Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Reinforcing method and device for executable files

A technology for executing files and files, which is applied in the field of information security, can solve problems such as user data being stolen, and achieve the effects of preventing user data from being stolen, improving operating efficiency, and preventing malicious instructions from being implanted

Active Publication Date: 2020-06-23
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a reinforcement method for executable files, which can prevent applications from being implanted with malicious instructions and prevent user data from being stolen. Stealing, improving the security of user data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reinforcing method and device for executable files
  • Reinforcing method and device for executable files
  • Reinforcing method and device for executable files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] It can be understood that the terms "first", "second" and the like used in the present invention can be used to describe various elements herein, but these elements are not limited by these terms. These terms are only used to distinguish one element from another element. For example, a first client could be termed a second client, and, similarly, a second client could be termed a first client, without departing from the scope of the present invention. Both the first client and the second client are clients, but they are not the same client.

[0027] Figure 1A It is a schematic diagram of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a reinforcement method and device for an executable file. The reinforcement method includes the following steps: acquiring an executable file code of an application program; compiling the executable file code of the application program into an assembly file; acquiring an assembly code corresponding to a preset code needing to be protected from the assembly file; and inserting an anti-decompiling code into a position before the assembly code. According to the reinforcement method and device for the executable file, the executable file code of the application program is compiled into the assembly file, and the anti-decompiling code into the position before the assembly code, the security of the application program is improved, and the situation that malicious commands are implanted into the application program can be avoided; and normal execution of a protection code cannot be affected.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and device for strengthening executable files. Background technique [0002] With the development of network technology, applications that provide various services have emerged. Install the application program on the mobile terminal and use the application program to enjoy corresponding services, such as taxi-hailing software, install the taxi-hailing software on the mobile terminal, start and run the taxi-hailing software, enter the starting point and destination to generate the taxi-hailing information, and send the taxi-hailing software The taxi driver who receives the taxi information can respond and provide service. [0003] However, when the application is installed on the mobile terminal, it is easy for the decompilation tool to directly read the executable file (such as the so file) stored in the libs directory in the application installation package, modify ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/14
CPCG06F21/14G06F21/556
Inventor 蒋鑫蒋宁波王正
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products