Compiling method and compiling system for obfuscating codes by means of assembly

A technology of code obfuscation and compilation method, applied in the field of NDK compilation, can solve the problems of first cracking of competing teams, code obfuscation, inability to hide system calls, etc., and achieve the effect of reducing software running speed and increasing memory

Active Publication Date: 2013-09-25
XIAMEN WANGSU CO LTD
View PDF4 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technical effect of this patented method lies within two ways - one way by which we retrieve and copy specific parts (core codes) onto another part called Standard Code Library), while Another approach involves converting between different types of calls like Direct Calling Intermediate Controlled Logic Units (CICLs). This allows us to hide certain functions without increasing storage space on devices such as smartphones.

Problems solved by technology

This patents describes different types of techniques that can be applied during data storage on wireless devices (WCD). Code obfusion refers to adding extra protection against attacks like piracy from hackers while also ensuring stable execution times without compromising any sensitive content stored inside. It involves applying certain algorithms to encrypted binary codes before storing them onto disk drives instead of directly accessing those bits within themselves. Additionally, there are technical problem addressed when trying to compress large amounts of computer-readable media into smaller sizes due to limitations associated with current compression technologies.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Compiling method and compiling system for obfuscating codes by means of assembly
  • Compiling method and compiling system for obfuscating codes by means of assembly
  • Compiling method and compiling system for obfuscating codes by means of assembly

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0040] figure 1 It shows the flow of the first embodiment of the compiling method for implementing code obfuscation through assembly in the present invention. See figure 1 , the following is a detailed description of the implementation steps of the code obfuscation compiling method of this embodiment.

[0041] Step 11: Write the core function.

[0042] In this embodiment, the Android NDK code can be used to write, the core part is extracted and written in an independent function, and the system call or the standard C library is changed into an indirect call. The code is as follows:

[0043]

[0044] Step 12: Disassemble the core function.

[0045] In this embodiment, the GDB debugging tool or IDA Pro Advanced can be used to disassemble the code of the core function into ARM platform code, as shown below. (gdb)x / 20i funcx

[0046]

[0047]

[0048] Analyze the above assembly code:

[0049] 1) The C code corresponding to the C code assembly code combined with fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a compiling method and a compiling system for obfuscating codes by means of assembly. The technical scheme includes that the method comprises compiling a core function; disassembling the core function; creating an executable memory mapping region; copying assembly codes of the core function into the memory mapping region; executing the assembly codes in the memory mapping region to generate an obfuscated core function. The compiling method and the compiling system have the advantages that problems that system call cannot be hidden in an Android ARM [advanced RISC (reduced instruction set computer) machines] platform and can be easily cracked by competitors by the aid of a disassembly core technology are solved, and accordingly the cracked difficulty of software is improved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner XIAMEN WANGSU CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products