Android application hardening method

A method calling and being called technology, applied in the field of information security, can solve problems such as difficult for ordinary developers to use, unsatisfactory protection effect, low operation level, etc., to achieve the effect of expanding the scope of application, increasing the difficulty of reverse engineering, and improving security

Inactive Publication Date: 2021-06-29
DATA ASSURANCE & COMM SECURITY CENT CHINESE ACADEMY OF SCI
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is also because the Java code itself is very easy to be decompiled, so the protection effect of this method is not ideal
Other code protection technologies and application hardening methods at the system level are difficult to be used by ordinary developers due to their low level of operation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android application hardening method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. The embodiments of the present invention and all other embodiments obtained by persons of ordinary skill in the art without creative efforts all belong to the protection scope of the present invention.

[0016] In order to overcome the above-mentioned problems in the prior art, an embodiment of the present invention provides an Android application hardening method. The inventive idea is to hide the original method by using the principle that the Android device-side compiler dynamically assigns the sequence numbers in the link list of all global Java me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention provides an Android application hardening method, comprising: extracting information about method calls and called methods in the original source code of the Android application that need to be protected; for each called method, determining the called method Call the unrelated method corresponding to the method, and generate a new method call according to the corresponding unrelated method, replace the new method call with the method call corresponding to the called method, and generate new source code; write semantic recovery code, according to the new source code Code and semantic recovery code to generate hardened Android applications. The Android application hardening method provided by the embodiment of the present invention can reduce the operation difficulty of Android application hardening, expand the scope of application, increase the reverse difficulty, and improve security by performing code deformation and Java method redirection at the Java code level.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of information security, in particular to an Android application strengthening method. Background technique [0002] In today's society, with the popularity of mobile smart devices, smart phones are gradually replacing traditional PCs as the most important personal computing platform. As more and more people use mobile applications to carry out daily activities such as socializing, entertainment and shopping, these applications bring convenience but also bring greater security risks. Ensuring the security of smart mobile applications has become a One of the important concerns of both developers and ordinary users. [0003] As the mobile operating system with the largest market share in the world, Android has attracted a large number of attackers to create pirated and modified applications to steal the economic benefits of the original developers or implant malicious codes to infect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
Inventor 杨学轶李强单亦伟李一鸣杨明阳刘宗斌张令臣马存庆
Owner DATA ASSURANCE & COMM SECURITY CENT CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products