A method for SWF obfuscation encryption

An encryption method and file technology, which is applied in technical security-related fields, can solve problems such as core technology and business logic theft, and achieve the effect of protecting technical privacy

Inactive Publication Date: 2019-05-10
HANGZHOU ARCVIDEO TECHNOLOGY CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are so many decompilation tools today that the co...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for SWF obfuscation encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0021] A method for confusing and encrypting SWF, specifically comprising the following steps:

[0022] (1) Determine the source code of the core AS3.0 project file to be protected; this project file is generally a business logic code written by technicians.

[0023] (2) Write a general obfuscation class to confuse the contents of the files in the source package; the obfuscation rules are as follows: first scan the package where the source code to be obfuscated is located, the package name, package path, variable name, method name, and callback function method in the source code Replace it with other meaningless symbols to make the code less readable and increase the difficulty of technology theft; keywords, native classes, and external dependent packages in the source code cannot be replaced. If the native class is replaced, compilation will f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for SWF confusion encryption. The method specifically comprises the following steps: (1) determining a to-be-protected core AS3.0 engineering file source code; (2) compiling a universal confusion class, and confusing the contents of the files in the source packet; (3) compiling the mixed source code into a source SWF file through a Felx SDK; (4) comiling an encryption tool, enabling the encryption tool adopt an encryption method compiled by a C language, and after an SWF file is read according to byte streams, conducting AES encryption on the SWF file; (5) compiling an application for loading the SWF for loading the SWF file generated in the last step; and (6) compiling and publishing the application in the step (5) into a formal SWF file, and externally providing the formal SWF file for a client to use. The method has the beneficial effects that the personal technology is protected from being stolen by a hacker for reuse, byte stream encryption is carried out on the SWF file generated by compiling, and the effects of double encryption and technical privacy protection are achieved.

Description

technical field [0001] The invention relates to the technical field related to technical security, in particular to a method for SWF obfuscation and encryption. Background technique [0002] SWF (shock wave flash) file is the most common Flash-specific format at present, and it is packaged and compiled by the ActionScript3.0 (hereinafter referred to as AS3.0) programming language. After its compilation is completed, a string mapping table will be formed inside the SWF, including all strings (class names, package names, member variable names, constants, etc.) that appear in the source code. An address pointer corresponds to a globally unique string, and the strings contained in the original code fragment will be replaced with the corresponding address pointer. The actual execution of the code uses these digital pointers. So even if you modify the string content in the mapping table, it usually has no effect on the code execution process. And decompilation is to take out th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14
Inventor 刘国强李妃军
Owner HANGZHOU ARCVIDEO TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products