Source code obfuscation method and device based on variables and code execution order

A code execution and source code technology, applied in the field of source code obfuscation methods and devices based on variables and code execution order, can solve the problems of illegal tampering of important information, hidden dangers of application program security, illegal theft, etc., and improve the ability of anti-reverse analysis , the effect of improving safety

Active Publication Date: 2021-11-16
BEIJING BANGCLE TECH CO LTD
View PDF19 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, when obtaining the above-mentioned information illegally, static analysis tools such as disassembly and decompilation are usually used to reversely analyze and crack the source code of the application program to obtain the execution logic of the application program, thereby illegally stealing and illegally tampering with the application program during its operation. Important information generated, resulting in a major security risk in the application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Source code obfuscation method and device based on variables and code execution order
  • Source code obfuscation method and device based on variables and code execution order
  • Source code obfuscation method and device based on variables and code execution order

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0037] The embodiment of the present application provides a source code obfuscation method based on variables and code execution order, which can be applied to terminal devices or servers; wherein, the above-mentioned terminal devices can be mobile phones, tablet computers, computers, etc.

[0038] figure 1 The first method flow chart of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application provides a source code obfuscation method and device based on variables and code execution sequence, including: first obfuscate the target variables that need to be protected in the source code of the target application program; The jump logic at runtime splits the source code into multiple code blocks; based on the jump logic and the code block marks corresponding to each code block, the second obfuscation process is performed on the execution order of the target code blocks in multiple code blocks ; and establish a jump table representing the execution order of multiple code blocks, the jump table stores the mapping relationship between the code block mark and the code block address after the second obfuscation process; wherein, the code block mark is used to access the corresponding code block address. In this application, the purpose of blurring and obfuscating target variables in the source code and hiding the execution sequence of the source code can be achieved, thereby improving the anti-reverse analysis capability of the source code and improving the security of information in the application program.

Description

technical field [0001] The present application relates to the technical field of software security, in particular to a source code obfuscation method and device based on variables and code execution order. Background technique [0002] With the continuous development of science and technology, terminal equipment has been widely used in people's life and work. With the wide application of terminal devices, more and more application programs are installed on the terminal devices. When a user uses some application programs, some important information may be stored in the application program, and some people may attack the application program in order to illegally obtain the information. [0003] At present, when obtaining the above-mentioned information illegally, static analysis tools such as disassembly and decompilation are usually used to reversely analyze and crack the source code of the application program to obtain the execution logic of the application program, thereby...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 阚志刚陈彪王文洋李世杰尉爽生卢佐华
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products