Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Android application completeness verification method based on register architecture

A technology of integrity verification and register, which is applied in the field of network security, can solve the problems of obtaining application code, code dynamic self-inspection and anti-tampering technology limitations, and the protection method cannot use Android applications, so as to avoid code errors and flexibility code errors Effect

Inactive Publication Date: 2015-05-06
INST OF INFORMATION ENG CAS
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

They need to detect repackaged applications or based on enough application samples to play a detection role, and cannot detect code tampering behaviors in time, and deal with code tampering behaviors during application execution
At the same time, due to the unique runtime environment characteristics of Android, some real-time dynamic anti-tampering solutions cannot be applied to the Android platform.
On the one hand, Android applications are mainly developed by Java, and when they are executed in the Dalvik virtual machine, the application code cannot be directly obtained in the memory, which greatly restricts some code dynamic self-test anti-tampering technologies
On the other hand, the register-based structure of the Dalvik virtual machine and its unique instruction characteristics make some protection methods based on the Java stack structure unable to be used in Android applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android application completeness verification method based on register architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described below through specific examples and accompanying drawings.

[0028] Such as figure 1 Shown, the Android application integrity verification method of the present invention, its step comprises:

[0029] 1. Application code conversion

[0030] The method of the present invention is based on the Dalvik virtual instruction in the Smali format, and first converts the Dex bytecode into the Dalvik virtual machine instruction. Specifically, this embodiment borrows the smali / baksmali tool to decompile the application program.

[0031] 2. Application analysis

[0032] After the conversion of the application instructions is completed, the birthmark analysis process is performed on the code segment that needs to be protected, and the instruction code status that can be used for birthmark extraction is obtained. The birthmark analysis process first analyzes the application code execution process, obtains the class object hierarchy d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an Android application completeness verification method based on a register architecture. The method comprises the following steps: converting an Android application program code to be a Dalvik virtual instruction code; carrying out the birthmark analysis for a code segment to be protected to obtain an instruction code state capable of being used for extracting a birthmark and register state information, and generating a corresponding birthmark extraction code; implanting the birthmark extraction code into a Smali format virtual instruction code by virtue of a code inserting process, re-editing the Smali format virtual instruction code to generate a novel application; pre-calculating birthmark information by dynamically executing the application, and carrying out the completeness verification for the application by utilizing the birthmark information in the use process of the application. By extracting the birthmark information in the application execution process, whether the operation process of the application code segment is abnormal or not can be initiatively verified, so that the verification of the core code segment and the execution process can be realized.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to an Android application code integrity verification method based on a Dalvik virtual machine register architecture. Background technique [0002] According to official data from Google, more than 1.5 billion apps are downloaded by users from the Google Play app market every month. In the face of this huge benefit, the Android platform has become another main target of attackers, and there are many security threats. One of the main threats is code tampering and repackaging attacks against Android applications. By tampering with Android application code, attackers can steal copyright, inject malicious code, and other activities. [0003] In the face of serious problems of Android application code tampering and repackaging, researchers have proposed a series of detection and protection technologies according to the characteristics of Android applications. Obfu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52G06F21/55
CPCG06F21/563G06F21/64
Inventor 王蕊贾晓启林子敏张道娟
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products