Code obfuscation method and device, equipment and storage medium

A code obfuscation and configuration file technology, applied in the computer field, can solve the problems of code name conflict, meaninglessness, code name conflict, etc.

Active Publication Date: 2020-05-12
广州方硅信息技术有限公司
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, since code obfuscation will produce many short but meaningless code names, in the case of independent code obfuscation for each library module released separately, it often occurs that the code names obfuscated i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code obfuscation method and device, equipment and storage medium
  • Code obfuscation method and device, equipment and storage medium
  • Code obfuscation method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0062] In the Android system, the application module (English: Application Module) and multiple library modules (English: Library Module) can be jointly constructed by using the Gradle language to obtain an application program, wherein the library module can be used by other library modules or application modules. module to implement the functionality of the library module.

[0063] In the process of building an application, the application module and each library module can be compiled separately to obtain multiple bytecode files (class files), and then the compiled The obtained multiple bytecode files are merged into a complete bytecode package (dex file).

[0064] After the application program is built, the bytecode package c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a code obfuscation method and device, equipment and a storage medium, and belongs to the technical field of computers. The method comprises the steps of obtaining a to-be-published publishing library module set, wherein the publishing library module set comprises at least one publishing library module; obtaining a dependency library module on which each release library module depends to obtain a dependency library module set; and according to the dependency relationship between the release library module set and the library modules in the dependency library module set,performing code obfuscation on the release library module set and the library modules in the dependency library module set to obtain an obfuscated library module set. According to the technical schemeprovided by the embodiment of the invention, normal use of the library module can be ensured.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a code obfuscation method, device, equipment and storage medium. Background technique [0002] In the Android system, an application program can usually be constructed by an application module and multiple library modules, wherein the application module can call the library module to realize the functions of the library module. In many cases, it is necessary to release a library module of an application program separately, so that a third-party application program can call the library module released separately. In the case of releasing the library module separately, it is necessary to obfuscate the code of the library module released separately, so as to prevent malicious users from decompiling the library module released separately. Among them, code obfuscation refers to a technique for converting computer program code (abbreviated as code herein) into a functional...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 张宇
Owner 广州方硅信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products