Method and system for protecting software source codes based on Linux kernel calling

A software source and file system technology, applied in digital data protection, platform integrity maintenance, instruments, etc., can solve problems such as leakage, unpacking APK file leakage, core code logic leakage, etc., and achieve high security performance

Pending Publication Date: 2020-12-15
南京烽火星空通信发展有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. APK cracking: Since APK is an Android application layer software, it is mostly developed in Java language, and it is easy to be decompiled into readable bytecode, resulting in the leakage of core code logic
[0005] 2. SO reverse analysis: Even if the core code and library files are implemented in C / C++, they will still be packaged in the APK file or installed in a specific directory of the Android system, and it is easy to be unpacked from the APK file or from a specific directory of the system. After the copy is leaked, it is reverse-analyzed, resulting in a leak
[0006] 3. System security: the security issues of the Android system itself, such as obtaining system Root (a term for the Android system, which enables users to obtain super user privileges of the Android operating system, resulting in arbitrary access to system files) permissions or installing the Dexposed framework (A HOOK framework that can perform HOOK debugging on applications without Root) to track and debug applications, resulting in core code logic leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting software source codes based on Linux kernel calling
  • Method and system for protecting software source codes based on Linux kernel calling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0025] Please refer to Figure 1-Figure 2 , the protection method that realizes software source code based on Linux kernel calling comprises the following steps:

[0026] S1: Add a system call interface in the Linux kernel to provide resource protection that the Android application layer program can directly call to implement the process, such as: SYSCALL_DEFINE3(unshare_test, const char__user*, filename, char__user*, mount_point, char__user*, password), the System calls implement the following functions:

[0027] Obtain the file system mount point passed by the application layer, the AES encrypted file path, and the system call to verify the random password through copy_from_user();

[0028] Enable process isolation by calling the unshare kernel interface to realize the isolation of process space and its file system space;

[0029] Create a process ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for protecting software source codes based on Linux kernel calling. The method for protecting the software source code based on Linux kernel calling comprises the following steps that S1, adding a system calling number into a Linux kernel, and providing a system calling interface for application layer software; S2, when application layer software is started, creating a process private file system in a kernel space through a Namespace-related API (Application Program Interface) by calling a SysCall-like system; and S3, loading the program file encrypted by AES in the private file system, wherein only the current process is visible, and other processes cannot access the file in the private file system even if the other processes have Root permission. The method and system for protecting the software source code based on Linux kernel calling have the advantages of being safe and reliable.

Description

technical field [0001] The invention relates to the technical field of software security protection running in a mobile intelligent terminal system, in particular to a method and system for protecting software source codes based on Linux kernel calls. Background technique [0002] With the development of the mobile Internet, software developed based on the Android system has been widely used. According to the latest forecast report on the smartphone market in 2019 released by market research firm IDC, the market share of smartphones running the Android operating system has reached 87%. [0003] The Android system architecture can be divided into Application layer, Framework layer, local framework and runtime environment, Linux operating system and driver layer from the upper layer to the lower layer. Due to the openness of the source code of the Android system, and most of the software developed at the Application layer uses the Java language, it is easy to be reverse cracke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52G06F21/60
CPCG06F21/52G06F21/602
Inventor 童瀛周宇姚焕章梁剑王飞郑钧汤国强朱捷穆宁
Owner 南京烽火星空通信发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products