A plug-in-based iOS security compiler and a security compiling method

A compilation method and compiler technology, applied in the direction of program/content distribution protection, etc., can solve the problems of difficulty in building a secure compilation environment, incoherent operations, and high resource overhead, and achieve significant code protection effects, high configuration freedom, and installation. Convenient and fast effects

Inactive Publication Date: 2019-05-03
SUNINFO INFORMATION TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) It is difficult and cumbersome to build a secure compilation environment
Most security hardening products are independent of the developer's editor. Developers need to independently install a secure compilation environment and configure various environment variables. Only by porting the code to the newly built secure compilation environment can the code be hardened. High resource overhead and cumbersome operations
[0005] (2) Custom modules are not supported
Other products can only harden the code as a whole, but cannot customize and compile individual modules and source files
[0006] (3) The process is too complicated, difficult to get started, and the operation is not coherent enough. It is likely to miss a certain link in the entire operation process, or waste unnecessary time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A plug-in-based iOS security compiler and a security compiling method
  • A plug-in-based iOS security compiler and a security compiling method
  • A plug-in-based iOS security compiler and a security compiling method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following examples of the present invention are described in detail below. The following examples are implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the embodiment.

[0030] Such as figure 1 As shown, in a preferred embodiment, the plug-in-based iOS security compiling method of the present invention comprises the following steps:

[0031] Step 1. Split the code: In the process of compiling the source code to the target code, on the basis of ensuring the logic is correct, split all the basic code blocks in the function into finer-grained code blocks. The above functions include variable declaration function, loop control function, class method, object method, etc., which are divided into variable declaration block, loop control block, class method block, object method blo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an iOS security compiler based on plug-in. The iOS security compiler comprises a code splitting processing module, a code out-of-order processing module, a code flattening processing module and a code obfuscation processing module. The invention further provides a plug-in-based iOS security compiling method. The method comprises the steps of splitting codes, performing out-of-order processing on the codes, performing flattening processing on the codes and performing control obfuscation processing on the codes. According to the secure compiler and the secure compiling method, the mobile application core code can be protected from being inversed and cracked, the whole process is simple and easy to use, and global or local reinforcement compiling can be carried out on the code in a customized mode.

Description

technical field [0001] The invention belongs to the field of mobile Internet security, and in particular relates to a plug-in-based iOS security compiler and a compiling method. Background technique [0002] With the rapid development of the mobile Internet industry, the types and numbers of mobile applications (APP) are gradually increasing, and the number of mobile users is also increasing. APP has become an important tool that people cannot live without. People use it to shop, travel, pay, investment etc. However, at this time, mobile security risks also follow. Mobile applications generally have some high-risk risks and loopholes, which give criminals an opportunity. Through some simple technical means, it is easy to crack APPs and implant Trojan horses. , Dynamically inject malicious code, causing serious losses to people's lives and enterprises. [0003] At present, there is a lack of a complete code security protection mechanism to compile and protect the mobile app...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14G06F21/12
Inventor 刘永辉杨炎高政伟
Owner SUNINFO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products