Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Android application protection method based on code sinking and residual code interpretation

An application and code technology, applied in the field of Android APP protection, can solve problems such as ineffectiveness and function, and achieve the effect of eliminating secondary packaging, high flexibility, and enhancing time and cost overhead.

Active Publication Date: 2020-09-01
NORTHWEST UNIV
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The attack test experiment shows that the protection method we propose can effectively prevent the attacks of current reverse engineering tools at the expense of acceptable performance overhead, and most static and dynamic reverse analysis can not achieve the corresponding effect and effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android application protection method based on code sinking and residual code interpretation
  • Android application protection method based on code sinking and residual code interpretation
  • Android application protection method based on code sinking and residual code interpretation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035]This embodiment proposes an Android application program protection method based on code sinking and residual code interpretation, and we will describe it from two aspects: the reinforcement process of the protection method and the execution process of the protected Android program. In the present invention, we choose the "OnCreate" method of the "MainActivity" class in the APP as the target function of Native to carry out JNI reflection sinking, realize the function of the "OnCreate" method in the local layer, compile and generate explanatory so files, which is The first step in this protection method. Considering that some methods except the OnCreate method may contain important logic, and at the same time, in order to increase the difficulty of reverse analysis, the present invention proposes a technology of diverse virtual interpretation of residual codes. This solution adopts code virtualization technology, that is, to extract the instructions of the method to be pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Android application protection method based on code sinking and residual code interpretation, which includes: searching for key methods that need to be protected in the dex file, including key code segments that need to be protected by code reflection sinking technology and the need for diversity Virtually interpret the key code segments protected by Dex residual code technology; convert the key code segments that need to be protected by code reflection sinking technology into Native types and JNI reflection translation operations, and compile them into interpretive so files; virtually interpret the residual code that requires diversity Instructions are extracted for the protected key code segments, diversity virtualization is performed after preprocessing, the processing results are stored in custom files, the local layer CPP file is compiled and run, and finally an interpretive so file is formed; the two so files are loaded and connected, and the application When the program is loaded and running, the interpreted so file replaces the execution of the key code segment. The present invention combines two different protection methods, which greatly improves the attack threshold of attackers and increases the reverse cost.

Description

technical field [0001] The invention belongs to the technical field of Dex file reinforcement in Android applications, and specifically relates to an Android APP protection method based on the combination of Java layer code sinking and diverse virtual interpretation of Dex residual codes. Background technique [0002] In recent years, as the market share of Android mobile phones continues to increase, the subsequent security problems have become more and more severe, and the problem of secondary packaging is particularly serious. There are endless cases of privacy leakage, fund theft, and traffic consumption caused by secondary packaging, which have brought huge losses to developers and users. [0003] Android programs are mostly developed by Java as the native language, so it is particularly important to protect the classes.dex files compiled by the Java language in Android applications. file) protection methods include: Dex overall encryption technology, class loading enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F8/41G06F8/53G06F21/14G06F21/60
CPCG06F8/41G06F8/53G06F21/14G06F21/602
Inventor 汤战勇李振何中凯房鼎益陈晓江龚晓庆陈峰王薇
Owner NORTHWEST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products