Code obfuscation method and code running method and device

A code obfuscation and object file technology, applied in the fields of code obfuscation method, code operation method and device, can solve the problem of low code obfuscation rate in Java layer

Inactive Publication Date: 2017-08-11
ALIBABA GRP HLDG LTD
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiment of the present application provides a code obfuscation method, code operation method and device, to at

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code obfuscation method and code running method and device
  • Code obfuscation method and code running method and device
  • Code obfuscation method and code running method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] According to the embodiment of the present application, an embodiment of a code running method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0037] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a computer terminal of a code running method in the embodiment of the present application. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors 102 (the processors 102...

Embodiment 2

[0051] According to the embodiment of the present application, an embodiment of a code obfuscation method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0052] The method embodiment provided in Embodiment 2 of the present application can still be executed in a mobile terminal, a computer terminal or a similar computing device. It should be noted here that the method embodiment provided in Embodiment 2 can still run on figure 1 on the computer terminal shown.

[0053] Under the above operating environment, this application provides such image 3 The code obfuscation method shown, image 3 is a schematic flowchart of a code obfuscation method according to E...

Embodiment 3

[0117] According to an embodiment of the present application, a code running device for implementing the above code running method is also provided, such as Figure 10 As shown, the apparatus may include: a first acquiring unit 1001 , a judging unit 1003 , and a first processing unit 1005 .

[0118]Wherein, the first obtaining unit 1001 is configured to obtain the name of the object to be called through a preset static replacement operation, wherein the static replacement operation is a function pre-configured in the first target file of the target application, and the first target file It is used to record the installation information of the target application program; the judging unit 1003 is used to judge whether the object name to be called is included in the preset confusion table, wherein the confusion table is a table generated according to the first target file and the second target file , the confusion table is used to indicate the correspondence between the object na...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a code obfuscation method and a code running method and device. The method comprises the steps that an object name to be called is acquired through preset static replacement operation, wherein the static replacement operation is a function configured in a first target file of a target application in advance, and the first target file is used for recording installation information of the target application; whether the object name to be called is contained in a preset obfuscation table is judged, wherein the obfuscation table is generated according to the first target file and a second target file and used for indicating the corresponding relation between the object name and an obfuscation name, and the second target file is used for recording declaration information of the target application; and if the object name to be called is contained in the obfuscation table, the obfuscation name corresponding to the object name to be called is searched for in the obfuscation table and output. Through the method, the technical problem that in the prior art, the obfuscation rate of Java layer codes of an application is low is solved.

Description

technical field [0001] The present application relates to the field of computers, in particular, to a code obfuscation method, a code running method and a device. Background technique [0002] Java layer (Java is an object-oriented programming language that can write cross-platform applications. Generally, Java has a three-tier architecture composed of data access layer, business logic layer and interface layer) code confusion is to protect code logic One of the effective means not to be easily cracked by hackers, the method is mainly to use external tools to modify the class name, method name and member variable name in the code into relatively incomprehensible names after the code is compiled. At present, Java layer code obfuscation mainly relies on ProGuard (a tool for compressing, optimizing and obfuscating Java code), but ProGuard has at least the following three defects in the process of use: [0003] First, when developers use ProGuard to confuse Java code, they need...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 孙泽夺泮晓波丁健生
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products