Dynamic shelling method for Android application

An application program and dynamic technology, applied in the field of Android applications, can solve the problems of program unpacking and repairing restrictions, difficult Android program unpacking and repairing, etc., and achieve the effect of security protection

Inactive Publication Date: 2016-09-07
北京鼎源科技有限公司
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To crack the shell of a traditional program, it is necessary to track the control flow to find the OEP (program entry point), then dump the code segment from the memory and transfer it to the hard disk, and rebuild the input table. However, it is a technical difficulty to track the control flow to find the OEP, which makes Unpacking and repairing programs is very limited
It is also difficult to effectively unpack and repair the hardened Android program through existing methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic shelling method for Android application
  • Dynamic shelling method for Android application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Below in conjunction with accompanying drawing, further describe the present invention through embodiment, but do not limit the scope of the present invention in any way.

[0031] The invention provides a shelling and repairing method based on the dynamic framework of the Android system, so that the Android program after reinforcement can be shelled and repaired. In addition, it is necessary to ensure that the semantics of the repackaged program does not change after unpacking, and does not affect the normal execution of the program.

[0032] On the Android platform, due to the immature dex packing technology, it is possible to directly dump the source program without analyzing the algorithm of the source program. The Xposed framework is a framework service that can affect the running of the program without modifying the Android installation package (APK). The basic principle is to affect the running of the program by modifying the system. The open source tool ZjDroid ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic shelling method for an Android application. A reinforced Android application is taken as a target program, and a dex file of the target program is obtained by utilizing an Xposed framework, so that the target program can be subjected to shelling. The dynamic shelling method comprises an Android mobile phone preprocessing process, a target program debugging process, a target program shelling process and a process of extracting the dex file in the target program and repairing the program. A library Libdvm.so in an Android system contains a function with a function parameter being the dex file, such as an openDexFile function, dex subjected to shelling serves as a parameter and is transmitted to the openDexFile function, and the dex subjected to the shelling is obtained by making a breakpoint at the openDexFile function. By utilizing the technical scheme provided by the method, a malicious Android program can be effectively subjected to reverse analysis to obtain a source code of the program so as to realize security protection of the system.

Description

technical field [0001] The invention relates to an Android application program, in particular to a method for unpacking an Android application program based on a dynamic behavior, so that a reinforced Android program can be dynamically unpacked and repaired. Background technique [0002] With the increasing popularity of mobile devices, the mobile application industry, especially Android applications, has developed rapidly. At the same time, the accompanying mobile security issues have become increasingly prominent. Due to the limitation of resources and computing power, mobile terminals cannot install powerful and high-performance virus-killing software. As a result, malicious software such as stealing information and maliciously stealing fees emerge in an endless stream on Android terminals that are widely used. Reverse analysis technology can be used to analyze the functional flow of the application program, tamper with the data code of the application program, etc. witho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/14
CPCG06F21/125G06F21/14
Inventor 文伟平
Owner 北京鼎源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products