Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information, device and system for obtaining information in source codes

A technology of source code and code, applied in the field of communication, can solve problems such as low debugging efficiency and poor code readability, and achieve the effect of diversifying obfuscation algorithms, increasing security, and increasing confidentiality

Active Publication Date: 2016-06-22
HUAWEI TECH CO LTD
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the debugging process, the compiled program only carries the information of the obfuscated code, and the readability of the obfuscated code is very poor. For example, the debugger cannot directly determine the meaning of gvmde directly. The debugging method is less efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information, device and system for obtaining information in source codes
  • Information, device and system for obtaining information in source codes
  • Information, device and system for obtaining information in source codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0052] In addition, the terms "first" and "second" are used for descriptive purposes only, and cannot be understood as indicating or implying relative importance or implicitly specifying the quantity of indicated technical features. Thus, a feature defined as "first" and "second" may explicitly or implicitly include one or more of these features. In the description of the present invention, unless otherwise specified, "plurality" means two or more.

[0053] Embodiments of the present invention provide a method for obtaining information in source code, which can be applied to such as figure 1 In the shown system for obtaining information in source code, the system in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention provide a method, device and system for obtaining information in source codes, relates to the technical field of communication, and aims at directly positioning the character strings with flaws in the source codes before the obfuscation by debugging devices so as to improve the code debugging efficiency. The method comprises the following steps: obtaining a first character string in an obfuscated code by a debugging device; extracting an identifier of a target obfuscation algorithm by the debugging device from the obfuscated code, wherein the target obfuscation algorithm is used for obfuscating a second character string in the source code into the first character string; determining a decryption algorithm corresponding to the identifier of the target obfuscation algorithm in an algorithm library by the debugging device according to the identifier of the target obfuscation algorithm, wherein the algorithm library is used for indicating the corresponding relationship between the identifier of the obfuscation algorithm and the decryption algorithm; and decrypting the first character string by the debugging device by adopting the decryption algorithm corresponding to the identifier of the target obfuscation algorithm, so as to obtain the second character string in the source code.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device and system for obtaining information in source codes. Background technique [0002] Obfuscated code, also known as obfuscated code, is the behavior of converting the code of a computer program into a functionally equivalent but difficult to read and understand form. For example, there is a function named get_password in the pre-compiled code, and the function of this function is to obtain the password of a certain application. Then, based on the security considerations of user information, the obfuscation device can be used to obfuscate the program before release. Code obfuscation, for example, the name of the function after obfuscation is gvmde, and then the obfuscated code is compiled, and finally the compiled program is released to the user. The compiled program is the binary program corresponding to the obfuscated code. [0003] The user can d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F9/45G06F11/36
CPCG06F8/51G06F11/3624G06F21/14G06F21/602
Inventor 周巍
Owner HUAWEI TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More