Supercharge Your Innovation With Domain-Expert AI Agents!

A dynamic encryption and decryption-based Android application reinforcing method

A technology for application programs and encrypted data, applied in the field of information security, can solve the problems of reducing program operation efficiency, reinforcement is easy to be broken through, compression or encryption is difficult to resist external attacks, etc., and achieves the effect of protecting the encrypted results

Inactive Publication Date: 2017-09-15
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF11 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the research on Android applications and unpacking technology, simple compression or encryption and it is difficult to resist external attacks, and the reinforcement is relatively easy to be broken
But too complex encryption will also reduce the operating efficiency of the program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A dynamic encryption and decryption-based Android application reinforcing method
  • A dynamic encryption and decryption-based Android application reinforcing method
  • A dynamic encryption and decryption-based Android application reinforcing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to better illustrate the purpose and advantages of the present invention, the implementation of the method of the present invention will be further described in detail below in conjunction with examples.

[0023] The specific process is:

[0024] Step 1, key code encryption.

[0025] Step 1.1, extracting the classes.dex file in the compressed APK file of the Android application.

[0026] Step 1.2, locate the core code. The core code part includes: program Activity, Service life cycle code, program login and other codes involving keys and verification, and program core algorithm code. Extract each section of core code separately.

[0027] Step 1.3, use the key K1 to perform AES encryption on each key code.

[0028] In step 1.4, add the start and end identification bits to each encrypted code, replace the original code, and recalculate the length and check value of the dex file.

[0029] Step 2, dex file encryption.

[0030] Step 2.1, use the key K2 to encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a dynamic encryption and decryption-based Android application reinforcing method and belongs to the technical field of information security. The method comprises four modules of code encryption, dynamic defense, integrity checking and dynamic loading. The encryption process comprises the steps of encrypting class.dex of an Android application program, performing secondary encryption on a core code, authenticating a signature after encryption and embedding an encryption result into a resource file. The dynamic defense process comprises the steps of detecting a debugger and a simulator and exiting the application program if detecting that the application is being debugged or operated in the simulator. A subprocess is started and the subprocess and a main process perform mutual ptrace monitoring; the subprocess detects the debugger and simulator circularly and the process is ended if the application is being debugged. An integrity detection module authenticates signature information and prevents resources and codes from being falsified. A code decryption module extracts encryption information hidden in pictures, obtains intermediate data through decryption, performs secondary decryption on a core code part therein, and loads a result obtained after decryption to a memory directly for execution.

Description

technical field [0001] The invention relates to an Android application reinforcement method, which belongs to the technical field of information security. Background technique [0002] Since Google launched the Android system in 2007, the Android market has developed rapidly, but the application APK generated by the Android platform is extremely vulnerable to attack. Attackers use decompilation, reverse engineering and other technologies to crack Android applications, steal application codes and user data, and bring many unsafe factors to application use. Therefore, anti-reversal for the Android system is very important. Through the reinforcement of the application, the purpose of protecting the application code, anti-cracking, anti-reversing, and anti-implantation is achieved, thereby ensuring the originality and integrity of the Android application. [0003] Starting from Android2.3, code obfuscation technology has been used. By obfuscating source JAVA code or smali fil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14G06F21/16
Inventor 罗森林尚海潘丽敏喻露
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More