CN104834838A - Method and device for preventing unloading storage of DEX file from memory - Google Patents

Method and device for preventing unloading storage of DEX file from memory Download PDF

Info

Publication number
CN104834838A
CN104834838A CN201510210464.XA CN201510210464A CN104834838A CN 104834838 A CN104834838 A CN 104834838A CN 201510210464 A CN201510210464 A CN 201510210464A CN 104834838 A CN104834838 A CN 104834838A
Authority
CN
China
Prior art keywords
dex
function
file
data file
bytecode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510210464.XA
Other languages
Chinese (zh)
Other versions
CN104834838B (en
Inventor
郑建强
刘德建
陈宏展
郑晟
方振华
李上杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian TQ Digital Co Ltd
Original Assignee
Fujian TQ Digital Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian TQ Digital Co Ltd filed Critical Fujian TQ Digital Co Ltd
Priority to CN201510210464.XA priority Critical patent/CN104834838B/en
Publication of CN104834838A publication Critical patent/CN104834838A/en
Application granted granted Critical
Publication of CN104834838B publication Critical patent/CN104834838B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for preventing unloading storage of a DEX file from a memory. The method comprises the following steps that a DEX file is loaded, and is resolved into a DEX basic structure data file and a DEX function realization byte code data file; function byte code data in the DEX file is extracted, and is stored into the DEX function realization byte code data file; the two files are subjected to encryption compression; the two files are read, and are subjected to uncompressing and decryption; a davlik virtual function openDexFile is called for loading the DEX basic structure data file; the deviation of the function byte code in the DEX basic structure data file is modified, so that the deviation is pointed to the corresponding function byte code data in the DEX function realization byte data file. Through adopting the mode, the method and the device can realize the resistance to dynamic cracking, and the safety of the file is improved.

Description

Prevent method and the device of the unloading from internal memory of DEX file
Technical field
The present invention relates to file encryption deciphering field, particularly a kind of method and device preventing the unloading from internal memory of DEX file.
Background technology
It is exactly call derivative function openDexFile that Android system dalvik virtual machine provides to load the DEX data in internal memory that Android reinforces the main method adopted at present, and then calls relevant JAVA functional based method to start Android program.This way is very effective in the static decompiling of antagonism, is stored in the different position of apk file because original Android executable program file dex file has been extracted and has been re-encrypted compression.So all static decompiling software will can not find real dex file, even if or find and also do not know what decipherment algorithm to decipher this dex file with, therefore just cannot carry out static decompiling.
Although this method can resist static decompiling, but cannot dynamic debugging be resisted, and Dram unloading.Reverse personnel by under Android program interrupt, and during this time can obtain the internal memory start address of dex internal storage data after deciphering and size by the parameter of openDexFile function by breakpoint under the derivative function openDexFile of dalvik virtual machine.Then by internal memory unloading instrument, this section of internal memory is dumped in file, and this file after unloading is a complete available dex file.Finally by decompiling instrument, decompiling is carried out to this dex file again, like this, source code just complete whole being presented in face of reverse personnel of program.
Application publication number is in the patent " a kind of dynamic loading method of APK file " of CN 104317625 A, provide a kind of decompiling method of evading the reverse instrument of Android, need second APK file of deleting corresponding Core Feature part of original code, when actual decompiling, second APK file of deleting can by reverse PERSONNEL RECOVERY, thus reduce the difficulty of decompiling, still only can resist static decompiling, but cannot resist dynamic inverse compiling.
Summary of the invention
Technical matters to be solved by this invention is: provide a kind of method and the device that prevent the unloading from internal memory of DEX file, not only can prevent static decompiling, also can prevent Dram unloading.
In order to solve the problems of the technologies described above, the technical solution used in the present invention is: provide a kind of method preventing the unloading from internal memory of DEX file, comprise: load DEX file, resolving DEX file is that DEX infrastructure data file and DEX function realize bytecode data file; Extract the function byte code data in DEX file, and be stored into described DEX function and realize bytecode data file; DEX infrastructure data file described in ciphered compressed and DEX function realize bytecode data file; Read described DEX infrastructure data file and described DEX function realizes bytecode data file, and the deciphering that decompresses; Call davlik virtual machine function openDexFile to load described DEX infrastructure data file; Revise the skew of function byte code in described DEX infrastructure data file, make it point to described DEX function and realize function byte code data corresponding in bytecode data file.
Meanwhile, the present invention is also corresponding provides a kind of device preventing the unloading from internal memory of DEX file, comprising: file declustering unit, and for loading DEX file, resolving DEX file is that DEX infrastructure data file and DEX function realize bytecode data file; Extract storage unit, for extracting the function byte code data in DEX file, and be stored into described DEX function and realize bytecode data file; Ciphered compressed unit, realizes bytecode data file for DEX infrastructure data file described in ciphered compressed and DEX function; Read decompress(ion) decryption unit, for reading described DEX infrastructure data file and described DEX function realizes bytecode data file, and the deciphering that decompresses; Call unit, for calling davlik virtual machine function openDexFile to load described DEX infrastructure data file; Amendment unit, for revising the skew of function byte code in described DEX infrastructure data file, making it point to described DEX function and realizing function byte code data corresponding in bytecode data file.
Beneficial effect of the present invention is: the present invention is by after being divided into DEX infrastructure data file and DEX function to realize bytecode data file two files by original DEX internal storage data, reverse personnel can be made to learn, and DEX function realizes bytecode data file and when is being repaired, therefore can not carry out decompiling to DEX file, its security strengthens greatly.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet that the present invention prevents the embodiment of the method one of DEX file unloading from internal memory;
Fig. 2 is the particular flow sheet before Fig. 1 step S130;
Fig. 3 is the schematic flow sheet that the present invention prevents the embodiment of the method two of DEX file unloading from internal memory;
Fig. 4 is the schematic flow sheet that the present invention prevents the embodiment of the method three of DEX file unloading from internal memory;
Fig. 5 is the schematic flow sheet that the present invention prevents the embodiment of the method four of DEX file unloading from internal memory;
Fig. 6 is the structural representation that the present invention prevents DEX file device embodiment five of unloading from internal memory;
Fig. 7 is the concrete structure schematic diagram of Fig. 6 file split cells;
Fig. 8 is the structural representation that the present invention prevents DEX file device embodiment six of unloading from internal memory;
Fig. 9 is the structural representation that the present invention prevents DEX file device embodiment seven of unloading from internal memory;
Figure 10 is the structural representation that the present invention prevents DEX file device embodiment eight of unloading from internal memory.
Embodiment
By describing technology contents of the present invention in detail, realized object and effect, accompanying drawing is coordinated to be explained below in conjunction with embodiment.
The design of most critical of the present invention is: resolving DEX file is that DEX infrastructure data file and DEX function realize bytecode data file, and extracts the function byte code data in DEX file, and is stored into described DEX function and realizes bytecode data file; DEX infrastructure data file described in ciphered compressed and DEX function realize bytecode data file; Read described DEX infrastructure data file and described DEX function realizes bytecode data file, and the deciphering that decompresses; Call davlik virtual machine function openDexFile to load described DEX infrastructure data file; Revise the skew of function byte code in described DEX infrastructure data file, make it point to described DEX function and realize function byte code data corresponding in bytecode data file.Even if reverse like this personnel breakpoint under openDexFile is tackled and unloading data, what obtain is the incomplete DEX file realizing bytecode without any function only, and the code after decompiling both can't see by incomplete DEX file does not run yet.
Please refer to Fig. 1, Fig. 1 is the schematic flow sheet that the present invention prevents the embodiment of the method one of DEX file unloading from internal memory, and the method comprises the steps:
Step S110: load DEX file, resolving DEX file is that DEX infrastructure data file and DEX function realize bytecode data file;
First, load protected DEX file, this DEX file can be source code file etc., and the DEX file that those skilled in the art can be new according to this DEX document creation, as DEX infrastructure data file and DEX function realize bytecode data file.
Step S120: extract the function byte code data in DEX file, and be stored into described DEX function and realize bytecode data file;
Travel through the function byte code data in protected DEX file, extract these data, and be stored into DEX function and realize bytecode data file.
Step S130: DEX infrastructure data file described in ciphered compressed and DEX function realize bytecode data file;
DEX infrastructure data file is then that the function byte code by replacing each class in DEX file is do-nothing function bytecode and is stored in this DEX infrastructure data file.Realize bytecode data file to DEX infrastructure data file and DEX function to be afterwards encrypted.Now, shielded DEX file is just split as two files, and namely DEX infrastructure data file and DEX function realize bytecode data file.
Step S140: read described DEX infrastructure data file and described DEX function realizes bytecode data file, and the deciphering that decompresses;
When program starts, reading DEX infrastructure data file and DEX function realize bytecode data file, need to carry out decompression deciphering to it.
Step S150: call davlik virtual machine function openDexFile to load described DEX infrastructure data file;
Dalvik is the Java Virtual Machine of Google company designs for Android platform, and dalvik virtual machine is one of core component of the Android mobility device of manufacturer's cooperative development such as Google.It can support the operation of the java application being converted to .dex (i.e. dalvik Executable) form, and .dex form is a kind of compressed format aiming at dalvik design, is applicable to internal memory and the limited system of processor speed.DEX infrastructure data file realizes loading by calling davlik virtual machine function openDexFile.
Step S160: the skew revising function byte code in described DEX infrastructure data file, makes it point to described DEX function and realizes function byte code data corresponding in bytecode data file.
Calling davlik virtual machine function openDexFile with after loading DEX infrastructure data file, the skew that bytecode data file repairs each function in DEX infrastructure data file is successively realized according to DEX function, make it point to described DEX function and realize function byte code data corresponding in bytecode data file, program just can normally be run subsequently.
From foregoing description; beneficial effect of the present invention is: the present invention prevents the embodiment of the method one of DEX file unloading from internal memory from realizing bytecode data file two files by protected DEX internal storage data being divided into DEX infrastructure data file and DEX function; and when program starts; call davlik virtual machine function openDexFile to load DEX infrastructure data file; revise the skew of function byte code in this DEX infrastructure data file, make it point to DEX function and realize function byte code data corresponding in bytecode data file.Reverse personnel cannot learn that DEX function realizes bytecode data file and when repaired, and therefore can not carry out decompiling to DEX file, its security strengthens greatly.
As shown in Figure 2, on the basis of the embodiment of the present invention one, the present invention prevents from specifically comprising the steps: before step S130 in the method for DEX file unloading from internal memory
Step S111: resolve data in described DEX file in the data structure of correspondence;
After loading DEX file, carry out resolving in corresponding data structure according to DEX file layout, the ClassDefItem that such as class definition is corresponding, the CodeItem etc. that function byte code structure is corresponding.
Step S112: extract the function byte code data in described data structure, and be stored into DEX function and realize in bytecode data file;
The ClassDefItem that wherein class definition is corresponding is static function, the CodeItem that function byte code structure is corresponding is Virtual Function, the function byte code that the CodeItem extracting each function represents, and be stored in new file, as DEX function realizes in bytecode data file.
Step S113: the function byte code data replaced in described DEX file is do-nothing function bytecode data, and be stored in described DEX infrastructure data file.
Be stored into by function byte code data in described data structure after DEX function realizes bytecode data file, original bytecode data are replaced to do-nothing function bytecode data, and do-nothing function bytecode data are the bytecode data of forging.Again these do-nothing function bytecode data are stored in DEX infrastructure data file.
Further, as shown in Figure 3, the present invention prevents the embodiment of the method two of DEX file unloading from internal memory after the step S130 of step, also comprises;
Step S170: write loader;
Loader can be a SO file.Normally, SO file is dynamic link library, and essence is shared file storehouse, is compiled out by C or C Plus Plus.First this SO file is loaded when program starts.Then decipher by this SO file two the above-mentioned files that decompress respectively, and call openDexFile loading DEX infrastructure data file.Then the data realized in bytecode data file according to DEX function repair the skew of each function of DEX infrastructure data file successively.Program just can normally have been run afterwards, that is: use described loader to perform decompression deciphering, perform to call, read and perform and revise and point to step.
As shown in Figure 4, the present invention prevents in the embodiment three of DEX file method of unloading from internal memory, before step S170, also comprise step S180: the offset address of function byte code before amendment and the offset address of amended function byte code are saved in the head that described DEX function realizes bytecode data file.
Such operation be that conveniently loader reads the information of above-mentioned two files to carry out repair.
As shown in Figure 5, the present invention prevents from, in the embodiment four of DEX file method of unloading from internal memory, after step s 130, comprising:
Step S190: run the first internal memory and the second internal memory.
When program starts, those skilled in the art can apply for operation two pieces of internal memories: the first internal memory and the second internal memory, and wherein said first internal memory is for storing DEX infrastructure data file, and the second internal memory realizes bytecode data file for storing DEX function.Calling davlik virtual machine function openDexFile loading DEX infrastructure data file like this.And then revise the skew of function byte code in the first internal storage data, allow it point to real function byte code data corresponding in the second internal memory.
Seen from the above description, resolving DEX file is that DEX infrastructure data file and DEX function realize bytecode data file, and extracts the function byte code data in DEX file, and is stored into described DEX function and realizes bytecode data file; DEX infrastructure data file described in ciphered compressed and DEX function realize bytecode data file; , run the first internal memory and the second internal memory, preserve above-mentioned 2 files respectively.Described DEX infrastructure data file is being read and described DEX function realizes bytecode data file with SO loader, and the deciphering that decompresses; And execution calls davlik virtual machine function openDexFile to load described DEX infrastructure data file; Revise the skew of function byte code in described DEX infrastructure data file, make it point to described DEX function and realize function byte code data corresponding in bytecode data file.Reverse personnel cannot copy to the data integrity in shielded DEX file in file by lower breakpoint; because the data wanting to copy out are complete; the data that DEX infrastructure data file and DEX function realize in bytecode data file must be copied simultaneously; and DEX function realizes data in bytecode data file through dynamically replacing amendment; reverse personnel cannot learn and to copy on what opportunity, the data that what therefore reverse personnel cannot be accurate, complete copy in shielded former DEX file.So just can play the object of protection DEX file.
Wherein, the embodiment of the present invention five is also corresponding provides a kind of device 100 preventing the unloading from internal memory of DEX file, and as shown in Figure 6, this device 100 comprises:
File declustering unit 110, for loading DEX file, resolving DEX file is that DEX infrastructure data file and DEX function realize bytecode data file;
Extract storage unit 120, for extracting the function byte code data in DEX file, and be stored into described DEX function and realize bytecode data file;
Ciphered compressed unit 130, realizes bytecode data file for DEX infrastructure data file described in ciphered compressed and DEX function;
Read decompress(ion) decryption unit 140, for reading described DEX infrastructure data file and described DEX function realizes bytecode data file, and the deciphering that decompresses;
Call unit 150, for calling davlik virtual machine function openDexFile to load described DEX infrastructure data file;
Amendment unit 160, for revising the skew of function byte code in described DEX infrastructure data file, making it point to described DEX function and realizing function byte code data corresponding in bytecode data file.
From foregoing description; beneficial effect of the present invention is: device 100 provided by the invention realizes bytecode data file two files by protected DEX internal storage data being divided into DEX infrastructure data file and DEX function; and when program starts; call davlik virtual machine function openDexFile to load DEX infrastructure data file; revise the skew of function byte code in this DEX infrastructure data file, make it point to DEX function and realize function byte code data corresponding in bytecode data file.Reverse personnel cannot learn that DEX function realizes bytecode data file and when repaired, and therefore can not carry out decompiling to DEX file, its security strengthens greatly.
As shown in Figure 7, apparatus of the present invention 100 embodiment five file split cells 110 also comprises further:
Resolve subelement 111, for resolving data in described DEX file in the data structure of correspondence;
Extract storing sub-units 112, for extracting the function byte code data in described data structure, and be stored into DEX function and realize in bytecode data file;
Replace subelement 113, replace with do-nothing function bytecode data for the function byte code data replaced in described DEX file, and be stored in described DEX infrastructure data file.
As shown in Figure 8, reading decompress(ion) decryption unit 120 in apparatus of the present invention 100 embodiment six comprises loader and writes subelement 121, this loader writes subelement 121 for writing loader, described loader is for performing the deciphering that decompresses, perform to read and perform and revise and point to step, and loader can be SO file.
As shown in Figure 9, offset address storage unit 170 is also comprised in apparatus of the present invention 100 embodiment seven, this offset address storage unit 170 for described write loader before, the offset address of function byte code before amendment and the offset address of amended function byte code are saved in the head that described DEX function realizes bytecode data file, and operation is that conveniently loader reads the information of above-mentioned two files to carry out repair like this.
As shown in Figure 10, internal storage location 180 is also comprised in apparatus of the present invention 100 embodiment eight, after realizing the step of bytecode data file at DEX infrastructure data file described in ciphered compressed and DEX function, run the first internal memory and the second internal memory, described first internal memory is for storing DEX infrastructure data file, and the second internal memory realizes bytecode data file for storing DEX function.
Seen from the above description; reverse personnel cannot copy to the data integrity in shielded DEX file in file by lower breakpoint on this device 100; because the data wanting to copy out are complete; the data that DEX infrastructure data file and DEX function realize in bytecode data file must be copied simultaneously; and DEX function realizes data in bytecode data file through dynamically replacing amendment; reverse personnel cannot learn and to copy on what opportunity, the data that what therefore reverse personnel cannot be accurate, complete copy in shielded former DEX file.So just can play the object of protection DEX file.
In sum, method and the device preventing the unloading from internal memory of DEX file provided by the invention, can resist Android dynamic debugging and unloading DEX file data, and carry out static decompiling with this.Prevent Android program from being cracked by reverse, greatly improve the security of Android program.In addition, because DEX file is split into two files, whole Android program size also will reduce, and reduce EMS memory occupation.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every equivalents utilizing instructions of the present invention and accompanying drawing content to do, or be directly or indirectly used in relevant technical field, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. prevent a method for DEX file unloading from internal memory, it is characterized in that, comprising:
Load DEX file, resolving DEX file is that DEX infrastructure data file and DEX function realize bytecode data file;
Extract the function byte code data in DEX file, and be stored into described DEX function and realize bytecode data file;
DEX infrastructure data file described in ciphered compressed and DEX function realize bytecode data file;
Read described DEX infrastructure data file and described DEX function realizes bytecode data file, and the deciphering that decompresses;
Call davlik virtual machine function openDexFile to load described DEX infrastructure data file;
Revise the skew of function byte code in described DEX infrastructure data file, make it point to described DEX function and realize function byte code data corresponding in bytecode data file.
2. method according to claim 1, is characterized in that, described " load DEX file, resolving DEX file is that DEX infrastructure data file and DEX function realize bytecode data file " is specially:
Resolve data in described DEX file in the data structure of correspondence;
Extract the function byte code data in described data structure, and be stored into DEX function and realize in bytecode data file;
The function byte code data replaced in described DEX file is do-nothing function bytecode data, and is stored in described DEX infrastructure data file.
3. method according to claim 1, is characterized in that, after the step of " DEX infrastructure data file described in ciphered compressed and DEX function realize bytecode data file ", comprises;
Write loader; Use described loader to perform decompression deciphering, perform to call, read and perform and revise and point to step.
4. method according to claim 3, is characterized in that, described write loader before, by amendment before the offset address of function byte code and the offset address of amended function byte code be saved in the head that described DEX function realizes bytecode data file.
5. method according to claim 1, is characterized in that, after the step of " DEX infrastructure data file described in ciphered compressed and DEX function realize bytecode data file ", comprising:
Run the first internal memory and the second internal memory, described first internal memory is for storing DEX infrastructure data file, and the second internal memory realizes bytecode data file for storing DEX function.
6. prevent a device for DEX file unloading from internal memory, it is characterized in that, comprising:
File declustering unit, for loading DEX file, resolving DEX file is that DEX infrastructure data file and DEX function realize bytecode data file;
Extract storage unit, for extracting the function byte code data in DEX file, and be stored into described DEX function and realize bytecode data file;
Ciphered compressed unit, realizes bytecode data file for DEX infrastructure data file described in ciphered compressed and DEX function;
Read decompress(ion) decryption unit, for reading described DEX infrastructure data file and described DEX function realizes bytecode data file, and the deciphering that decompresses;
Call unit, for calling davlik virtual machine function openDexFile to load described DEX infrastructure data file;
Amendment unit, for revising the skew of function byte code in described DEX infrastructure data file, making it point to described DEX function and realizing function byte code data corresponding in bytecode data file.
7. device according to claim 6, is characterized in that, described file declustering unit also comprises:
Resolve subelement, for resolving data in described DEX file in the data structure of correspondence;
Extract storing sub-units, for extracting the function byte code data in described data structure, and be stored into DEX function and realize in bytecode data file;
Replace subelement, replace with do-nothing function bytecode data for the function byte code data replaced in described DEX file, and be stored in described DEX infrastructure data file.
8. device according to claim 6, is characterized in that, described reading decompress(ion) decryption unit comprises loader and writes subelement, and for writing loader, described loader, for performing the deciphering that decompresses, performs to read and perform and revises and point to step.
9. device according to claim 8, it is characterized in that, also comprise offset address storage unit, for described write loader before, by amendment before the offset address of function byte code and the offset address of amended function byte code be saved in the head that described DEX function realizes bytecode data file.
10. device according to claim 6, it is characterized in that, also comprise internal storage location, after realizing the step of bytecode data file at DEX infrastructure data file described in ciphered compressed and DEX function, run the first internal memory and the second internal memory, described first internal memory is for storing DEX infrastructure data file, and the second internal memory realizes bytecode data file for storing DEX function.
CN201510210464.XA 2015-04-29 2015-04-29 Prevent the method and device of DEX file unloading from internal memory Active CN104834838B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510210464.XA CN104834838B (en) 2015-04-29 2015-04-29 Prevent the method and device of DEX file unloading from internal memory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510210464.XA CN104834838B (en) 2015-04-29 2015-04-29 Prevent the method and device of DEX file unloading from internal memory

Publications (2)

Publication Number Publication Date
CN104834838A true CN104834838A (en) 2015-08-12
CN104834838B CN104834838B (en) 2017-11-24

Family

ID=53812721

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510210464.XA Active CN104834838B (en) 2015-04-29 2015-04-29 Prevent the method and device of DEX file unloading from internal memory

Country Status (1)

Country Link
CN (1) CN104834838B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106843919A (en) * 2016-12-12 2017-06-13 北京奇虎科技有限公司 The storage method and device of a kind of dex files
CN106897587A (en) * 2017-02-27 2017-06-27 百度在线网络技术(北京)有限公司 The method and apparatus of reinforcement application, loading reinforcement application
CN107122632A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The encryption method and device of software installation bag
CN107122634A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The method for reinforcing and protecting and device of software installation bag
CN107122635A (en) * 2017-04-27 2017-09-01 北京洋浦伟业科技发展有限公司 A kind of reinforcement means of the reinforcement means of SO files, device and APK
CN109558745A (en) * 2017-09-25 2019-04-02 赖育承 Method for protecting electronic file and computer program product thereof
CN113761482A (en) * 2017-06-06 2021-12-07 杭州网易智企科技有限公司 Program code protection method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020112158A1 (en) * 2001-02-14 2002-08-15 Golchikov Andrey Vladimirovich Executable file protection
CN102136053A (en) * 2011-03-14 2011-07-27 中兴通讯股份有限公司 Method and device for protecting source code of executable file
CN102831342A (en) * 2012-07-28 2012-12-19 北京深思洛克软件技术股份有限公司 Method for improving protection strength of application program in Android system
CN103136458A (en) * 2013-01-21 2013-06-05 中标软件有限公司 Code protection method for Linux operating system and module of method
CN103324872A (en) * 2013-07-12 2013-09-25 上海交通大学 Android application program protective method and system based on order confusion
CN103544414A (en) * 2013-10-25 2014-01-29 苏州通付盾信息技术有限公司 Deep code obfuscation method for Android system applications

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020112158A1 (en) * 2001-02-14 2002-08-15 Golchikov Andrey Vladimirovich Executable file protection
CN102136053A (en) * 2011-03-14 2011-07-27 中兴通讯股份有限公司 Method and device for protecting source code of executable file
CN102831342A (en) * 2012-07-28 2012-12-19 北京深思洛克软件技术股份有限公司 Method for improving protection strength of application program in Android system
CN103136458A (en) * 2013-01-21 2013-06-05 中标软件有限公司 Code protection method for Linux operating system and module of method
CN103324872A (en) * 2013-07-12 2013-09-25 上海交通大学 Android application program protective method and system based on order confusion
CN103544414A (en) * 2013-10-25 2014-01-29 苏州通付盾信息技术有限公司 Deep code obfuscation method for Android system applications

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106843919A (en) * 2016-12-12 2017-06-13 北京奇虎科技有限公司 The storage method and device of a kind of dex files
CN106843919B (en) * 2016-12-12 2021-02-23 北京奇虎科技有限公司 Method and device for storing dex file
CN106897587A (en) * 2017-02-27 2017-06-27 百度在线网络技术(北京)有限公司 The method and apparatus of reinforcement application, loading reinforcement application
CN107122632A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The encryption method and device of software installation bag
CN107122634A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The method for reinforcing and protecting and device of software installation bag
CN107122634B (en) * 2017-04-26 2020-03-17 北京梆梆安全科技有限公司 Reinforcement protection method and device for software installation package
CN107122635A (en) * 2017-04-27 2017-09-01 北京洋浦伟业科技发展有限公司 A kind of reinforcement means of the reinforcement means of SO files, device and APK
CN113761482A (en) * 2017-06-06 2021-12-07 杭州网易智企科技有限公司 Program code protection method and device
CN109558745A (en) * 2017-09-25 2019-04-02 赖育承 Method for protecting electronic file and computer program product thereof

Also Published As

Publication number Publication date
CN104834838B (en) 2017-11-24

Similar Documents

Publication Publication Date Title
CN104834838A (en) Method and device for preventing unloading storage of DEX file from memory
US7162735B2 (en) Digital data protection arrangement
CN103324481B (en) By Compilation Method and the system of implementation by assembly Code obfuscation
US20160203087A1 (en) Method for providing security for common intermediate language-based program
CN106203006A (en) Android application reinforcement means based on dex Yu so file Dynamic Execution
CN104680039B (en) A kind of data guard method and device of application program installation kit
CN109598107B (en) Code conversion method and device based on application installation package file
CN109684794B (en) Code protection virtual machine KVM system realization method, device, computer equipment and storage medium
CN105512521A (en) Reinforcement and protection method and system for software installation package
CN105022936A (en) Class file encryption and decryption method and class file encryption and decryption device
CN107273723B (en) So file shell adding-based Android platform application software protection method
CN104866739A (en) Application program encryption method and application program encryption system in Android system
CN103413075A (en) Method and device for protecting JAVA executable program through virtual machine
CN112035803B (en) Protection method and device based on Windows platform software
CN110472425A (en) Unity plug-in unit encryption method based on Mono, storage medium
CN113626773B (en) Code protection method based on intermediate language
CN107092517B (en) SDK tool package generation method and device
CN110298175A (en) A kind of processing method and relevant apparatus of dll file
US20220308991A1 (en) Test processing method and information processing apparatus
CN112613023B (en) Protection method and terminal of authentication information generation algorithm
CN112114809B (en) Program code safety protection method, device and storage medium
CN111222103B (en) Software protection method based on vectorization exception handling
CN104751026A (en) Software protection method and software application method of android system, and related devices
JP2021103354A (en) Program testing method
KR101556908B1 (en) Apparatus For Protecting Binary Code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant