A method and device for protecting a java executable program through a virtual machine
A technology for executing programs and virtual machines, applied in the field of software protection, it can solve problems such as attacks, confusion of names and symbols, and it is not easy to automatically realize complex processes and class relationships, so as to improve security, protect logic and processes, increase analysis and The effect of cracking difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific example
[0051] According to an embodiment of the present invention, see figure 1 , figure 1 Including the code snippets of each part in this embodiment. The specific example is as follows: A software written in JAVA has a class MyClass in the source code, which defines three fields a, b, c and an instance method Mul. The logic of this method is to multiply the value of field b and c, The result is assigned to field a.
[0052] When the Java source code is compiled, a .class file will be generated for each class. The structure of the .class file is defined in the JVM document and is a collection of a series of attributes and values. By parsing the class name-related attributes in the .class file, you can know which class it comes from in the source code; and then parsing the method table attributes, you can get a list of all methods in the class; parsing the Code attribute of each method, you can get The JVM bytecode of the method.
[0053] For example figure 1 The source code sho...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 