Android application program code protection mechanism identification method

A protection mechanism and application technology, applied in the field of cyberspace security, can solve problems such as increasing the difficulty of project decompilation, obfuscating code, etc., and achieve the effects of facilitating supervision, providing efficiency, and ensuring reliability

Active Publication Date: 2017-06-13
JINAN UNIVERSITY
View PDF8 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Android system developers often use it to confuse the fi...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android application program code protection mechanism identification method
  • Android application program code protection mechanism identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0042] The Android application code protection mechanism identification method of the present invention first loads the APK file installation package, decompiles the APK package one by one, and then scans the decompiled files to check whether they have undergone measures such as code obfuscation and code encryption. Such as figure 1 Specifically, it includes the following steps:

[0043] Step 1: Load the APK package and read the APK package file according to the path. The loading of the APK package can be completed through the path loader, and the path loader can be written and realized by using the file operation box that comes with the Java language.

[0044] Step 2: Perform preliminary reverse engineering and decompilation of the APK package, and determine and obtain key information such as the installation package name and version of the APK. If it is successful, go to step three; if it is not successful, go to step six after adding the manual identification label. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Android application program code protection mechanism identification method. The method includes: loading APKs (Android packages), and subjecting the APKs to preliminary and in-depth reverse engineering decompiling to acquire a source code; analyzing whether the source code is mixed or not and whether the source code has structure protection or not; subjecting analysis result sets to classification and arrangement to enable result sets which can be understood by computers only to be describe by using language understandable for human beings, and outputting results by means of report forms; for the APKs which cannot be subjected to reverse engineering and decompiling automatically by a machine in the process of analysis, adding manual identification labels, extracting the APK having the manual identification labels after analysis is completed, and acquiring results after manual identification. By the method, whether the code has a protection mechanism or not and which protection mechanism is adopted can be effectively identified.

Description

technical field [0001] The invention belongs to the technical field of network space security, and in particular relates to an identification method of an Android application program code protection mechanism. Background technique [0002] In recent years, with the rapid development and application of the mobile Internet, smart mobile terminals represented by Android have been rapidly popularized and applied. Under such a trend, a large number of excellent mobile Internet companies have emerged. They use APK applications as carriers to convey mobile Internet thinking and business models in different industries to people. However, if the source codes of these APK applications are leaked, it will inevitably bring huge economic losses to mobile Internet companies. Reverse engineering can break open the shell of Android applications. With the help of Android reverse engineering technology, analysts can analyze the source code from an APK application package. With the developme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 翁健张悦魏林锋翁嘉思
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products