A method and device for protecting an Android application program based on code fragmentation

An application and application package technology, applied in the direction of program/content distribution protection, digital data protection, computer security devices, etc., can solve problems such as memory theft, reduce the possibility, balance protection strength and performance overhead, and protection strength high effect

Inactive Publication Date: 2018-02-23
NORTHWEST UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, like the packing system on the early x86 platform, the current Android packing system also packs the executable file of the application in a complete form, resulting in the threat of being easily stolen from the memory. Once the complete executable is stolen, the attacker can proceed with any attack he wishes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for protecting an Android application program based on code fragmentation
  • A method and device for protecting an Android application program based on code fragmentation
  • A method and device for protecting an Android application program based on code fragmentation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Such as figure 1 Shown, the Android application packing protection method based on code fragmentation of the present invention comprises the following steps:

[0043] Step 1, extract executable files from the Android application program to be protected;

[0044] The Android application program is a compressed package in ZIP format. For an Android application program to be protected, it first needs to be decompressed, and then the executable file in it needs to be obtained. In the present invention, the executable file of the application refers to the executable file running on the Android Dalvik virtual machine, that is, the dex file.

[0045] Step 2, extract shared library file, resource file and configuration information from the Android application program to be protected; Concrete steps include:

[0046] Step 2.1, extract all shared library files from the decompressed Android application package;

[0047] In step 2.2, resource files include image files, layout fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for Android application shelling and protection based on code fragmentation. The method first extracts executable files, shared library files, resources and configuration information, etc. from the application to be protected, and then extracts the executable files. The file is code fragmented, encrypted separately, imported into the newly created application package, and the extracted configuration information is added; then the encrypted code fragment is decrypted and independent memory space is allocated, and the decrypted code fragment is repaired and reorganized into an executable file. Prepare the running environment and rebuild the installation package. The method of the present invention has high protection intensity. The executable file of the protected application always exists in the process memory in a fragmented form throughout its life cycle, which greatly reduces the possibility of the complete executable file being stolen by an attacker. It also greatly increases the difficulty of the application being reversed, cracked, repackaged, etc.; it can balance the protection strength and performance overhead.

Description

technical field [0001] The invention belongs to the field of computer software security, and in particular relates to a code fragmentation-based Android application program packing protection method. Background technique [0002] In recent years, with the popularity and popularity of Android smart devices, various Android applications have appeared on the market to meet the needs of users. However, due to the openness of the platform itself, the low threshold of the application market, and the structural characteristics of the application itself, the security problems faced by Android applications are increasing day by day, and problems such as application cracking, reverse engineering, piracy, and secondary packaging are not uncommon. , where the problem of secondary packaging is particularly serious. Studies have shown that most malicious applications are generated by repackaging legitimate applications. [0003] In order to solve these problems faced by Android applicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/125G06F21/602G06F2221/2107
Inventor 樊如霞汤战勇张洁杨蕾陈晓江房鼎益龚晓庆刘方圆李政桥
Owner NORTHWEST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products