Dalvik bytecode oriented control flow confusion method
A control flow and bytecode technology, applied in the field of software protection, can solve the problems of easy restoration of Android applications, low degree of protection of Android applications, and low degree of obfuscation of obfuscation methods, and achieves implementation overhead and obfuscation intensity. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055] The present invention will be described in more detail below in conjunction with the accompanying drawings and detailed embodiments.
[0056] A method for obfuscating control flow of dalvik bytecode, the method comprises the following steps:
[0057] S1: Perform control flow analysis on the source code of the Android application before obfuscation; use the decompilation tool ApkTool to decompile the Android application into Smali code, and store the Smali code in units of functions, and then use structural blocks as nodes to The Smali code performs obfuscated control flow graph construction. In addition, methods such as BakSmali and Jeb can also be used to decompile Android applications into Smali codes.
[0058] S2: Obfuscate the Smali code; the process of obfuscating the control flow graph specifically includes inserting redundant control flow graphs, non-reducible control flow graphs, and flattening the control flow graph. In the process of flattening the control fl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


