Method and apparatus for protecting application security based on virtual machine

An application security and virtual machine technology, applied in the field of application security based on virtual machine protection, can solve the problems of easy access to original code, application execution security, etc., to achieve the effect of protection security

Inactive Publication Date: 2017-04-26
JIANGSU PAYEGIS TECH CO LTD
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to address the defects of the prior art and provide a method and device for protecting application security based on a virtual machine, which is used to solve the problems in the prior art that the original code of the application is easy to be obtained and the application execution is safe.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for protecting application security based on virtual machine
  • Method and apparatus for protecting application security based on virtual machine
  • Method and apparatus for protecting application security based on virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0014] figure 1 A schematic flowchart showing a method for protecting application security based on a virtual machine according to an embodiment of the present invention, as shown in figure 1 As shown, the method specifically includes the following steps:

[0015] In step S101, the code of the application is obtained, and it is judged whether each function in the code contains a preset protection flag.

[0016] Wherein, the appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and apparatus for protecting application security based on a virtual machine. The method comprises the following steps: obtaining a code of an application, and judging whether each function in the code contains a preset protection identifier; if the function contains the preset protection identifier, compiling the function into an assembly instruction that is executed on the basis of the virtual machine; and linking execution logic of the virtual machine with the assembly instruction that is executed on the basis of the virtual machine to generate a target program of the application. In the scheme, the code in the function containing the preset protection identifier is virtually compiled through an operation environment of the assembly instruction corresponding to the application self-defined by the virtual machine, the entire virtual compilation process is irreversible and cannot be restored, therefore even if decompilation is performed on the virtualized assembly instruction, the obtained code is not the original code of the application, and thus the security of the code of the application is protected.

Description

technical field [0001] The invention relates to the field of software, in particular to a method and device for protecting application security based on a virtual machine. Background technique [0002] With the development of science and technology, the number of users of smart terminals has exploded, and many applications installed on smart terminals have gradually become an indispensable part of users' daily life. Application security has emerged as the biggest issue faced when using applications. Packing applications is the main protection technology currently used. Through packing, the application can prevent the application code from being disassembled and analyzed and dynamically analyzed to a certain extent, so as to ensure the security of the application. [0003] But all packers have the risk of being unpacked, and packers will inevitably affect program compatibility. In addition to packing, security hardening can also be performed on the application. However, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14G06F9/455
CPCG06F21/14G06F9/45558G06F2009/45587
Inventor 汪德嘉华保健邵根波刘庆川
Owner JIANGSU PAYEGIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products