Information, device and system for obtaining information in source codes

A technology of source code and code, applied in the field of communication, can solve problems such as low debugging efficiency and poor code readability, and achieve the effect of diversifying obfuscation algorithms, increasing security, and increasing confidentiality

Active Publication Date: 2016-06-22
HUAWEI TECH CO LTD
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the debugging process, the compiled program only carries the information of the obfuscated code, and the readability of the obfuscat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information, device and system for obtaining information in source codes
  • Information, device and system for obtaining information in source codes
  • Information, device and system for obtaining information in source codes

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0051] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments.

[0052] In addition, the terms "first" and "second" are only used for descriptive purposes, and should not be construed as indicating or implying relative importance or implying the number of indicated technical features. Thus, a feature defined as "first" or "second" may expressly or implicitly include one or more of that feature. In the description of the present invention, unless otherwise specified, "plurality" means two or more.

[0053] Embodiments of the present invention provide a method for obtaining information in source code, which can be applied to, for example, figure 1 In the shown system for obtaining information in source co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide a method, device and system for obtaining information in source codes, relates to the technical field of communication, and aims at directly positioning the character strings with flaws in the source codes before the obfuscation by debugging devices so as to improve the code debugging efficiency. The method comprises the following steps: obtaining a first character string in an obfuscated code by a debugging device; extracting an identifier of a target obfuscation algorithm by the debugging device from the obfuscated code, wherein the target obfuscation algorithm is used for obfuscating a second character string in the source code into the first character string; determining a decryption algorithm corresponding to the identifier of the target obfuscation algorithm in an algorithm library by the debugging device according to the identifier of the target obfuscation algorithm, wherein the algorithm library is used for indicating the corresponding relationship between the identifier of the obfuscation algorithm and the decryption algorithm; and decrypting the first character string by the debugging device by adopting the decryption algorithm corresponding to the identifier of the target obfuscation algorithm, so as to obtain the second character string in the source code.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device and system for obtaining information in source codes. Background technique [0002] Obfuscated code, also known as obfuscated code, is the behavior of converting the code of a computer program into a functionally equivalent but difficult to read and understand form. For example, there is a function named get_password in the pre-compiled code, and the function of this function is to obtain the password of a certain application. Then, based on the security considerations of user information, the obfuscation device can be used to obfuscate the program before release. Code obfuscation, for example, the name of the function after obfuscation is gvmde, and then the obfuscated code is compiled, and finally the compiled program is released to the user. The compiled program is the binary program corresponding to the obfuscated code. [0003] The user can d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F9/45G06F11/36
CPCG06F8/51G06F11/3624G06F21/14G06F21/602
Inventor 周巍
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products