Deep code obfuscation method for Android system applications

A code obfuscation and system application technology, applied in the field of deep code obfuscation of Android system applications, can solve problems such as confusion, failure to handle program control structure and calling structure well, affecting the normal operation of programs, etc., to prevent illegal cracking or reverse, The effect of improving security and ensuring confidentiality

Active Publication Date: 2014-01-29
JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD
View PDF3 Cites 59 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Especially for the core Activity of the program, the common code obfuscation technology cannot be used to obfuscate it, otherwise it will affect the normal operation of the program
On the other hand, the existing code obfuscation technology in the Android system does not handle the control structure and call structure of the program very well, and many mature code obfuscation technologies have not been fully used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Deep code obfuscation method for Android system applications
  • Deep code obfuscation method for Android system applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Embodiment 1: After a hacker obtains the installation package that has been obfuscated by the deep code obfuscator of the present invention, if the existing decompilation tool is used to decompile, the decompiled file can be obtained, but all the files in the obtained file Variables, classes, and method names will all become meaningless character or number sequences, increasing the workload of their static analysis.

Embodiment 2

[0027] Embodiment 2: When a hacker obtains the installation package that has been obfuscated by the second level of the deep code obfuscator of the present invention, using the decompilation tool for decompilation will directly cause the decompilation tool to collapse, resulting in no useful files being obtained; If the hacker manually analyzes the dex file, the various invalid instructions inserted in it and the combination of valid instructions and invalid data will cause great obstacles to the analysis process, causing the workload of its reverse work to soar.

Embodiment 3

[0028] Embodiment 3: When a hacker gets the third-level obfuscated installation package of the deep code obfuscator of the present invention, no matter whether he uses a decompilation tool or manually analyzes the dex file by himself, he can only see fake ones on the surface. The program flow and the real execution flow are hidden. Although it cannot completely prevent reverse analysis, it also achieves the purpose of increasing the complexity of reverse analysis.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a deep code obfuscation method for Android system applications. The method uses graded code obfuscation. The graded code obfuscation includes first-grade name replacement obfuscation, second-grade command insertion obfuscation, third-grade structure process obfuscation, and fourth-grade command inversion obfuscation. For an application installation package developed and to be released, the method includes: extracting a DEX file, analyzing the file structure, a Dalvik instruction set and a program running process, determining an obfuscation scheme of corresponding grade or multiple combined grades to perform deep code obfuscation on the DEX file, generating a new DEX file, and re-packaging the file. The deep code obfuscation method according to the technical scheme has the advantages that the limitations of the traditional source-code-based code obfuscation scheme can be broken through, the DEX executable files are directly obfuscated in terms of element name, instruction and process structure, applications can be effectively protected from illegal cracking or inversion, safety of applications in the Android system is improved, and confidentiality of business software is guaranteed.

Description

technical field [0001] The present invention relates to a method for obfuscation and hiding of application codes, in particular to a method of systematically rewriting and deforming the codes as much as possible while keeping the code semantics unchanged, and hiding the original structure of the codes, so as to improve the static reading of the codes And to understand the purpose of difficulty, it can be applied to the development of application software on mobile platforms such as Android, and strengthen the protection of application software copyright. Background technique [0002] For an enterprise whose mainstay is software development, any software system is the result of each company's great manpower and material resources. Therefore, the protection of software codes is crucial to every company or group. . If the functions developed by a team with day and night work are easily copied and integrated into their own systems by competitors, this will have a great impact o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 汪德嘉宋超刘家郡
Owner JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products