Method of selecting software files

A file and selected technology, applied in software engineering design, software maintenance/management, program code conversion, etc., can solve the problems of security-sensitive code hiding security-sensitive information, security-sensitive code confusion, etc.

Pending Publication Date: 2020-05-26
ESHARD
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Indeed, security-sensitive code sections of an application may need to be obfuscated more than non-sensitive code sections
Also, obfuscation of security-sensitive code sections may be aimed at hiding security-sensitive information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of selecting software files
  • Method of selecting software files
  • Method of selecting software files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] As used hereinafter, unless expressly stated otherwise, the following terms have the following meanings. The term "metric" refers to a value representing the degree to which the inspected code satisfies some evaluation criteria.

[0047] The term "obfuscation" refers to the transformation of program code in order to hide the original intent of the code, for example by adding complexity. Obfuscation can be measured by computing a suitable metric for the code being obfuscated.

[0048] figure 1 A computer system 1 designed for analyzing software applications according to an embodiment is shown. The system 1 is configured to determine the degree of obfuscation of the software parts of the application and thus select and / or identify files with an insufficient degree of obfuscation with respect to the security sensitivity of the operation implemented by the respective software part. System 1 includes a preprocessing module PPRC, an obfuscation analysis module OAM and a me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method of selecting program files of an executable software application, comprising: extracting program text files (CF) from an executable application file (APF); for each program text file, computing at least one syntactical metrics or program complexity metrics (QT1-QTn), and computing a score (FMT) based on the computed metrics; and generating a list (SFL) of programtext files selected as a function of comparisons of the computed scores with threshold values.

Description

technical field [0001] The present invention relates to software programs and / or applications, and to protection of the application from reverse engineering and protection of data manipulated or included in the application. Background technique [0002] Reverse engineering of an application involves the analysis of the application in order to gather information about its operation and the data it manipulates. The purpose of reverse engineering is to summarize, to reconstruct an application's original source code from its distributed binary form. [0003] At the same time, the number of software applications that can be downloaded to mobile devices from public "app stores" or "marketplaces" has proliferated in recent years. Applications such as Android (Android) applications are called Android TM Package Kit (APK) file, which includes the code and data that the application will need to install and operate correctly in connection with the Android operating system. [0004]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14
CPCG06F21/14G06F8/436G06F8/4452G06F8/51G06F8/75G06F8/76
Inventor G·加戈纳罗特T·拉扎芬德拉郎博
Owner ESHARD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products