Source code obfuscation method and device based on variable and code execution sequence

A code execution and execution sequence technology, applied in the field of source code obfuscation method and device based on variables and code execution sequence, can solve problems such as application program security risks, illegal tampering of important information, illegal theft, etc., to improve security and improve The effect of anti-reverse analysis ability

Active Publication Date: 2018-09-14
BEIJING BANGCLE TECH CO LTD
View PDF19 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, when obtaining the above-mentioned information illegally, static analysis tools such as disassembly and decompilation are usually used to reversely analyze and crack the source code of the application program to obtain the execution logic of the application program, thereby illegally stealing and illegally tampering with the application program during its operation. Important information generated, resulting in a major security risk in the application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Source code obfuscation method and device based on variable and code execution sequence
  • Source code obfuscation method and device based on variable and code execution sequence
  • Source code obfuscation method and device based on variable and code execution sequence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0037] The embodiment of the present application provides a source code obfuscation method based on variables and code execution order, which can be applied to terminal devices or servers; wherein, the above-mentioned terminal devices can be mobile phones, tablet computers, computers, etc.

[0038] figure 1 The first method flow chart of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the application provides a source code obfuscation method and device based on variable and code execution sequence. The method comprises: performing first obfuscation on a target variable, which requires protection, in a source code of a target application; dividing the source code into multiple code blocks based on compiling or operating redirect logic of the source code; performing second obfuscation on execution sequence of target code blocks in the multiple code blocks on the basis of the redirect logic and code block markers corresponding to the code blocks; establishinga redirect table that represents the execution sequence of the multiple code blocks, wherein the code block markers and a mapping relationship of code block addresses subjected to second obfuscation are stored in the redirect table, wherein the code block markers are used for visiting the corresponding code block addresses. The method and device have the advantages that the target variable in thesource code can be obscured and obfuscated, the execution sequence of the source code can be hidden, the ability of the source code to prevent reverse analysis can be improved, and security of information in the application can be improved.

Description

technical field [0001] The present application relates to the technical field of software security, in particular to a source code obfuscation method and device based on variables and code execution order. Background technique [0002] With the continuous development of science and technology, terminal equipment has been widely used in people's life and work. With the wide application of terminal devices, more and more application programs are installed on the terminal devices. When a user uses some application programs, some important information may be stored in the application program, and some people may attack the application program in order to illegally obtain the information. [0003] At present, when obtaining the above-mentioned information illegally, static analysis tools such as disassembly and decompilation are usually used to reversely analyze and crack the source code of the application program to obtain the execution logic of the application program, thereby...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 阚志刚陈彪王文洋李世杰尉爽生卢佐华
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products