Supercharge Your Innovation With Domain-Expert AI Agents!

Java reflection mechanism-based automatic Android application shelling method

A reflection mechanism and automatic technology, applied in computer security devices, instruments, calculations, etc., can solve problems such as unrecoverable code and unrecoverable

Inactive Publication Date: 2016-07-06
博雅网信(北京)科技有限公司 +1
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, the AppSpear and DexHunter systems are both developed based on the source code of the Android system. Among them, AppSpear uses simulated manual clicking on the application to trigger the execution of all codes, and at the same time restores the code by recording all executed instructions, which may cause some codes to not be triggered. Recovery; DexHunter actively triggers all codes and collects them just before the code is about to be executed. It is feasible to fight against some reinforcement technologies, but it cannot restore completeness against Baidu reinforcements that only restore the code after it is actually executed. the code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Java reflection mechanism-based automatic Android application shelling method
  • Java reflection mechanism-based automatic Android application shelling method
  • Java reflection mechanism-based automatic Android application shelling method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] An embodiment of the present invention will be further described below in conjunction with the accompanying drawings.

[0018] In the embodiment of the present invention, such as figure 1 and figure 2 As shown, the Android application automatic shelling method based on the Java reflection mechanism includes the following steps:

[0019] Step 1. Locate the Android application executable file in the memory;

[0020] Android reinforcement technology usually adopts multiple schemes to carry out DEX hiding (e.g. erasing the DEX header logo), but when the Dalvik virtual machine is running, the system will save all DEX files loaded into memory in a global variable gDvm; the present invention The embodiment dynamically loads libdvm.so through dlopen and dlsym functions, and obtains the address of the global variable gDvm, finally obtains pDexFile through this structure, that is, the loaded DEX memory address;

[0021] Step 2, determine the type descriptors of all the classe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a Java reflection mechanism-based automatic Android application shelling method, and belongs to the technical field of internet network security. Compared with AppSpear passive triggering, the method adopts an active triggering mode to ensure the integrity of DEX files; compared with dexhunter, the method is capable of ensuring complete shelling; through dexhunter, protected dex can be obtained, but certain methods are still in encryption state; the method collects all the decryption operations and carries out dynamic execution, so that all the methods are in decryption state; and moreover, above two methods based on Android system source code development are strong in system dependence, respective development needs to be carried out in allusion to systems in different versions, so that the methods are difficult to maintain; the method disclosed in the invention is based on a Java reflection mechanism, and is light in weight and suitable for Android systems in various versions.

Description

technical field [0001] The invention belongs to the technical field of mobile Internet network security, and in particular relates to an Android application automatic unpacking method based on a Java reflection mechanism. Background technique [0002] One of the problems that Android developers often face is anti-cracking and anti-secondary packaging; nowadays, security issues are becoming more and more important, and more and more Android developers are also beginning to seek security protection solutions; in order to strengthen APP security, the more More and more developers choose the APP reinforcement solution to strengthen and protect the APP to prevent risks such as secondary packaging (piracy) and data tampering; currently, malicious codes often use reinforcement technology to fight against Trojans. In order to accurately locate malicious codes, it is necessary to Use the appropriate unpacking technique. [0003] In the prior art, the AppSpear and DexHunter systems a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/033
Inventor 陈伟腾陈钟李青山关志陈果高健博秦煜李洪生轩志朋王晓青
Owner 博雅网信(北京)科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More