CN104318155A - Dynamic loading method capable of guarding against reverse APK file - Google Patents
Dynamic loading method capable of guarding against reverse APK file Download PDFInfo
- Publication number
- CN104318155A CN104318155A CN201410663307.XA CN201410663307A CN104318155A CN 104318155 A CN104318155 A CN 104318155A CN 201410663307 A CN201410663307 A CN 201410663307A CN 104318155 A CN104318155 A CN 104318155A
- Authority
- CN
- China
- Prior art keywords
- file
- classes
- dex
- apk
- dex file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
The invention discloses a dynamic loading method capable of guarding against a reverse APK file. The method includes the steps that a first Classes.dex file is loaded, an Entry.so file is called, decryption processing is conducted on an Encrypt.so file through the Entry.so file, and the decrypted Encrypt.so file is obtained; decryption is conducted on a second Classes.dex file through the Entry.so file, and an original Classes.dex file in an APK file generated before the reinforcing processing is conducted is obtained; dynamic loading is conducted on the original Classes.dex file, the physical address of a source code for storing the APK file functions is found out, and the source code is dynamically loaded to a memory; The decrypted original Classes.dex file is deleted from the physical memory. By means of the dynamic loading method, decompilation of an existing Android reverse tool can be avoided, the difficulty in the decompilation is increased, and thus the safety of the APK file can be improved to a large degree.
Description
Technical field
The present invention relates to mobile terminal application safety field, particularly a kind of dynamic loading method of anti-reversing APK file.
Background technology
APK (abbreviation of Android PacKage) i.e. Android installation kit.APK file (i.e. APK application program) is directly passed in the terminal device (such as Android smartphone) of Android simulator or Android operation system and perform and can install.APK file is zip form in fact, but suffix name is modified to apk, and windows system can be checked by the direct decompress(ion) of decompression instrument (such as winrar software).After decompress(ion) APK file, general appreciable bibliographic structure is as shown in table 1 below:
Table 1
The final stage of Android application development is packing signature, and generate APK file and download and install for user, packing is packaged into APK file as shown in Figure 1.This shows, if can carry out reverse to Dex file and AndroidManifest.XML, the source code of application APK file can be restored, if add malicious code on the basis of source code, again to sign packing, the APK file of carrying malicious code can be generated.
Growing along with Android mobile terminal platform, third party application emerges in multitude, to the piracy of third-party application with to beat again bag phenomenon day by day serious.The programming language used due to Android platform software is Java, and the binary code after Java source code compiling is very easily by decompiling, causes it to crack the program of difficulty much smaller than other use compiled language compilation.In view of APK file under Android can easily by the decompiling of the decompiling such as dex2jar and JD-GUI, JAD instrument be easy to read JAVA code, thus plaintext character string, library function call, Core Feature function etc. in code is all very clear, makes illegal developer become the piracy of third party application or the reverse-engineering of Core Feature and is more prone to.
Prior art is compared, and the present invention has following beneficial effect:
Above-mentioned reinforcement means is utilized to carry out the APK file of reinforcing, current most popular Android reverse instrument dex2jar and apktool is used to carry out reverse compiling respectively, due to not source code in a reverse compiling Classes.dex file out, and the source code realizing an APK file major function still leaves former Classes.dex file in, but under being left in the file directory of specifying after this former Classes.dex file is encrypted to the 2nd Classes.dex file, reverse instrument dex2jar and apktool is utilized to be difficult to the 2nd Classes.dex file after finding deciphering, even if find the 2nd Classes.dex file, cannot be decrypted due to Encrypt ' the .so file of deciphering the 2nd Classes.dex file cannot be found, thus can effectively prevent APK file from being divulged a secret by after reverse amendment.As can be seen here, after the reinforcement means consolidation process utilizing the application to mention, achieve the enciphering hiding of the source code of APK file, the decompiling of the reverse instrument of existing Android can be evaded, thus the security of APK file can be improved dramatically.
Summary of the invention
In order to reduce APK file by reverse risk; the invention provides a kind of dynamic loading method of anti-reversing APK file; solve APK file (i.e. APK application program) to be easy to by decompiling display and the problem of easily divulging a secret; third party application can be made to reinforce, maximize the safety of protection APK application program.
The present invention adopts following technical scheme to realize: a kind of dynamic loading method of anti-reversing APK file, it comprises step: load a Classes.dex file, call Entry.so file, utilize Entry.so file to be decrypted process to Encrypt ' .so file, obtain the Encrypt.so file after deciphering;
Utilize Entry.so file to be decrypted the 2nd Classes.dex file, obtain the former Classes.dex file in the APK file before consolidation process;
Dynamic load is carried out to former Classes.dex file, and finds the physical address of the source code depositing APK file function, by source code dynamic load to internal memory;
The former Classes.dex file after deciphering is deleted from physical memory;
Wherein, only comprise in one Classes.dex file former Classes.dex file top of file structure, 2nd Classes.dex file and Encrypt ' .so file leave under file directory res, Entry.so file leaves under file directory libs, forms described anti-reversing APK file by after a Classes.dex file, AndroidManifest ' .xml file, file directory res, file directory libs and resources.ars Document encapsulation.
Wherein, the 2nd Classes.dex file is decrypted before also comprise the step of former Classes.dex file being carried out to integrity checking.
Wherein, utilize the file header field information that structure comprises of a Classes.dex file, integrity checking is carried out to the former Classes.dex file that deciphering obtains.
Wherein, carried out to former Classes.dex file specifically comprising of dynamic load: a newly-built DexClassLoader object with source program Classes.dex, be substituted into the attribute mClassLoader in the loading classes of system default by the mode of reflection.
Wherein, according to data_size field and data_off field information in former Classes.dex file file head construction, and the physical address of the source code depositing APK file function is found.
Wherein, the step of source code dynamic load to internal memory is specifically comprised:
Utilize self-defining onCreate method, by the meta-data attribute in application in AndroidManifest, find the physical address of source code, thus replace to the Application of source program;
Existing in internal memory " an Application file " to be removed from calling set, and a newly-built Application object app, the attribute of former Classes.dex file is tied to app, then app is joined internal memory call in set;
Due to assembly Provider before onCreate method just by system registry, therefore app is tied on the context of Provider in source program, then start up system level onCreate method.
Accompanying drawing explanation
Fig. 1 is the packing encapsulation schematic flow sheet of APK file.
Fig. 2 is the schematic flow sheet of the reinforcement means of APK file anti-reversing of the present invention.
Fig. 3 is the contrast schematic diagram of the document directory structure before and after APK file is reinforced.
Fig. 4 is the schematic flow sheet that after reinforcing, APK file realizes dynamic load.
Embodiment
For the ease of understanding the technical scheme of the application, applicant is first first further described in detail classes.dex file in APK file bibliographic structure:
Classes.dex file is the java byte code files generated after the compiling of java source code.But the dalvik virtual machine used due to Android and the java virtual machine of standard are incompatible, dex file compared with class file, no matter be that file structure or opcode are different.Classes.dex file is made up of file header, index area and data field three parts.Wherein, classes.dex top of file separation structure is defined as follows shown in table 2.
Field name | Explanation |
checksum | Check code |
signature | SHA-1 signs |
file_size | The total length of Dex file |
data_size | The size of data segment, must with 4 byte-aligned |
data_off | Data segment base address |
Table 2
In Android source code, under the realization of Dalvik virtual machine is positioned at dalvik/ catalogue, wherein dalvik/vm be virtual machine realize part, will libdvm.so be compiled into; And dalvik/libdex will be compiled into libdex.a static library as dex instrument; Dalvik/dexdump is the decompiling instrument of .dex file; The executable program of virtual machine is arranged in dalvik/dalvikvm, will be compiled into dalvikvm executable file.
When Android platform runs APK file, first by Dalvik virtual machine (in Android source code, under the realization of Dalvik virtual machine is positioned at dalvik/ catalogue) load decompress(ion) APK file and verify integrality, extract Classes.dex file, then perform the bytecode in classes.dex file.When performing classes.dex file, first Dalvik virtual machine can check checksum field and the siganature field of its file header part, guarantee that classes.dex file does not have damaged or distorts, then just carry out addressing according to the offset address of other structures defined in file header and length information and resolve and perform.Last dalvik virtual machine can from classes.dex file reading command and data, and then run the programmed logic of this APK file.
Shown in composition graphs 2, a preferred embodiment of the present invention comprises following performing step:
Step S11, by a for APK file Central Plains to be reinforced Classes.dex file copy, delete the function source code of APK file in the Classes.dex file copying gained after, preserve and obtain a Classes.dex file.Therefore, only remain the top of file structure of former Classes.dex file in a Classes.dex file, do not comprise the function code of APK file.
Step S12, the former Classes.dex file encryption-decryption algorithm preset to be encrypted, to obtain the 2nd Classes.dex file.Therefore, the main function code of APK file is still among the 2nd Classes.dex file, and hiding, protection the 2nd Classes.dex file is the relation of reinforcing APK file, is also prevent APK file by reverse important step.
Step S13, generating Encrypt.so file for deciphering the 2nd Classes.dex file, superencipher being carried out to this Encrypt.so file, obtains Encrypt ' .so file.
Step S14, generate Entry.so file, this Entry.so file is the entry file when APK file is run, and is Encrypt.so file by the native method in the file Entry.so of call entry by Encrypt ' .so file decryption.
Step S15, the source program entrance of APK file Central Plains AndroidManifest.xml file to be reinforced to be pointed to, by sensing former Classes.dex file amendment be sensing the one Classes.dex file, amendment process after file be designated as AndroidManifest ' .xml file.
Step S16, the 2nd Classes.dex file and Encrypt ' .so file are left under file directory res, Entry.so file is left under file directory libs, the rear package file of packing encapsulation is carried out with a Classes.dex file, AndroidManifest ' .xml file, file directory res, file directory libs and resources.ars file, the signature instrument that re-using provides in Android SDK is signed to package file, namely completes the consolidation process of APK file.Specifically, the document directory structure contrast schematic diagram of the APK file of front and back is reinforced as shown in Figure 3.
When APK file after reinforcing is run, shown in composition graphs 4, load operating process comprises the steps:
Step S21, to point to according to the source program entrance in AndroidManifest ' .xml file, when APK file after reinforcing is run, first load a Classes.dex file by Dalvik virtual machine.
Step S22, call Entry.so file by a Classes.dex file, utilize Entry.so file to be decrypted process to Encrypt ' the .so file left under file directory res, obtain the Encrypt.so file after deciphering.
Step S23, Entry.so file is utilized to be decrypted the 2nd Classes.dex file left under file directory res according to the encryption-decryption algorithm preset, thus the former Classes.dex file before obtaining consolidation process in APK file.
Step S24, utilize the file header field information that structure comprises of a Classes.dex file, integrity checking is carried out, by entering step S26 after integrity checking to the former Classes.dex file that deciphering obtains.
Step S25, according to Android dynamic load technology (DexClassLoader program), dynamic load is carried out to former Classes.dex file by Dalvik virtual machine.Detailed process is, a newly-built DexClassLoader object with source program Classes.dex, is substituted into the attribute mClassLoader in the loading classes of system default by the mode of reflection.
Step S26, according to data_size field and data_off field information in former Classes.dex file file head construction, find the physical address of the source code depositing APK file function, by source code dynamic load to internal memory.Specifically, utilize self-defining onCreate method, by the meta-data attribute in application in AndroidManifest, find the physical address of source code, thus replace to the Application of source program; Existing " an Application file " is removed from system call set, and a newly-built Application object app, the attribute of former Classes.dex file is tied to app, then app is joined in system call set; Finally, due to assembly Provider before onCreate method just by system registry, therefore app is tied on the context of Provider in source program, then start up system level onCreate method.
Step S27, delete the former Classes.dex file after deciphering from the physical memory of system, prevent victim from stealing.
Above-mentioned reinforcement means is utilized to carry out the APK file of reinforcing, current most popular Android reverse instrument dex2jar and apktool is used to carry out reverse compiling respectively, due to not source code in a reverse compiling Classes.dex file out, and the source code realizing an APK file major function still leaves former Classes.dex file in, but under being left in the file directory of specifying after this former Classes.dex file is encrypted to the 2nd Classes.dex file, reverse instrument dex2jar and apktool is utilized to be difficult to the 2nd Classes.dex file after finding deciphering, even if find the 2nd Classes.dex file, cannot be decrypted due to Encrypt ' the .so file of deciphering the 2nd Classes.dex file cannot be found, thus can effectively prevent APK file from being divulged a secret by after reverse amendment.As can be seen here, after the reinforcement means consolidation process utilizing the application to mention, achieve the enciphering hiding of the source code of APK file, the decompiling of the reverse instrument of existing Android can be evaded, thus the security of APK file can be improved dramatically.
The present invention can be used in numerous general or special purpose computing system environment or configuration.Such as: personal computer, server, handheld device or portable set, laptop device, multicomputer system, system, the digital television receiving apparatus of Android system, programmable consumer-elcetronics devices, network PC, small-size computer, mainframe computer, the distributed computing environment comprising above any system or equipment etc. based on microprocessor.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.
Claims (6)
1. a dynamic loading method for anti-reversing APK file, is characterized in that, comprises step:
Load a Classes.dex file, call Entry.so file, utilize Entry.so file to be decrypted process to Encrypt ' .so file, obtain the Encrypt.so file after deciphering;
Utilize Entry.so file to be decrypted the 2nd Classes.dex file, obtain the former Classes.dex file in the APK file before consolidation process;
Dynamic load is carried out to former Classes.dex file, and finds the physical address of the source code depositing APK file function, by source code dynamic load to internal memory;
The former Classes.dex file after deciphering is deleted from physical memory;
Wherein, only comprise in one Classes.dex file former Classes.dex file top of file structure, 2nd Classes.dex file and Encrypt ' .so file leave under file directory res, Entry.so file leaves under file directory libs, forms described anti-reversing APK file by after a Classes.dex file, AndroidManifest ' .xml file, file directory res, file directory libs and resources.ars Document encapsulation.
2. the dynamic loading method of a kind of anti-reversing APK file according to claim 1, is characterized in that, also comprise the step of former Classes.dex file being carried out to integrity checking before being decrypted to the 2nd Classes.dex file.
3. the dynamic loading method of a kind of anti-reversing APK file according to claim 2, is characterized in that, utilize the file header field information that structure comprises of a Classes.dex file, carries out integrity checking to the former Classes.dex file that deciphering obtains.
4. the dynamic loading method of a kind of anti-reversing APK file according to claim 1, it is characterized in that, carried out to former Classes.dex file: a newly-built DexClassLoader object with source program Classes.dex specifically comprising of dynamic load, be substituted into the attribute mClassLoader in the loading classes of system default by the mode of reflection.
5. the dynamic loading method of a kind of anti-reversing APK file according to claim 1, it is characterized in that, according to data_size field and data_off field information in former Classes.dex file file head construction, and find the physical address of the source code depositing APK file function.
6. the dynamic loading method of a kind of anti-reversing APK file according to claim 1, is characterized in that, the step of source code dynamic load to internal memory specifically comprised:
Utilize self-defining onCreate method, by the meta-data attribute in application in AndroidManifest, find the physical address of source code, thus replace to the Application of source program;
Existing in internal memory " an Application file " to be removed from calling set, and a newly-built Application object app, the attribute of former Classes.dex file is tied to app, then app is joined internal memory call in set;
Due to assembly Provider before onCreate method just by system registry, therefore app is tied on the context of Provider in source program, then start up system level onCreate method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410663307.XA CN104318155A (en) | 2014-11-18 | 2014-11-18 | Dynamic loading method capable of guarding against reverse APK file |
PCT/CN2014/092643 WO2016078130A1 (en) | 2014-11-18 | 2014-12-01 | Dynamic loading method for preventing reverse of apk file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410663307.XA CN104318155A (en) | 2014-11-18 | 2014-11-18 | Dynamic loading method capable of guarding against reverse APK file |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104318155A true CN104318155A (en) | 2015-01-28 |
Family
ID=52373386
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410663307.XA Pending CN104318155A (en) | 2014-11-18 | 2014-11-18 | Dynamic loading method capable of guarding against reverse APK file |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104318155A (en) |
WO (1) | WO2016078130A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105740708A (en) * | 2016-01-28 | 2016-07-06 | 博雅网信(北京)科技有限公司 | Java reflection mechanism-based automatic Android application shelling method |
CN106528255A (en) * | 2016-12-19 | 2017-03-22 | 北京小米移动软件有限公司 | Class loading method and device |
CN106843919A (en) * | 2016-12-12 | 2017-06-13 | 北京奇虎科技有限公司 | The storage method and device of a kind of dex files |
CN106845166A (en) * | 2016-12-12 | 2017-06-13 | 北京奇虎科技有限公司 | The storage method and device of a kind of dex files |
CN106897587A (en) * | 2017-02-27 | 2017-06-27 | 百度在线网络技术(北京)有限公司 | The method and apparatus of reinforcement application, loading reinforcement application |
CN107169324A (en) * | 2017-05-12 | 2017-09-15 | 北京理工大学 | A kind of Android application reinforcement means based on dynamic encryption and decryption |
CN109033765A (en) * | 2018-08-07 | 2018-12-18 | 麒麟合盛网络技术股份有限公司 | The treating method and apparatus of application installation package |
CN110610097A (en) * | 2019-09-09 | 2019-12-24 | 杭州天宽科技有限公司 | File transmission security system based on android application |
CN113094665A (en) * | 2021-04-09 | 2021-07-09 | 每日互动股份有限公司 | System for preventing java program from being decompiled |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107122634B (en) * | 2017-04-26 | 2020-03-17 | 北京梆梆安全科技有限公司 | Reinforcement protection method and device for software installation package |
CN107122632A (en) * | 2017-04-26 | 2017-09-01 | 北京洋浦伟业科技发展有限公司 | The encryption method and device of software installation bag |
CN107122635A (en) * | 2017-04-27 | 2017-09-01 | 北京洋浦伟业科技发展有限公司 | A kind of reinforcement means of the reinforcement means of SO files, device and APK |
CN109933325A (en) * | 2017-12-15 | 2019-06-25 | 阿里巴巴集团控股有限公司 | A kind of dex file construction method, apparatus and system |
CN111488557B (en) * | 2019-01-28 | 2024-01-12 | 中国移动通信有限公司研究院 | Encryption and decryption method and device, electronic equipment and readable storage medium |
CN112083970A (en) * | 2020-09-10 | 2020-12-15 | 南京烽火星空通信发展有限公司 | Mobile terminal digital evidence obtaining method and equipment based on dynamic loading technology |
CN112667975B (en) * | 2020-12-29 | 2024-04-26 | 西北工业大学 | Application software safety protection method based on hybrid reinforcement Android system |
CN112765608B (en) * | 2021-01-20 | 2023-05-12 | 每日互动股份有限公司 | Target apk source code acquisition method, electronic equipment and medium |
CN113641426A (en) * | 2021-08-31 | 2021-11-12 | 福建省天奕网络科技有限公司 | Shelling search and implementation method and system based on source code modification of android terminal |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102087605B (en) * | 2011-01-28 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Android-based platform application installation control method and system |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
CN102760219B (en) * | 2011-12-20 | 2015-12-16 | 北京安天电子设备有限公司 | A kind of Android platform software protection system, method and apparatus |
KR101383010B1 (en) * | 2012-09-04 | 2014-04-07 | 주식회사 인프라웨어테크놀러지 | Method of obtaining signature of apk files for android operating system, and computer-readable recording medium for the same |
CN103761457A (en) * | 2013-12-27 | 2014-04-30 | 华为技术有限公司 | Software protecting method, device and system |
-
2014
- 2014-11-18 CN CN201410663307.XA patent/CN104318155A/en active Pending
- 2014-12-01 WO PCT/CN2014/092643 patent/WO2016078130A1/en active Application Filing
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105740708A (en) * | 2016-01-28 | 2016-07-06 | 博雅网信(北京)科技有限公司 | Java reflection mechanism-based automatic Android application shelling method |
CN106843919A (en) * | 2016-12-12 | 2017-06-13 | 北京奇虎科技有限公司 | The storage method and device of a kind of dex files |
CN106845166A (en) * | 2016-12-12 | 2017-06-13 | 北京奇虎科技有限公司 | The storage method and device of a kind of dex files |
CN106843919B (en) * | 2016-12-12 | 2021-02-23 | 北京奇虎科技有限公司 | Method and device for storing dex file |
CN106528255A (en) * | 2016-12-19 | 2017-03-22 | 北京小米移动软件有限公司 | Class loading method and device |
CN106528255B (en) * | 2016-12-19 | 2019-07-12 | 北京小米移动软件有限公司 | Kind loading method and device |
CN106897587A (en) * | 2017-02-27 | 2017-06-27 | 百度在线网络技术(北京)有限公司 | The method and apparatus of reinforcement application, loading reinforcement application |
CN107169324A (en) * | 2017-05-12 | 2017-09-15 | 北京理工大学 | A kind of Android application reinforcement means based on dynamic encryption and decryption |
CN109033765A (en) * | 2018-08-07 | 2018-12-18 | 麒麟合盛网络技术股份有限公司 | The treating method and apparatus of application installation package |
CN110610097A (en) * | 2019-09-09 | 2019-12-24 | 杭州天宽科技有限公司 | File transmission security system based on android application |
CN113094665A (en) * | 2021-04-09 | 2021-07-09 | 每日互动股份有限公司 | System for preventing java program from being decompiled |
Also Published As
Publication number | Publication date |
---|---|
WO2016078130A1 (en) | 2016-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104318155A (en) | Dynamic loading method capable of guarding against reverse APK file | |
CN104408337A (en) | Reinforcement method for preventing reverse of APK (Android package) file | |
KR101471589B1 (en) | Method for Providing Security for Common Intermediate Language Program | |
CN104317625A (en) | Dynamic loading method for APK files | |
US10509734B2 (en) | Cryptographic pointer address encoding | |
CN106203006A (en) | Android application reinforcement means based on dex Yu so file Dynamic Execution | |
KR101695639B1 (en) | Method and system for providing application security service based on cloud | |
CN104239757A (en) | Application program reversing-preventing method and device and operation method and terminal | |
CN103902858A (en) | APK application reinforcing method and system | |
CN104866739A (en) | Application program encryption method and application program encryption system in Android system | |
CN107609394A (en) | Tamper resistant method, storage device and the device of Android installation kits | |
Kim et al. | Android Application Protection against Static Reverse Engineering based on Multidexing. | |
US9292708B2 (en) | Protection of interpreted source code in virtual appliances | |
US10867017B2 (en) | Apparatus and method of providing security and apparatus and method of executing security for common intermediate language | |
CN104462883A (en) | APK file strengthening method | |
KR101749209B1 (en) | Method and apparatus for hiding information of application, and method and apparatus for executing application | |
KR101863325B1 (en) | Method and apparatus for preventing reverse engineering | |
WO2015058639A1 (en) | Application program protecting system and method | |
CN116235174A (en) | Apparatus and method for performing encryption algorithm | |
KR101667774B1 (en) | Apparatus and Method of Providing Security for Script Program | |
CN109992974A (en) | Guard method, equipment and the readable storage medium storing program for executing of Virtual Machine bytecodes file | |
KR102039380B1 (en) | Apparatus and Method of Providing Security, and Apparatus and Method of Executing Security for Protecting Code of Shared Object | |
JP6215468B2 (en) | Program protector | |
CN111338664A (en) | Image file packaging method and image file packaging system | |
CN104021321A (en) | Reinforcing protection method and device for software installation package |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150128 |
|
WD01 | Invention patent application deemed withdrawn after publication |