Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Program anti-obfuscation processing method and device, equipment and storage medium

A processing method and program technology, applied in the field of information security, can solve problems such as no solution, program deobfuscation, etc.

Active Publication Date: 2020-10-23
BEIJING DIDI INFINITY TECH & DEV
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there is no effective solution for how to de-obfuscate the program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program anti-obfuscation processing method and device, equipment and storage medium
  • Program anti-obfuscation processing method and device, equipment and storage medium
  • Program anti-obfuscation processing method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. It should be understood that the appended The figures are only for the purpose of illustration and description, and are not used to limit the protection scope of the present application. Additionally, it should be understood that the schematic drawings are not drawn to scale. The flowcharts used in this application illustrate operations implemented in accordance with some embodiments of the application. It should be understood that the operations of the flowcharts may be performed out of order and that steps without logical context may be performed in reverse order or concurrently. In addition, those skilled in the art may add one or more other operations to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a program anti-obfuscation processing method and device, equipment and a storage medium. The method relates to the technical field of information safety, and comprises the following steps: determining a plurality of process chains corresponding to a target program according to a preset rule, the process chains comprising an entry chain, a loop chain and a return chain, eachprocess chain comprising at least one basic block, the basic block comprising a real block or a false block; starting from a dispatcher of the target program, traversing the target program, and determining a real block contained in each process chain; combining a plurality of process chains according to the exit context environment of each process chain and the address of the real block in the process chain to obtain a logic chain; and invalidating the false block in the logic chain, and reconstructing to obtain an original program corresponding to the target program. According to the method,reverse analysis of the program is realized, the purpose of assisting in analyzing the program is achieved, and behaviors of maliciously escaping program detection and obtaining illegal benefits are effectively avoided.

Description

technical field [0001] The present application relates to the technical field of information security, in particular, to a method, device, device and storage medium for program de-obfuscation processing. Background technique [0002] In recent years, with the rapid development of the mobile Internet, the offensive and defensive confrontation on the end has also intensified. In order to better protect their core programs, more and more developers choose to transfer them to the Native layer. There are also some virus Trojan horse developers, cheat software producers, etc., who try to evade detection by using APP reinforcement and obfuscation technology. In this context, the application of Ollvm is becoming more and more extensive, and there are still a large number of magically modified versions that have been developed on top of it. Control flow flattening is the most commonly used method of obfuscation. It is necessary to propose a method to counteract it and deduce the no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 蒋杰
Owner BEIJING DIDI INFINITY TECH & DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products