Reinforcement and protection method and system for software installation package

A software installation package and system protection technology, applied in the security field, can solve problems such as low difficulty of decompilation and inability to completely solve security problems of Android installation packages, and achieve the effects of improving security levels, protecting interests, and ensuring security

Inactive Publication Date: 2016-04-20
BEIJING QIHOO TECH CO LTD +1
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the low difficulty of decompilation of dex files, it is easy to be easily reversed by decompilation tools. As a result, such solutions cannot completely solve the security problems faced by Android installation packages, and developers have been looking for more effective solutions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reinforcement and protection method and system for software installation package
  • Reinforcement and protection method and system for software installation package
  • Reinforcement and protection method and system for software installation package

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] refer to figure 1 , shows a flow chart of steps of a method for hardening and protecting a software installation package in Embodiment 1 of the present invention. In this embodiment, the reinforcement protection method of the software installation package includes:

[0025] Step 102, analyzing the software installation package to obtain executable files and dynamic library files.

[0026] Taking the software installation package of the Android system as an example, the executable file can be but not limited to refer to the dex file (type of executable file on the Android platform), and the dynamic library file can be but not limited to refer to the so file (so file Refers to the library file under linux, the suffix is ​​.so, hence the name. The so file is a dynamic link library file in ELF format, and the so file is dynamically loaded into the program when the program is running to support the running of the program).

[0027] Step 104, extract setting data from the e...

Embodiment 2

[0035] refer to figure 2 , shows a flow chart of steps of a method for hardening and protecting a software installation package in Embodiment 2 of the present invention. In this embodiment, the reinforcement protection method of the software installation package includes:

[0036] Step 202, detecting the software installation package, and obtaining a detection result.

[0037] In this embodiment, the security of the software installation package may be checked through the application on the third page, but not limited to. For example, at least one of the following detection results may be detected: a detection result of a dex file, a code obfuscation detection result, a secondary packaging detection result, and a source code detection result.

[0038] Step 204, determine the security scoring result of the software installation package according to the detection result.

[0039] In this embodiment, a comprehensive analysis may be performed on the above-mentioned multiple de...

Embodiment 3

[0064] Based on the same inventive concept as the above-mentioned method embodiment, refer to image 3 , shows a structural block diagram of a hardening protection system for a software installation package in Embodiment 3 of the present invention. In this embodiment, the reinforcement protection system of the software installation package includes:

[0065] The parsing module 302 is configured to parse the software installation package to obtain executable files and dynamic library files.

[0066] The extracting module 304 is configured to extract setting data from the executable file.

[0067] A replacement module 306, configured to load the setting data into the dynamic library file, and use a setting function to replace the extracted setting data in the executable file.

[0068] In this embodiment, the setting function may be used to indicate the loading position of the setting data in the dynamic library file.

[0069] The regenerating module 308 is configured to repac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a reinforcement and protection method and system for a software installation package. The method comprises the steps that the software installation package is analyzed to obtain an executable file and a dynamic library file; setting data is extracted from the executable file; the setting data is loaded into the dynamic library file, a setting function is used for replacing the setting data extracted from the executable file, wherein the setting function is used for indicating the loading position of the setting data in the dynamic library file; according to the modified executable file and the modified dynamic library file, the analyzed software installation package is packaged again, and the reinforced software installation package is generated. According to the reinforcement and protection method and system for the software installation package, the safety of the software installation package is improved, and the difficulty of reverse engineering, decompilation, debugging, cracking and / or secondary packaging of the software installation package is increased.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a method and system for strengthening and protecting software installation packages. Background technique [0002] The Android platform has developed rapidly and has gradually become the most popular operating system for mobile terminals. Compared with other terminal operating systems, the open Android system provides application developers with more functional interfaces. These functional interfaces improve the system scalability, but also facilitates malware. Malware such as Trojan horses targeting the Android system can be stored in the Android installation package in a disguised manner, tricking users into installing and granting certain permissions, and then performing some specific actions in the background by abusing permissions, including stealing user privacy, defrauding tariffs, etc.; Not only that, for some normal Android system applications, there are also threats ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/14
CPCG06F21/12G06F21/14
Inventor 刘敏
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products