Supercharge Your Innovation With Domain-Expert AI Agents!

A hidden reinforcement method for android App application resources

A technology of resources and resource files, applied in the field of Android applications, can solve problems such as illegally obtaining application codes, achieve the effects of ensuring security, increasing reverse analysis costs, and ensuring the writing of specifications

Active Publication Date: 2021-08-06
XIAN UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a hidden reinforcement method for Android App application resources, which solves the problem that reverse attackers locate source code modules through resource files and illegally obtain application codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hidden reinforcement method for android App application resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Embodiment 1, resource id encryption

[0048] Step 1. Encryption can be divided into resource id encryption and plaintext string encryption in the code.

[0049] Resource id encryption is mainly aimed at changing the process of searching for resource files through resource ids in the code. The plaintext strings in the code are mainly for strings that are directly referenced in the code without adding the string to the resource file.

[0050] Step 2. Decompile the App file and get its .smali folder.

[0051] Step 3. Use regular expressions to identify the statements in the .smali file, and replace specific codes.

[0052] 3.1) First obtain all .smali files, and then traverse each file.

[0053] 3.2) For a .smali file, read line by line, and then use regular expressions to match whether it is a resource id.

[0054] 3.3) If the match is successful, use the encryption method to generate a random key to encrypt the resource id, and use the key and the encrypted number as...

Embodiment 2

[0062] Embodiment 2, plaintext string encryption

[0063] Step 1. Encryption can be divided into resource id encryption and plaintext string encryption in the code.

[0064] Resource id encryption is mainly aimed at changing the process of searching for resource files through resource ids in the code. The plaintext strings in the code are mainly for strings that are directly referenced in the code without adding the string to the resource file.

[0065] Step 2. Decompile the App file and get its .smali folder.

[0066] Step 3. Use regular expressions to identify the statements in the .smali file, and replace specific codes.

[0067] 3.1) First obtain all .smali files, and then traverse each file.

[0068] 3.2) For a .smali file, read line by line, and then use regular expressions to match whether it is a resource id.

[0069] 3.3) Encrypt resource file id successfully, go to 3.2. If it does not match, go directly to 3.4.

[0070] 3.4) Use a regular expression to match the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hidden reinforcement method for Android App application resources. The steps include: 1) resource file reinforcement is divided into resource id encryption and plaintext string encryption; 2) decompile the App file, and obtain its .smali folder; 3) )Use regular expressions to identify the statement of the .smali file, encrypt the resource id and the plaintext string respectively and use the specific encryption code to encrypt and then decrypt it; 4) Insert the decryption code file; 5) Recompile the App file and Signature; 6) Install the App after reinforcement, and then perform normal operation. The method of the present invention can hide the resource id in the software, so that the reverse attacker cannot locate the key code through the resource id, and also prevents the string in the code from prompting the reverse engineer with effective information by encrypting the plain text string.

Description

technical field [0001] The invention belongs to the technical field of Android applications, and relates to a method for hiding and reinforcing Android App application resources. Background technique [0002] Mobile applications are becoming more and more popular, covering all aspects of people's lives, such as social networking, news, entertainment, games and so on. Today, with the rapid development of mobile applications, more and more malicious application reversers use reverse methods to crack mobile applications, and then seek personal gain by modifying or reusing application codes, which seriously damages the interests of genuine application developers and infringes users. Personal privacy caused great damage to the mobile application market. Ordinary customers do not have the ability to distinguish genuine mobile applications from pirated mobile applications, which further promotes the development and spread of malicious pirated applications. There are many current m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 孙钦东郭洪博尉惠敏
Owner XIAN UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More