Code obfuscation method and system, computer device and computer readable storage medium

A code obfuscation, computer program technology, applied in the field of software development, can solve problems such as reducing development efficiency and quality, misconfiguration, etc., to achieve the effect of reducing the probability of manual configuration omission or configuration error

Pending Publication Date: 2019-05-21
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, obfuscated scripts are generally manually configured by developers. It is easy to discover defects after th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code obfuscation method and system, computer device and computer readable storage medium
  • Code obfuscation method and system, computer device and computer readable storage medium
  • Code obfuscation method and system, computer device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] figure 1 It is a flow chart of the steps of a preferred embodiment of the code obfuscation method of the present invention. According to different requirements, the order of the steps in the flowchart can be changed, and some steps can be omitted.

[0045] refer to figure 1 As shown, the code obfuscation method specifically includes the following steps.

[0046] Step S11, scan the code text according to the preset code obfuscation rules to generate the script to be obfuscated, wherein the preset code obfuscation rules include one or more of the following: variable keywords, function name keywords, class name keywords , redundant content keywords.

[0047] In one embodiment, before the obfuscation operation, a code obfuscation rule can be pre-defined and established, and the code obfuscation rule can include multiple variable keywords, multiple function name keywords, multiple class name keywords, multiple redundant content keywords, etc. After the code obfuscation ...

Embodiment 2

[0072] figure 2 It is a functional block diagram of a preferred embodiment of the code obfuscation system of the present invention.

[0073] refer to figure 2 As shown, the code obfuscation system 10 may include a scanning module 101 , an obfuscation module 102 , an evaluation module 103 , a judgment module 104 , an output module 105 and an adjustment module 106 .

[0074] The scanning module 101 is used to scan the code text according to the preset code obfuscation rules to generate the script to be obfuscated, wherein the preset code obfuscation rules include one or more of the following: variable keywords, function name keywords, Class name keywords, redundant content keywords.

[0075] In one embodiment, before the obfuscation operation, a code obfuscation rule can be predefined and established, and the code obfuscation rule can include multiple variable keywords, multiple function name keywords, multiple class name keywords, multiple redundant content keywords, etc. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a code obfuscation method and system, a computer device and a computer readable storage medium. The code obfuscation method comprises; scanning a code text according to a presetcode obfuscation rule to generate a script to be obfuscated, wherein the preset code obfuscation rule comprises one or more of variable keywords, function name keywords, class name keywords and redundant content keywords; Configuring a code obfuscation strategy, and performing obfuscation processing on the to-be-obfuscated script according to the code obfuscation strategy; Evaluating the scriptssubjected to the confusion processing to obtain confusion evaluation index values; Judging whether the confusion evaluation index value is not smaller than a preset confusion index value or not; And when the confusion evaluation index value is not smaller than the preset confusion index value, outputting the confused script. According to the method, the confusion scripts can be automatically configured, the probability of manual configuration omission or configuration errors can be reduced, code development assistance can be provided for code developers, and the software development efficiencyis improved.

Description

technical field [0001] The invention relates to the field of software development, in particular to a code obfuscation method, system, computer device and computer-readable storage medium. Background technique [0002] In the software (for example: APP) development process, in order to facilitate development and maintenance, the names of classes, variables, and functions in code compilation are usually set to have certain readability. At the same time, in order to protect the development code of software applications, it is necessary to Code obfuscation processing is performed using the code files compiled by the development code to increase the difficulty of decompiling the installation files of the software application and realize the protection of the development code. At present, obfuscated scripts are generally manually configured by developers. Due to the negligence of developers or wrong configurations, defects are discovered after the APP is released, which reduces d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14
Inventor 成明
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products