Source code hardening method and device based on sequence, symbolic execution and single-point logic

A symbolic execution and source code technology, applied in the direction of program/content distribution protection, etc., can solve the problem that the anti-reverse analysis ability of source code needs to be improved, and achieve the effect of improving the anti-reverse analysis ability and increasing the difficulty of cracking.

Active Publication Date: 2021-11-19
BEIJING BANGCLE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, existing source code obfuscation methods such as control flow flattening still have the risk of being cracked, and the ability to prevent reverse analysis of source code needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Source code hardening method and device based on sequence, symbolic execution and single-point logic
  • Source code hardening method and device based on sequence, symbolic execution and single-point logic
  • Source code hardening method and device based on sequence, symbolic execution and single-point logic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0030] In order to improve the anti-reverse analysis capability of the source code, the embodiment of the present application provides a source code hardening method and device based on sequence, symbolic execution and single-point logic, which will be described respectively below.

[0031] It should be noted that the execution subject for implementin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a source code reinforcement method and device based on sequence, symbolic execution and single-point logic, which can transfer the jump logic between code blocks of the original source code through the code blocks in the jump table mark implementation, to generate the first source code after reinforcement; determine the target variable to be protected in the first source code; insert at least one intermediate variable in the first source code, and insert Part of the target variable is replaced by any of the intermediate variables to obtain the second source code after reinforcement; using an opaque predicate to fuzz the condition variable in the function of the second source code to obtain the second source code after reinforcement third source code. The method and device can improve the anti-reverse analysis capability.

Description

technical field [0001] The present application relates to the technical field of software security, in particular to a source code hardening method and device based on sequence, symbolic execution and single-point logic. Background technique [0002] Nowadays, with the rapid development of technologies such as the mobile Internet, the Internet of Things, and the Internet of Vehicles, the number of terminals is increasing, and more and more applications are installed in the terminals, which brings great convenience to people's work and life . Some important information will be generated during the running of the application, which arouses the great interest of the attackers, which makes the important information have the risk of being leaked. [0003] At present, attackers often use static analysis tools such as disassembly and decompilation to reverse-analyze and crack the source code of the application to obtain the execution logic of the application, thereby illegally ste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 阚志刚陈彪王文洋李世杰尉爽生卢佐华
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products