Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for preventing external debugging through self-debugging

A debug state and stop state technology, applied in the computer field, can solve problems such as malicious attacks and cracks of applications, and achieve the effect of avoiding malicious attacks and cracks

Active Publication Date: 2020-03-06
BEIJING BANGCLE TECH CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method for preventing external debugging through self-debugging, which is used to solve the problem in the prior art that application program attackers can use the debugger to track the operation of the application program, thereby maliciously attacking and cracking the application program
[0006] The embodiment of the present application also provides a device for preventing external debugging through self-debugging, which is used to solve the problem in the prior art that application program attackers can use the debugger to track the operation of the application program, so that the application program can be maliciously attacked and cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for preventing external debugging through self-debugging
  • A method and device for preventing external debugging through self-debugging
  • A method and device for preventing external debugging through self-debugging

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0022] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0023] As described in the background art, due to the open source nature of the Android system itself, application attackers often carry out malicious attacks on the application in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a method for preventing external debugging by self-debugging. The method is used for solving the problem that application attackers can track operation of an application by using a debugger so as to attack and crack the application in the prior art. The method comprises: based on a main process of an application, creating at least two sub-processes of the application; and debugging the main process of the application by using each of the sub-processes, so as for each of the sub-processes and the main process to be in a loopback debugging state. The present application further discloses an apparatus for preventing external debugging by self-debugging.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method and device for preventing external debugging through self-debugging. Background technique [0002] With the rapid development of the mobile Internet industry, mobile applications are exploding, and more and more mobile Android applications are developed based on the Android system. For the convenience of description, Android applications are referred to as applications below. [0003] Due to the open source nature of the Android system itself, more than 97% of applications will be attacked by piracy and viruses and Trojan horses. Applications are gradually replacing personal computers as the main target of hacker attacks. [0004] In the prior art, an application attacker can use a debugger to track the running of the application, view and modify the memory code and data of the application, and analyze the program logic of the application, thereby attacking a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/52G06F21/55
CPCG06F21/52G06F21/554
Inventor 阚志刚陈彪程显龙方宁卢佐华
Owner BEIJING BANGCLE TECH CO LTD