File reinforcement method and device

A technology for strengthening devices and files, applied in computer security devices, instruments, computing, etc., can solve problems such as harming users, defrauding users, defrauding users for installation, etc., and achieves the effect of preventing reverse and protecting security.

Active Publication Date: 2016-09-07
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malware such as Trojan horses targeting the Android system can be stored in the Android installation package in a disguised manner, tricking users into installing and granting certain permissions, and then performing some specific actions in the background by abusing permissions, including stealing user privacy, defrauding tariffs, etc.; Not only that, for some normal Android system applications, there are also threats to the security of the Android system through illegal copying, reverse engineering, decompilation, debugging, cracking, secondary packaging, memory interception, etc., which not only endangers users, but also gives normal app developers causing serious damage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File reinforcement method and device
  • File reinforcement method and device
  • File reinforcement method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] refer to figure 1 , shows a flow chart of steps of a file hardening method according to an embodiment of the present invention.

[0030] Step 102, converting the target function in the target executable file in advance and registering it in the library file.

[0031] Taking the Android system as an example, the APK (Android Package, Android installation package) includes the dex (DalvikVM executes) file, which is the Android Dalvik execution program, that is, the type of executable file on the Android platform, and the suffix is ​​.dex. If the execution process of the dex file, such as functions, is reversed, it will affect the security of the corresponding application and system. Therefore, the embodiment of the present invention proposes a reinforcement method for dex files, so as to prevent the dex files from being reversed and protect the security of files, applications and systems.

[0032] For the target executable file such as the target function in the dex fil...

Embodiment 2

[0040] The embodiment of the present invention can be applied to the Android system. Taking the reinforcement and protection of the dex file as an example, it is assumed that the library file is an so file, the target function is an OnCreate function, and the local function is a native function. The steps and flow of the file hardening method are discussed in conjunction with this example.

[0041] refer to figure 2 , shows a flow chart of steps of a file hardening method according to another embodiment of the present invention.

[0042] Step 202, pre-store the target function in the target executable file.

[0043] Step 204, converting the target function in the target executable file into a local function.

[0044] Step 206, register the local function in the library file.

[0045] In the embodiment of the present invention, the target executable file to be protected can store its target function in advance, so that the outside cannot crack its execution process during s...

Embodiment 3

[0064] On the basis of the above embodiments, this embodiment also provides a file strengthening device.

[0065] refer to image 3 , shows a structural block diagram of a file hardening device according to an embodiment of the present invention.

[0066] The preset module 302 is configured to pre-transform the target function in the target executable file and register it in the library file.

[0067] The library file calling module 304 is configured to determine the registered local function through the library file when the system calls the target function.

[0068] The instruction interpreting module 306 is configured to determine the target function according to the registered local function, and sequentially interpret and execute each instruction in the target function through a preset interpreter.

[0069] For the target executable file such as the target function in the dex file, convert the target function, and then register the converted function in the library file...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file reinforcement method and device. The method comprises the following steps: converting a target function in a target executable file, and registering in a library file; when a system calls the target function, determining a registered local function through the library file; and according to the registered local function, determining the target function, and successively carrying out interpretive execution on each instruction in the target function through a preset interpreter. Through the reinforcement of the target executable file, the target executable file can be prevented from being inverted so as to protect the safety of the target executable file.

Description

technical field [0001] The invention relates to the field of reinforcement technology, in particular to a file reinforcement method and device. Background technique [0002] The Android platform has developed rapidly and has gradually become the most popular operating system for mobile terminals. Compared with other terminal operating systems, the open Android system provides application developers with more functional interfaces. These functional interfaces improve the system scalability, but also facilitates malware. Malware such as Trojan horses targeting the Android system can be stored in the Android installation package in a disguised manner, tricking users into installing and granting certain permissions, and then performing some specific actions in the background by abusing permissions, including stealing user privacy, defrauding tariffs, etc.; Not only that, for some normal Android system applications, there are also threats to the security of the Android system th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/604
Inventor 刘敏周亚金丁昌坤
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products