Android application hardening method based on dex bytecode detachment mapping obfuscation

A bytecode and mapping table technology, which is applied in the field of Android application reinforcement based on DEX bytecode extraction and mapping obfuscation, to avoid security problems, achieve effective obfuscation protection, and ensure independence and versatility

Active Publication Date: 2022-04-08
CHANGSHU INSTITUTE OF TECHNOLOGY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the emergence and rapid development of reverse analysis technologies such as memory extraction, dynamic unpacking, taint analysis, and symbolic execution, traditional hardening methods can no longer meet the needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android application hardening method based on dex bytecode detachment mapping obfuscation
  • Android application hardening method based on dex bytecode detachment mapping obfuscation
  • Android application hardening method based on dex bytecode detachment mapping obfuscation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] Such as figure 1 As shown, an Android application reinforcement method based on DEX bytecode detachment mapping obfuscation, the method includes DEX detachment mapping obfuscation and mapping interpretation execution, specifically includes the following steps:

[0032] S01: Decompress the APK program of the Android application to obtain the original DEX file;

[0033] S02: Extract the code_item code to be obfuscated from the original DEX file, and map and obfuscate the code_item according to the opcode mapping table; Code_item is the content in the Android dex file format.

[0034] S03: Extract the table information in the original DEX file, place the obfuscated code_item code and the source code of the mapping interpreter in the source code of the mapping interpretation execution environment, compile the source code of the mapping interpretation execution environment to obtain the shared object of the mapping interpretation execution environment Library (Shared Object...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Android application strengthening method based on DEX bytecode extraction and mapping confusion, comprising: extracting code_item code to be confused from the original DEX file obtained by the Android application APK program, and mapping and confusing the code_item; The source code of the mapping interpretation execution environment is compiled to obtain the shared object library (SO) executable file of the mapping interpretation execution environment; the DEX bytecode is decompiled into Java source code, and the Java entry method of the mapping interpretation execution environment is added to execute the original Java method Instead of obfuscation, compile it into a new obfuscated DEX file; sign and package other files in the APK, the obfuscated DEX file and the SO executable file that maps the interpretation execution environment together to form a new reinforced Android application APK program. Without affecting the running overhead, it not only greatly improves the obfuscation strength, but also can effectively resist various reverse analysis attacks, and has strong anti-attack resilience.

Description

technical field [0001] The invention relates to a method for strengthening and protecting an Android application, in particular to a method for strengthening an Android application based on DEX bytecode extraction and mapping confusion. Background technique [0002] In mobile Internet communications, the Android system has been supported by a large number of application developers due to its openness and free features. Various Android applications emerge in an endless stream, bringing rich experience to mobile terminal users. However, since Android applications are mainly developed in the Java language and compiled into DEX bytecodes to run in the Dalvik or ART (AndroidRuntime) virtual machine environment of the Android system, attackers can crack, tamper, and hook Android applications through reverse analysis of DEX. (Hook) and repackaging, causing security issues such as piracy, code injection, and privacy information leakage of Android applications. In 2016, the National...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F8/41G06F8/53
CPCG06F8/43G06F8/53
Inventor 乐德广
Owner CHANGSHU INSTITUTE OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products