Code protecting method and system based on hook technology in JAVA

A code and technology technology, applied in the field of mobile terminal application security, can solve the problems of increasing code security and easy reverse discovery of function calls, and achieve the effect of enhancing the protection of code flow

Inactive Publication Date: 2014-07-02
WUHAN ANTIY MOBILE SECURITY
View PDF6 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a code protection method and system based on hook technology under JAVA, which solves the problem that function calls in programs are easy to be found in reverse, and hides function calls in dynamic link library files compiled into binary machine instructions, thereby increasing code security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code protecting method and system based on hook technology in JAVA
  • Code protecting method and system based on hook technology in JAVA

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0030] The present invention provides a code protection method and system based on hook technology under JAVA, which solves the problem that function calls in programs are easy to be found in reverse, and hides function calls in dynamic link library files compiled into binary machine instructions, thereby increasing code security.

[0031] The invention mainly utilizes the JAVA local call mechanism in JAVA to realize the hook technology for the JAVA class method, and applies it to the application program to realize the hiding and protection of its code flow. The JAVA native ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a code protecting method and system based on a hook technology in JAVA. The code protecting method mainly comprises the steps that a JNI mechanism is mainly used, class calling is changed by modifying class mark information to native, and a nativeFunc is customized in a dynamic link library; class method codes which are called in the calling process of codes assigned to be protected are added to codes of the customized nativeFunc, and the class method codes which are called in the calling process of the codes assigned to the protected are replaced with arbitrary invalid codes; a class method called in the calling process of the codes assigned to be protected in a program to be protected is replaced with a general interface function exported by the dynamic link library; finally, the replaced program to be protected is output. The invention further correspondingly provides a corresponding system structure. By means of the method, calling of the function can be hidden in a dynamic link library file which is compiled into binary machine instructions, and thus the difficulty of reversing the calling is greatly increased.

Description

technical field [0001] The invention relates to the field of mobile terminal application security, in particular to a code protection method and system based on hook technology under JAVA. Background technique [0002] With the increasing development of the Android mobile terminal platform, the number of third-party applications shows an explosive growth trend. Mobile platform developers have developed a variety of third-party applications, including entertainment, games, social networking and various types of tools. Since the application program under the Android system is mainly developed in JAVA language, and is packaged into an APK file in ZIP format for release, it is easy to reverse analyze it through a decompilation tool, and pirate and repackage it. Illegal developers use dex2jar, JD-GUI, JAD and other decompilation tools to easily restore the JAVA code of third-party applications, and conduct reverse analysis on its code flow and function calls, and can clearly ana...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 潘博文乔伟肖新光
Owner WUHAN ANTIY MOBILE SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products