configuration file table, treats the function signature of protecting code respectively and does not need the function signature of protecting code to mark.
Particularly; mark by the function signature that a kind of unified mark treats protecting code; then do not need the function signature of protecting code to mark by another kind of unified mark to other, do not need the function protected to be distinguished by these two kinds different marks to function to be protected and other.
Step 403: according to the mark to function signature, obtains the address of code to be protected.
Because, the address one_to_one corresponding of code in original of function signature and respective function, so, obtain the function signature of code to be protected, just can obtain the address of code to be protected.
Step 404: obtain described code to be protected according to the address search of code to be protected.
Step 405: code to be protected is encrypted, obtains ciphertext.
Step 406: ciphertext stored, is recorded in the address of depositing ciphertext in configuration file table, makes the address of ciphertext and corresponding function signature one_to_one corresponding.
Because, the address one_to_one corresponding of code in original of function signature and respective function, when recording ciphertext address, make ciphertext address and corresponding function signature one_to_one corresponding, so the address of code in original of ciphertext address and the front function of encryption is also one to one.
Particularly, ciphertext can be stored in the file of one or more new establishment, store the file layout of ciphertext can be any can the file layout of record support ciphertext.Which kind of stored in file format ciphertext of concrete employing, the embodiment of the present invention does not limit this.Also ciphertext can be stored into the data block of original.It should be noted that, concrete which kind of mode that adopts stores ciphertext, and the embodiment of the present invention does not all limit this.
Step 407: according to the coding rule of DEX file, obtains random code.
Step 408: according to the address search of code to be protected to code to be protected, and code to be protected is replaced to random code.
Step 409: add call instruction and key acquisition code block in the file after code to be protected is replaced.
Can use normally to make original; in file after code to be protected is replaced; add call instruction; add the key be used for decrypt ciphertext simultaneously and obtain code block; wherein; if run key to obtain code block, can key be calculated, can be decrypted ciphertext by this key.Particularly, before the random code that substituted for code to be protected or below, interpolation call instruction and key obtain code block.
Wherein, in call instruction, comprise the address of configuration file table, when program runs to call instruction, start call instruction, find configuration file table, according to the function at call instruction place, in configuration file table, find corresponding function signature, and according to the relation one to one of function signature and corresponding ciphertext address, obtain the address of corresponding ciphertext, find ciphertext, acquisition source code is decrypted to ciphertext, by source code stored in internal memory, and in internal memory run time version program.
Embodiments provide a kind of device of anti-static analysis file, as shown in Figure 5, described device comprises: address acquisition module 501, for obtaining the address of code to be protected.Random code obtains module 502, for obtaining random code according to predetermined rule.Replacement module 503, for according to the address search of code described to be protected obtained by described address acquisition module 501 to described code to be protected, and described code to be protected is replaced to the described random code obtained by described random code acquisition module 502.
Further, as shown in Figure 6, the device of this anti-static analysis file also comprises: Code obtaining module 504, for the address according to the code to be protected obtained by described address acquisition module 501, obtains described code to be protected.Encrypting module 505, for being encrypted the code to be protected obtained by described Code obtaining module 504, obtains ciphertext.Memory module 506, for the ciphertext obtained by described encrypting module 505 being stored, and obtains the address storing described ciphertext.Wherein, memory module 506 specifically for: ciphertext to be stored in the new file created or ciphertext to be stored in the data block in original.
Further; as shown in Figure 7; the device of this anti-static analysis file also comprises: module 507 is added in instruction, and for adding call instruction and key acquisition code block in the file after described code to be protected is replaced, described call instruction is used for searching and decipher corresponding ciphertext.Instruction adds module 507 specifically for interpolation call instruction and key obtain code block before the random code that substituted for code to be protected or below.
Further, as shown in Figure 8, the device of this anti-static analysis file also comprises: deciphering module 508, for when program runs to described call instruction, obtains corresponding ciphertext according to described call instruction, is decrypted described ciphertext.
The invention provides a kind of method and device of anti-static analysis file; by code encryption to be protected in source document is kept in black box; and original code position deposits random rubbish code block; thus prevent hacker from passing through, to the static analysis update routine logic of program, to ensure that the safety of source code.
Obviously, it will be understood by those skilled in the art that above-mentioned of the present invention each module or each step can be implemented by device as above.Alternatively, the embodiment of the present invention can realize by the executable program of computer installation, thus they storages can be performed by processor in the storage device, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be ROM (read-only memory), disk or CD etc.; Or they are made into each integrated circuit modules respectively, or the multiple module in them or step are made into single integrated circuit module to realize.Like this, the present invention is not restricted to the combination of any specific hardware and software.
Below be only illustrating of doing for the preferred embodiments of the present invention and know-why thereof; and the restriction not technology contents of the present invention carried out; anyly be familiar with those skilled in the art in technical scope disclosed in this invention; the change easily expected or replacement, all should be encompassed in protection scope of the present invention.
Claims (12)
1. a method for anti-static analysis file, is characterized in that, comprising:
Obtain the address of code to be protected;
Random code is obtained according to predetermined rule;
According to the address search of described code to be protected to described code to be protected, and described code to be protected is replaced to described random code.
2. the method for anti-static analysis file according to claim 1, is characterized in that, after the step of address obtaining code to be protected, described method also comprises:
Code to be protected according to the address acquisition of described code to be protected;
Described code to be protected is encrypted, obtains ciphertext;
Described ciphertext is stored, and obtains the address storing described ciphertext.
3. the method for anti-static analysis file according to claim 2, is characterized in that, described ciphertext stored, comprising:
Described ciphertext is stored in the new file created; Or
Described ciphertext is stored in the data block in original.
4. the method for anti-static analysis file according to claim 3, is characterized in that, after the step of replacing described code to be protected with random code, described method also comprises:
Add call instruction and key acquisition code block in file after described code to be protected is replaced, described call instruction is used for searching and decipher corresponding ciphertext.
5. the method for anti-static analysis file according to claim 4, is characterized in that, adds call instruction and key acquisition code block, comprising in the file after described code to be protected is replaced:
Before the random code that substituted for code to be protected or below, interpolation call instruction and key obtain code block.
6. the method for anti-static analysis file according to claim 4, it is characterized in that, when program runs to described call instruction, the method also comprises: obtain corresponding ciphertext according to described call instruction, is decrypted described ciphertext.
7. a device for anti-static analysis file, is characterized in that, comprising:
Address acquisition module, for obtaining the address of code to be protected;
Random code obtains module, for obtaining random code according to predetermined rule;
Replacement module, for according to the address search of code described to be protected obtained by described address acquisition module to described code to be protected, and described code to be protected is replaced to the described random code being obtained module acquisition by described random code.
8. the device of anti-static analysis file according to claim 7, it is characterized in that, described device also comprises:
Code obtaining module, for the address according to the code to be protected obtained by described address acquisition module, obtains described code to be protected;
Encrypting module, for being encrypted the code to be protected obtained by described Code obtaining module, obtains ciphertext;
Memory module, for the ciphertext obtained by described encrypting module being stored, and obtains the address storing described ciphertext.
9. the device of anti-static analysis file according to claim 8, is characterized in that, described memory module specifically for:
Described ciphertext is stored in the new file created; Or
Described ciphertext is stored in the data block in original.
10. the device of anti-static analysis file according to claim 9, it is characterized in that, described device also comprises:
Module is added in instruction, and for adding call instruction and key acquisition code block in the file after described code to be protected is replaced, described call instruction is used for searching and decipher corresponding ciphertext.
The device of 11. anti-static analysis files according to claim 10, is characterized in that, described instruction add module specifically for:
Before the random code that substituted for code to be protected or below, interpolation call instruction and key obtain code block.
The device of 12. anti-static analysis files according to claim 10, it is characterized in that, described device also comprises: deciphering module, for when program runs to described call instruction, obtain corresponding ciphertext according to described call instruction, described ciphertext is decrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410064828.3A CN104866740A (en) | 2014-02-25 | 2014-02-25 | Static analysis preventing method and device for files |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410064828.3A CN104866740A (en) | 2014-02-25 | 2014-02-25 | Static analysis preventing method and device for files |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104866740A true CN104866740A (en) | 2015-08-26 |
Family
ID=53912564
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410064828.3A Pending CN104866740A (en) | 2014-02-25 | 2014-02-25 | Static analysis preventing method and device for files |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104866740A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105930745A (en) * | 2016-04-25 | 2016-09-07 | 北京珊瑚灵御科技有限公司 | Android platform-based character string reinforcement method |
CN106874715A (en) * | 2016-12-30 | 2017-06-20 | 上海掌门科技有限公司 | Encryption method and system that a kind of anti-reversing is cracked |
CN110520860A (en) * | 2017-01-26 | 2019-11-29 | 泰雷兹数字安全法国股份有限公司 | Method for securing software code |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102708322A (en) * | 2012-05-12 | 2012-10-03 | 北京深思洛克软件技术股份有限公司 | Method for protecting JAVA application programs in Android system |
CN103150493A (en) * | 2013-02-28 | 2013-06-12 | 浙江中控技术股份有限公司 | JavaScript code obfuscation method and device |
CN103246848A (en) * | 2013-03-26 | 2013-08-14 | 北京深思数盾科技有限公司 | Software security protection method and equipment |
CN103413073A (en) * | 2013-07-09 | 2013-11-27 | 北京深思数盾科技有限公司 | Method and equipment for protecting JAVA executable program |
CN103413076A (en) * | 2013-08-27 | 2013-11-27 | 北京理工大学 | Block protection method for Android application programs |
-
2014
- 2014-02-25 CN CN201410064828.3A patent/CN104866740A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102708322A (en) * | 2012-05-12 | 2012-10-03 | 北京深思洛克软件技术股份有限公司 | Method for protecting JAVA application programs in Android system |
CN103150493A (en) * | 2013-02-28 | 2013-06-12 | 浙江中控技术股份有限公司 | JavaScript code obfuscation method and device |
CN103246848A (en) * | 2013-03-26 | 2013-08-14 | 北京深思数盾科技有限公司 | Software security protection method and equipment |
CN103413073A (en) * | 2013-07-09 | 2013-11-27 | 北京深思数盾科技有限公司 | Method and equipment for protecting JAVA executable program |
CN103413076A (en) * | 2013-08-27 | 2013-11-27 | 北京理工大学 | Block protection method for Android application programs |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105930745A (en) * | 2016-04-25 | 2016-09-07 | 北京珊瑚灵御科技有限公司 | Android platform-based character string reinforcement method |
CN106874715A (en) * | 2016-12-30 | 2017-06-20 | 上海掌门科技有限公司 | Encryption method and system that a kind of anti-reversing is cracked |
CN110520860A (en) * | 2017-01-26 | 2019-11-29 | 泰雷兹数字安全法国股份有限公司 | Method for securing software code |
CN110520860B (en) * | 2017-01-26 | 2023-08-08 | 泰雷兹数字安全法国股份有限公司 | Method for protecting software code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102433011B1 (en) | Method of apk file protection, apk file protection system performing the same, and storage medium storing the same | |
CN104392181A (en) | SO file protection method and device and android installation package reinforcement method and system | |
Kholia et al. | Looking inside the (Drop) box | |
JP5337411B2 (en) | Information concealment method and information concealment device | |
CN108133147B (en) | Method and device for protecting executable code and readable storage medium | |
CN107273723B (en) | So file shell adding-based Android platform application software protection method | |
CN103946856A (en) | Encryption and decryption processing method, device and equipment | |
CN104680039A (en) | Data protection method and device of application installation package | |
CN104951674B (en) | Information concealing method for application program | |
US8009831B2 (en) | Method and system for hiding the decryption key in a dispersive way | |
WO2019184741A1 (en) | Application program information storing method and apparatus, and application program information processing method and apparatus | |
CN102254125A (en) | ELF (element list file) encrypting method and system | |
CN104135531B (en) | A kind of upgrade method and device of Web softwares | |
KR102583995B1 (en) | Cryptographic program diversification | |
CN108319822B (en) | Method, storage medium, electronic device and system for protecting webpage code | |
CN104951705A (en) | Android application data encryption packaging method based on operating system interface rewriting | |
CN104866740A (en) | Static analysis preventing method and device for files | |
CN109992974B (en) | Protection method, device and readable storage medium of virtual machine bytecode file | |
US9378395B2 (en) | Method, a device and a computer program support for execution of encrypted computer code | |
KR101999209B1 (en) | A system and method for encryption of pointers to virtual function tables | |
CN112597449B (en) | Software encryption method, device, device and storage medium | |
JP5574550B2 (en) | Information concealment method and information concealment device | |
CN108920967B (en) | Data processing method, device, terminal and computer storage medium | |
US20190044698A1 (en) | Extended ciphertexts | |
JP6215468B2 (en) | Program protector |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150826 |