Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

APK reinforcing method and device and APK reinforcing client and server

A technology of code and reflective calling, which is applied in the field of information security, can solve problems such as harming users, threatening the Android system, and damage to normal application developers, and achieves the effect of improving the security level

Active Publication Date: 2015-03-25
三六零数字安全科技集团有限公司
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The rapid development of the Android system and the rapid growth of devices have produced a large number of third-party applications. Compared with other operating systems, the open source of the Android system provides application developers with more functional interfaces. These functional interfaces are improving The scalability of the system also provides convenience for malicious software. Illegal copying, reverse engineering, decompilation, debugging, cracking, secondary packaging, memory interception and other means continue to threaten the security of the Android system, not only endangering users, but also Also cause serious damage to normal application developers
[0003] The existing reinforcement schemes for the Android software installation package are mainly divided into three types: the first is to completely encrypt the Java code of the method to be protected; the second is to deform the Java code of the method to be protected during runtime to prevent Directly restore the complete Java code, the existing method cannot be well customized, this solution needs to do the function of bytecode transformation; the third method is to mix the first two solutions
However, since the above solution has a complete image of the Java code in the memory within a certain period of time when the APK is running, the Java code of the protected method can be completely restored by means of a memory dump. As a result, the existing solution cannot completely solve the Android problem. The security problems faced by the installation package, people have been looking for more effective solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • APK reinforcing method and device and APK reinforcing client and server
  • APK reinforcing method and device and APK reinforcing client and server
  • APK reinforcing method and device and APK reinforcing client and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0058] figure 1 A flowchart of a method for strengthening APK according to an embodiment of the present invention is shown. Such as figure 1 As shown, the method includes:

[0059] Step S110, obtaining the Java code corresponding to at least one method in the APK to be reinforced.

[0060] Step S120, converting the Java code corresponding to at least one method into corresponding Native C code for reflective calling.

[0061] v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an APK reinforcing method and device and an APK reinforcing client and server. The method includes the steps that Java codes corresponding to at least one method in an APK to be reinforced are obtained; the Java codes corresponding to at least one method are converted into corresponding Native C codes capable of being called in a reflection mode. According to the technical scheme, the Java codes in the APK are converted into the Native C codes capable of being called in the reflection mode, java method call is converted into equivalently grammatical Native C method call, when one method is called, the Native C codes are called instead of the original Java codes; compared with the Java codes, the reverse Native C codes are higher in cost, many protection modes of the Native C codes are provided, the possibility that disassembling analysis is conducted on the APK, and the APK is repackaged and distributed again is lowered greatly, and the security level of the APK is increased.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and device for strengthening APK, and an APK strengthening client and server. Background technique [0002] The rapid development of the Android system and the rapid growth of devices have produced a large number of third-party applications. Compared with other operating systems, the open source of the Android system provides application developers with more functional interfaces. These functional interfaces are improving The scalability of the system also provides convenience for malicious software. Illegal copying, reverse engineering, decompilation, debugging, cracking, secondary packaging, memory interception and other methods continue to threaten the security of the Android system, not only endangering users, but also It also causes serious damage to normal application developers. [0003] The existing reinforcement schemes for the Android software installation ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F9/45
CPCG06F9/4484G06F21/602
Inventor 李伟
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products