Code obfuscation method and device, computing device, computer storage medium

A code obfuscation and source code technology, applied in the direction of program/content distribution protection, etc., can solve problems such as lack of applications and affecting application security.

Active Publication Date: 2020-09-08
JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, through tools such as objdump or IDA pro, you can easily obtain the code control flow, and then crack the program, affecting the security of the application
[0004] Therefore, there is still a lack of a method and device that can effectively prevent code reverse compilers or code reverse compiler products from obtaining code control flow through reverse compilation and cracking applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code obfuscation method and device, computing device, computer storage medium
  • Code obfuscation method and device, computing device, computer storage medium
  • Code obfuscation method and device, computing device, computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0025] figure 1 A schematic flowchart of a code obfuscation method provided according to an embodiment of the present invention is shown. like figure 1 As shown, the method includes:

[0026] Step S110, parsing the source code to generate a first abstract syntax tree corresponding to the source code, wherein the first abstract syntax tree contains conditional jump statements.

[0027] Among them, the abstract syntax tree (Abstra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a code obfuscation method and device, a computing device and a computer storage medium. The method comprises the steps that a source code is analyzed, and a first abstract syntax tree corresponding to the source code is generated, wherein the first abstract syntax tree contains a conditional jump statement; the conditional jump statement is replaced through a real memory, aconstructed false memory and a statement selector, and a second abstract syntax tree is obtained, wherein the false memory and the real memory are placed in the statement selector, and the statementselector is used for performing assignment on branch statements in the conditional jump statement to the real memory and / or the false memory; and an obfuscation code corresponding to the second abstract syntax tree is generated. By the adoption of the scheme, a control flow among all basic blocks in the code can be reduced, therefore, only the basic blocks in the source code can be obtained from the cracked code, and a complete control flow in the source code cannot be obtained, so that code reverse compiling difficulty is improved, and code security is enhanced.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a code obfuscation method and device, computing equipment, and computer storage media. Background technique [0002] With the continuous development of science and technology and society, the number of various applications is also increasing rapidly. However, code reverse compilers or code reverse compilation products can easily obtain the source code of the application program by decompiling the application program code, which makes the phenomenon of application program piracy, repackaging and malicious attacks emerge in an endless stream, greatly reducing the cost of the application program. safety. [0003] At present, code reverse compiler personnel or code reverse compilation products usually achieve the purpose of cracking the application program by cracking the control flow of the application program code. For example, tools such as objdump or IDA pro can easily obtain...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 汪德嘉华保健刘庆川
Owner JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products