Method and device for detecting pirated application program

A technology of application programs and piracy, which is applied in the computer field and can solve problems such as inability to accurately determine application installation packages

Active Publication Date: 2015-03-18
ALIBABA (CHINA) CO LTD
View PDF7 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide a method for detecting pirated application programs, so as to solve...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting pirated application program
  • Method and device for detecting pirated application program
  • Method and device for detecting pirated application program

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0027] Example 1: Decompile APK using apktool

[0028] Use the command line "apktool d apk file name" in cmd to compile the APK file, where "apktool d" is the decompilation command, and d stands for decode. It should be noted that the execution directory of the command line is the same as the directory where the APK file is located. Subsequently, the decompiled file of the APK can be obtained in the command where the APK file is located.

example 2

[0029] Example 2: Decompile APK using apkdb

[0030] Install the apkdb program. After the apkdb program is installed, select the APK file to be decompiled, right-click the mouse, and select the decompilation option in the menu that appears after right-clicking the mouse. Subsequently, the decompiled file of the APK can be obtained in the command where the APK file is located.

[0031] Specifically, after obtaining the decompiled file of the application installation package to be detected, the network device performs aggregation processing on the decompiled file of the application installation package to be detected, so as to obtain a binary feature file.

[0032] Specifically, the decompiled files of the application installation package to be detected can be aggregated in the following manner to obtain binary signature files:

[0033] First, in step S1011 (not shown in the figure), the network device removes redundant information from the decompiled file of the application in...

example 3

[0039] Two program fragments in the decompiled file of the application installation package to be detected:

[0040] Fragment 1

[0041]

[0042]

[0043] Fragment 2

[0044]

[0045]After removing redundant information, obtain a program fragment that only retains operators:

[0046] Fragment 1

[0047] invoke-direct

[0048] new-instance

[0049] invoke-direct

[0050] Fragment 2

[0051] invoke-virtual

[0052] move-result-object

[0053] check-cast

[0054] iput-object

[0055] Subsequently, splicing is performed according to the lexicographical order of the fragment names of the program fragments to obtain a part of the binary feature file:

[0056] invoke-direct

[0057] new-instance

[0058] invoke-direct

[0059] #

[0060] invoke-virtual

[0061] move-result-object

[0062] check-cast

[0063] iput-object

[0064] In this embodiment, the decompiled file that only retains operators is obtained by removing redundant information such as advertis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting a pirated application program. The method comprises the following steps: acquiring a binary characteristic file of an installation package of a to-be-detected application program; analyzing the binary characteristic file of the installation package of the to-be-detected application program and the binary characteristic file of the installation package of a copyrighted application program so as to determine the similarity of the binary characteristic file of the installation package of the to-be-detected application program and the binary characteristic file of the installation package of the copyrighted application program; judging whether the installation package of the to-be-detected application program is a pirated application program installation package according to the similarity. By adopting the technical scheme of the invention, the method can be used for detecting whether the application program installation package is a pirated application program installation package even the pirated application program installation package is repackaged and changed in name.

Description

technical field [0001] The invention relates to computer technology, in particular to a method and device for detecting pirated application programs. Background technique [0002] With the continuous development of computer technology, application code piracy is becoming more and more common. Compared with natural language, the syntax of programming language is relatively regular. This feature makes it easier to plagiarize application code. Generally, it can be changed by simple variable replacement, adding redundant code, and changing the program sequence through a text editor. The form of the source code of the application without affecting the normal operation of the source program. At present, the more common means of plagiarism of application code include: complete copy, modification of comments, rearrangement, renaming of identifiers, reordering of code blocks, reordering of statements in code blocks, changing the order of operators or operands in expressions, changin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12
CPCG06F21/12
Inventor 彭跃辉罗辑黄东旭丁吉昌
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products