Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method for hiding and reinforcing Android App application resources

A technology of resources and resource files, applied in the field of Android applications, can solve problems such as illegally obtaining application codes, achieve the effects of ensuring security, increasing reverse analysis costs, and ensuring the writing of specifications

Active Publication Date: 2019-11-15
XIAN UNIV OF TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a hidden reinforcement method for Android App application resources, which solves the problem that reverse attackers locate source code modules through resource files and illegally obtain application codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for hiding and reinforcing Android App application resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Embodiment 1, resource id encryption

[0048] Step 1. Encryption can be divided into resource id encryption and plaintext string encryption in the code.

[0049] Resource id encryption is mainly aimed at changing the process of searching for resource files through resource ids in the code. The plaintext strings in the code are mainly for strings that are directly referenced in the code without adding the string to the resource file.

[0050] Step 2. Decompile the App file and get its .smali folder.

[0051] Step 3. Use regular expressions to identify the statements in the .smali file, and replace specific codes.

[0052] 3.1) First obtain all .smali files, and then traverse each file.

[0053] 3.2) For a .smali file, read line by line, and then use regular expressions to match whether it is a resource id.

[0054] 3.3) If the match is successful, use the encryption method to generate a random key to encrypt the resource id, and use the key and the encrypted number as...

Embodiment 2

[0062] Embodiment 2, plaintext string encryption

[0063] Step 1. Encryption can be divided into resource id encryption and plaintext string encryption in the code.

[0064] Resource id encryption is mainly aimed at changing the process of searching for resource files through resource ids in the code. The plaintext strings in the code are mainly for strings that are directly referenced in the code without adding the string to the resource file.

[0065] Step 2. Decompile the App file and get its .smali folder.

[0066] Step 3. Use regular expressions to identify the statements in the .smali file, and replace specific codes.

[0067] 3.1) First obtain all .smali files, and then traverse each file.

[0068] 3.2) For a .smali file, read line by line, and then use regular expressions to match whether it is a resource id.

[0069] 3.3) Encrypt resource file id successfully, go to 3.2. If it does not match, go directly to 3.4.

[0070] 3.4) Use a regular expression to match the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for hiding and reinforcing Android App application resources. The method comprises the following steps: 1) dividing resource file reinforcement into resource id encryption and plaintext character string encryption; 2) decompiling an App file to obtain a. Smali folder of the App file; 3) discriminating statements of the. Smali file by using a regular expression, respectively encrypting the resource id and the plaintext character string, encrypting the encrypted resource id and plaintext character string by using specific encryption codes, and decrypting the encrypted resource id and plaintext character string; 4) inserting a decryption code file; 5) recompiling the App file and signing; and 6) installing the reinforced App, and then performing normal operation.The resource id in the software can be hidden, so that a reverse attacker cannot locate a key code through the resource id, and the character string in the code is prevented from prompting a reverse person of an effective message by encrypting a plaintext character string.

Description

technical field [0001] The invention belongs to the technical field of Android applications, and relates to a method for hiding and reinforcing Android App application resources. Background technique [0002] Mobile applications are becoming more and more popular, covering all aspects of people's lives, such as social networking, news, entertainment, games and so on. Today, with the rapid development of mobile applications, more and more malicious application reversers use reverse methods to crack mobile applications, and then seek personal gain by modifying or reusing application codes, which seriously damages the interests of genuine application developers and infringes users. Personal privacy caused great damage to the mobile application market. Ordinary customers do not have the ability to distinguish genuine mobile applications from pirated mobile applications, which further promotes the development and spread of malicious pirated applications. There are many current m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 孙钦东郭洪博尉惠敏
Owner XIAN UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More