Operation method and device for obfuscated code

An operating method and operating device technology, applied in the field of code encryption, can solve the problems of low difficulty in code cracking and poor code security, and achieve the effect of code obfuscation

Active Publication Date: 2020-06-19
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an operation method and device for obfuscating codes, so as to solve the problems of low difficulty in cracking codes after obfuscation and poor code security existing in code obfuscation schemes in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation method and device for obfuscated code
  • Operation method and device for obfuscated code
  • Operation method and device for obfuscated code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0064] refer to figure 1 , which shows a flow chart of the steps of an embodiment of an obfuscated code operating method according to the present invention, which may specifically include the following steps:

[0065] Step 101, calculating the calculation result of each value of the parameter in the preset calculation function and the known value in the preset calculation function;

[0066] Wherein, the preset operation function includes, but is not limited to, any one or a combination of addition operation function, multiplication operation function, and XOR operation function. Also, the addition function may be continuous addition, such as a+b+2. Similar to multiplication and XOR operation, it can also be a continuous operatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a running method and device of obfuscated code. The method includes: calculating all values of a parameter in a preset operation function and operation results of known numerical values in the preset operation function; storing all the values of the parameter and the corresponding operation results to a newly created data table; receiving target input of running the preset operation function, wherein the target input includes a target value of the parameter; and in response to the target input, finding a target operation result, which corresponds to the target value, inthe data table, and outputting the target operation result. According to the method, all the values of the parameter in the preset operation function and the operation results of all the values and the known values are stored into the data table, thus the target operation result corresponding to the target value of the parameter can be found through a manner of directly querying the data table when the preset operation function is run, code logic of the preset operation function can be completely hidden through the manner of querying the data table, cracking difficulty of the obfuscated code is increased, and code security is improved.

Description

technical field [0001] The invention relates to the technical field of code encryption, in particular to an operation method and device for obfuscating codes. Background technique [0002] In order to improve code security and prevent important logic codes from being cracked, a code obfuscation scheme is proposed. When the current code obfuscation tools obfuscate a single instruction, the usual way is to use multiple instructions that can cancel each other to superimpose the code obfuscation. For example, f(x)=x+2 is confused as f(x)=x-(-2); for another example, a=b+c is confused as: r=rand(), indicating that r is a random number; a =b+r; a=a+c; a=a-r. [0003] Although the existing code obfuscation scheme is easy to implement, the decompiler can use the compiler to optimize the code to restore the obfuscated code to the original code, making the obfuscated code less secure and easy to be crack. Contents of the invention [0004] The present invention provides an opera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 陈钢陈赫
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products