Code virtualization encryption method, terminal and storage medium

An encryption method and storage medium technology, applied in the field of code virtualization encryption method, terminal and storage medium, can solve problems such as memory DUMP

Pending Publication Date: 2020-12-08
北京智游网安科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a code virtualization encryption method, terminal and storage medium, aiming to solve the traditional Android

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code virtualization encryption method, terminal and storage medium
  • Code virtualization encryption method, terminal and storage medium
  • Code virtualization encryption method, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0032] The code virtualization encryption method described in the preferred embodiment of the present invention, such as figure 1 As shown, the code virtualization encryption method includes the following steps:

[0033] Step S10 , when virtualizing and encrypting the application, analyze the binary file of the DEX file according to the binary file structure of the DEX file, and generate an analysis result.

[0034] Specifically, when the application is virtualized and encrypted, the binary file of the DEX file is analyzed according to the binary file structure of the DEX file (the DEX ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a code virtualization encryption method, a terminal and a storage medium, and the method comprises the steps: analyzing a binary file of a DEX file according to the structure of the binary file of the DEX file during encryption, and generating an analysis result; traversing to obtain all methods in the DEX file, and obtaining binary instruction data of corresponding code segments according to an analysis result; extracting binary instructions of all methods in the DEX file, and setting a current method identifier as a native method; generating a random replacement table, and replacing an operation code and an operand of the binary instruction with an instruction which can only be recognized by a custom system virtual machine; generating a virtual machine interpreterengine library containing the native method according to the processed method list and the random replacement table; and when the virtualized and encrypted application runs to the virtualized and processed native method, enabling a system virtual machine to deliver the execution right to a custom virtual machine interpreter for execution, and return an execution result.

Description

technical field [0001] The invention relates to the technical field of code encryption, in particular to a code virtualization encryption method, a terminal and a storage medium. Background technique [0002] The traditional Android Java code encryption technology needs to decrypt the encrypted data in the memory during the running phase, so there is a memory DUMP (backup file system, dump, that is, dump the content of the memory at a certain moment into a file) risks of. [0003] Therefore, the prior art still needs to be improved and developed. Contents of the invention [0004] The main purpose of the present invention is to provide a code virtualization encryption method, terminal and storage medium, aiming to solve the traditional Android Java code encryption technology in the prior art. During the running phase, the encrypted data needs to be decrypted in the memory , so there is a risk of being memory DUMP. [0005] In order to achieve the above object, the prese...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62G06F21/53
CPCG06F21/53G06F21/602G06F21/6209G06F2221/2107
Inventor 李鹏飞冉山川
Owner 北京智游网安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products