Android application reinforcing method baed on C source code mixing

A source code and code technology, applied in the field of information security, can solve problems such as confusion and unsatisfactory software protection effect, and achieve the effect of enhancing protection measures and increasing reusability

Inactive Publication Date: 2017-01-11
北京鼎源科技有限公司
View PDF4 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The code obfuscation techniques used in some existing Android application hardening methods are mostly based on Java sour...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android application reinforcing method baed on C source code mixing
  • Android application reinforcing method baed on C source code mixing
  • Android application reinforcing method baed on C source code mixing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Below in conjunction with accompanying drawing, further describe the present invention through embodiment, but do not limit the scope of the present invention in any way.

[0039] The invention provides an Android application strengthening method based on the obfuscation of C source code, which obfuscates the C source code in the Android application program, so that the Android application program code is protected. The hardening method includes writing the key code of the program in C language and obfuscating the C source code; figure 1 It is a block flow diagram of the Android application reinforcement method of C source code confusion provided by the present invention, specifically comprising the following steps:

[0040] A. Obfuscate the important code written in C language, use control flow compression technology, and perform the following operations:

[0041] A1. Read the source program P;

[0042] A2. Preprocess P, analyze and extract the function information o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Android application reinforcing method based on C source code mixing. The method comprises writing program key codes by using C programming languages and mixing C source codes. The reinforcement of Android application is achieved by mixing the C source codes in the Android application program, and the Android application program codes are protected. The Android application reinforcing method based on C source code mixing specifically includes the steps of writing the key part of the program by using C programming languages, writing programs into .so dynamic-link library file, invoking the dynamic-link library by using JNI technology in Java language, and then mixing the C source codes, so as to achieve the reinforcement of Android application. According to the Android application reinforcing method based on C source code mixing, important codes are saved in the C dynamic-link library by adopting NDK programming, and then the C source codes are mixed, the software protection is improved. At the same time, the important codes are written in a so library, the reusability of the codes are increased, ready-made so library can be directly introduced into other applications, so as to eliminate the troubles of secondary development.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an Android application reinforcement method based on confusion of C source codes. Background technique [0002] With the continuous intelligence of mobile phones, the functions of mobile phones are becoming more and more powerful, and security threats will also increase accordingly. Payment services such as mobile payment have become popular. These services are closely related to economic transactions, so the security requirements for mobile phone software are Very high, the disclosure of some confidential information or the impersonation of identities will bring huge economic losses. The rights of commercial software developers should also be well protected, so the security of mobile phone software is becoming more and more important. [0003] As an emerging operating system, Android has developed rapidly since its launch in 2007, gradually replacing the Symbian sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 文伟平
Owner 北京鼎源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products