Android reinforcement method based on DEX byte code extraction and mapping confusion

A bytecode and mapping table technology, which is applied in the field of Android application reinforcement based on DEX bytecode extraction and mapping confusion, to achieve the effects of ensuring independence and versatility, realizing security reinforcement protection, and effective obfuscation protection

Active Publication Date: 2018-11-02
CHANGSHU INSTITUTE OF TECHNOLOGY
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the emergence and rapid development of reverse analysis technologies such as memory extraction, dynamic unpacking, taint analysis, and symbolic execution, traditional hardening methods can no longer meet the needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android reinforcement method based on DEX byte code extraction and mapping confusion
  • Android reinforcement method based on DEX byte code extraction and mapping confusion
  • Android reinforcement method based on DEX byte code extraction and mapping confusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] Such as figure 1 As shown, an Android application reinforcement method based on DEX bytecode detachment mapping obfuscation, the method includes DEX detachment mapping obfuscation and mapping interpretation execution, specifically includes the following steps:

[0032] S01: Decompress the APK program of the Android application to obtain the original DEX file;

[0033] S02: Extract the code_item code to be obfuscated from the original DEX file, and map and obfuscate the code_item according to the opcode mapping table; Code_item is the content in the Android dex file format.

[0034] S03: Extract the table information in the original DEX file, place the obfuscated code_item code and the source code of the mapping interpreter in the source code of the mapping interpretation execution environment, compile the source code of the mapping interpretation execution environment to obtain the shared object of the mapping interpretation execution environment Library (Shared Object...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an android reinforcement method based on DEX byte code extraction and mapping confusion. The method comprises the steps of extracting to-be-confused code_item codes from an original DEX file obtained through an android package (APK) program, and carrying out mapping confusion on the code_item; compiling source codes of a mapping interpretation execution environment to obtain a shared object (SO) library executable file of the mapping interpretation execution environment; decompiling DEX byte codes into Java source codes, adding a Java entrance method of the mapping interpretation execution environment, carrying out replacement confusion on an original Java method, and carrying out compiling to obtain a new confused DEX file; and signing and packaging other files inthe APK, the confused DEX file and the SO library executable file of the mapping interpretation execution environment into a new reinforced android APK program. Under the condition that the operationcost is not influenced, the confusion strength is greatly improved, various reverse analysis attacks can be effectively resisted, and the relatively high anti-attack resiliency is achieved.

Description

technical field [0001] The invention relates to a method for strengthening and protecting an Android application, in particular to a method for strengthening an Android application based on DEX bytecode extraction and mapping confusion. Background technique [0002] In mobile Internet communications, the Android system has been supported by a large number of application developers due to its openness and free features. Various Android applications emerge in an endless stream, bringing rich experience to mobile terminal users. However, since Android applications are mainly developed in the Java language and compiled into DEX bytecodes to run in the Dalvik or ART (AndroidRuntime) virtual machine environment of the Android system, attackers can crack, tamper, and hook Android applications through reverse analysis of DEX. (Hook) and repackaging, causing security issues such as piracy, code injection, and privacy information leakage of Android applications. In 2016, the National...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/41G06F8/53
CPCG06F8/43G06F8/53
Inventor 乐德广
Owner CHANGSHU INSTITUTE OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products