Novel virtual machine software protection method based on stack hiding

A software protection and virtual machine technology, applied in program/content distribution protection, software simulation/interpretation/simulation, instruments, etc., can solve problems such as plaintext instruction sequences in memory, and achieve the effect of improving operating efficiency

Active Publication Date: 2021-01-01
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing software reinforcement methods are all implemented based on dynamic loading: that is, in the process of class loading, the class instructions that need to be protected are encrypted and protected as a whole, but this method has two serious defects: 1) when running the instructions of this class , there will be a plain text instruction sequence in the memory; 2) When executing the instruction, it must be interpreted and executed by the system interpreter
Attackers can easily obtain plaintext instruction sequences from memory or system interpreter entry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel virtual machine software protection method based on stack hiding
  • Novel virtual machine software protection method based on stack hiding
  • Novel virtual machine software protection method based on stack hiding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be further described in detail and in-depth below in conjunction with the accompanying drawings.

[0045]The present invention is a software protection method based on a virtual machine, which is realized in two parts: one part is the PC end, which is mainly responsible for software reinforcement processing, that is, the original App is reinforced and processed into a safe App; the second part is the Android end, which is mainly responsible for The processing of the runtime environment is to ensure that the safe App runs normally on the Android platform.

[0046] After processing the original App, the PC end generates a data file in a custom format and packs it into the APK installation package. This file contains the instruction sequence of the protected method, and the Android end needs to obtain the protected method from this file whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a novel virtual machine software protection method based on stack hiding, and belongs to the field of mobile application reinforcement. The method comprises the steps: analyzing a DEX file into a data structure DeHelper, enabling an instruction mapping module to add an obfuscated byte code instruction to each protected function, randomly inserting a return instruction intothe obfuscated byte code instruction, and counting the frequency of the obfuscated byte codes; enabling the instruction mapping module to perform bit operation or exchange operation on byte codes andoperands in each new byte code mapping instruction to form a new remapping instruction set B; writing an unprotected function set in the data structure DeHelper and an original SO file in the APK1 into a data file S, performing repackaging to generate the APK2 and performing signing; enabling an Android end initialization module to extract DEX and SO files of a protected App from the data file S,and creating an index and a data cache of a key function; enabling an Android end virtual machine to be responsible for executing an unprotected function, and enabling a user-defined virtual machine to execute a protected function. The method has the advantages of universality, portability and safety.

Description

technical field [0001] The invention belongs to the field of mobile application reinforcement, in particular to a novel virtual machine software protection method based on stack hiding. Background technique [0002] With the development of the mobile Internet era, people are increasingly inseparable from smart mobile devices. Whether it is traditional software such as calls, text messages or entertainment, or emerging software such as payment, social networking or work, it plays an increasingly important role in people's lives. At the same time, mobile software contains a large amount of user information and software core business logic, and even private data such as user passwords. Due to the open source nature of the Android platform, if the software is not specially protected, attackers can easily obtain user information and core data. Business logic. [0003] Existing software reinforcement methods are all implemented based on dynamic loading: that is, in the process o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F9/455
CPCG06F21/12G06F9/45558G06F2009/45587
Inventor 李晖陈泽伦张文
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products