Program anti-obfuscation processing method, device, equipment and storage medium

A processing method and program technology, applied in the field of information security, can solve problems such as program de-obfuscation and no solution, achieve high accuracy and reliability, assist in analyzing programs, and avoid malicious evasion of program detection.

Active Publication Date: 2021-04-23
BEIJING DIDI INFINITY TECH & DEV
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there is no effective solution for how to de-obfuscate the program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program anti-obfuscation processing method, device, equipment and storage medium
  • Program anti-obfuscation processing method, device, equipment and storage medium
  • Program anti-obfuscation processing method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. It should be understood that the appended The figures are only for the purpose of illustration and description, and are not used to limit the protection scope of the present application. Additionally, it should be understood that the schematic drawings are not drawn to scale. The flowcharts used in this application illustrate operations implemented in accordance with some embodiments of the application. It should be understood that the operations of the flowcharts may be performed out of order and that steps without logical context may be performed in reverse order or concurrently. In addition, those skilled in the art may add one or more other operations to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a program anti-obfuscation processing method, device, equipment, and storage medium, which relate to the field of information security technology. The method includes: determining multiple process chains corresponding to the target program according to preset rules. The process chain includes: entry chain, Circular chain and return chain, each process chain includes at least one basic block, the basic block includes: real block or false block; start with the distributor of the target program, traverse the target program, and determine the real block contained in each process chain ;According to the exit context of each process chain and the address of the real block in the process chain, merge multiple process chains to obtain a logical chain; invalidate the false blocks in the logical chain, and reconstruct and obtain the original program corresponding to the target program. The method realizes the reverse analysis of the program, achieves the purpose of assisting in analyzing the program, and effectively avoids malicious evasion of program detection and obtaining illegal benefits.

Description

technical field [0001] The present application relates to the technical field of information security, in particular, to a method, device, device and storage medium for program de-obfuscation processing. Background technique [0002] In recent years, with the rapid development of the mobile Internet, the offensive and defensive confrontation on the end has also intensified. In order to better protect their core programs, more and more developers choose to transfer them to the Native layer. There are also some virus Trojan horse developers, cheat software producers, etc., who try to evade detection by using APP reinforcement and obfuscation technology. In this context, the application of Ollvm is becoming more and more extensive, and there are still a large number of magically modified versions that have been developed on top of it. Control flow flattening is the most commonly used method of obfuscation. It is necessary to propose a method to counteract it and deduce the no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 蒋杰
Owner BEIJING DIDI INFINITY TECH & DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products