A file reinforcement method and device
A file and configuration file technology, applied in computer security devices, instruments, computing, etc., can solve the problems of stealing user privacy, defrauding users to install, defrauding fees, etc., and achieves the effect of ensuring file security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0020] refer to figure 1 , shows a flow chart of steps of a file hardening method according to an embodiment of the present invention.
[0021] Step 102, storing the function call information in the target executable file in the configuration file in advance.
[0022] Taking the Android system as an example, the APK (Android Package, Android installation package) includes a dex (DalvikVMexecutes) file, which is an Android Dalvik execution program, that is, the type of executable file on the Android platform, and the suffix is .dex. If the execution process of the dex file, such as functions, is reversed, it will affect the security of the corresponding application and system. Therefore, the embodiment of the present invention proposes a reinforcement method for dex files to prevent the dex files from being reversed and protect the security of files, applications and systems.
[0023] For target executable files such as dex files, the function call can be hidden so that the...
Embodiment 2
[0029] The embodiment of the present invention can be applied to the Android system, taking the reinforcement and protection of the dex file as an example. The steps and flow of the file hardening method are discussed in conjunction with this example.
[0030] refer to figure 2 , shows a flow chart of steps of a file hardening method according to another embodiment of the present invention.
[0031] In step 202, the call relationship of all or part of the functions is obtained from the target executable file in advance, and the corresponding function call information is obtained.
[0032] Step 204, storing the function call information in a configuration file.
[0033] The target executable file to be protected in the embodiment of the present invention is the dex file, and the function call relationship can be hidden by function obfuscation, that is, to the function call in the target executable file, the call relationship of all or part of the function is obtained, and th...
Embodiment 3
[0045] On the basis of the above embodiments, this embodiment also provides a file strengthening device.
[0046] refer to image 3 , shows a structural block diagram of a file hardening device according to an embodiment of the present invention.
[0047] The preset module 302 is configured to pre-store the function call information in the target executable file into the configuration file.
[0048] The call determination module 304 is configured to determine function call information according to the configuration file when the system executes the target executable file.
[0049] The call execution module 306 is configured to execute a function call according to the function call information.
[0050] Taking the Android system as an example, the APK (Android Package, Android installation package) includes a dex (DalvikVMexecutes) file, which is an Android Dalvik execution program, that is, the type of executable file on the Android platform, and the suffix is .dex. If th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


