CN110059455A - Code encryption method, apparatus, electronic equipment and computer readable storage medium - Google Patents

Code encryption method, apparatus, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN110059455A
CN110059455A CN201910283828.5A CN201910283828A CN110059455A CN 110059455 A CN110059455 A CN 110059455A CN 201910283828 A CN201910283828 A CN 201910283828A CN 110059455 A CN110059455 A CN 110059455A
Authority
CN
China
Prior art keywords
character string
instruction
encryption
bytecode
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910283828.5A
Other languages
Chinese (zh)
Inventor
马福鑫
曹志敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Megvii Technology Co Ltd
Beijing Maigewei Technology Co Ltd
Original Assignee
Beijing Maigewei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Maigewei Technology Co Ltd filed Critical Beijing Maigewei Technology Co Ltd
Priority to CN201910283828.5A priority Critical patent/CN110059455A/en
Publication of CN110059455A publication Critical patent/CN110059455A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides code encryption method, apparatus, electronic equipment and computer readable storage mediums.Code encryption method includes: to be compiled to source code, generates original intermediate file;Extract the bytecode information in original intermediate file, wherein bytecode information includes one or more presumptive instruction;Intercept one or more presumptive instruction in bytecode information, according to the instruction features for the constant character string being obtained ahead of time, one or more presumptive instruction is filtered, plaintext constant character string corresponding to the presumptive instruction in one or more presumptive instruction comprising instruction features is obtained;It performs encryption processing to plaintext constant character string, obtains encryption constant character string;Plaintext constant character string is replaced using encryption constant character string, and is inserted into the code of decryption processing corresponding with encryption, obtains encrypted intermediate file.The embodiment of the present invention improves the security level of application program, improves the efficiency for searching encryption.

Description

Code encryption method, apparatus, electronic equipment and computer readable storage medium
Technical field
This invention relates generally to computer software programs, relate more specifically to code encryption method, apparatus, electronic equipment And computer readable storage medium.
Background technique
With the development of science and technology with the promotion of technical industry application level, the application program of mobile terminal is increasingly It is universal.Due to there is huge interests to lure, for cracking and attack also more and more fiercely for application program.More especially it is related to Application program to types such as payment, recognition of face, secrets becomes the object of attack stood in the breach.
Currently, computer program product source code encipherment scheme usually carries out source code by third-party reinforcement tools Reinforce and obscure, and do it is some it is anti-intercept, the strategy of anti-debugging, it is therefore an objective to prevent from being cracked or to cracking increase difficulty. However, the character string being much present in user interface and programmed logic exists in the form of plaintext, can be exposed after decompiling Product Logic brings great convenience to cracking.Cracker can quickly be positioned by global search constant character string information Want the place looked for.
In order to solve this problem, manually the character string in program product can be encrypted, however this Kind mode low efficiency is easy to omit or malfunction.
Summary of the invention
In order to solve the above-mentioned problems in the prior art, the embodiment of the invention provides code encryption method, apparatus, Electronic equipment and computer readable storage medium.
In a first aspect, the embodiment of the present invention provides a kind of code encryption method, this method comprises: code compilation step, right Source code is compiled, and generates original intermediate file;Bytecode information extracting step extracts the bytecode in original intermediate file Information, wherein bytecode information includes one or more presumptive instruction;Instruction intercepts and filtration step, intercepts bytecode information In one or more presumptive instruction, according to the instruction features for the constant character string being obtained ahead of time, to one or more original finger Order is filtered, and obtains plaintext constant character corresponding to the presumptive instruction in one or more presumptive instruction comprising instruction features String;Character string encrypting step performs encryption processing to plaintext constant character string, obtains encryption constant character string;Replacement insertion step Suddenly, plaintext constant character string is replaced using encryption constant character string, and is inserted into decryption processing corresponding with encryption Code obtains encrypted intermediate file.
In one example, instruction features include load constant instruction features.
In one example, original intermediate file includes class file.
In one example, bytecode information extracting step includes: and decomposes order using bytecode plug-in unit or intermediate file to mention Take the bytecode information in original intermediate file.
In one example, it is held using any one of bytecode control frame, bytecode editor class libraries and bytecode engineering library Line character string encrypting step and replacement inserting step.
In one example, execution character string encrypting step and replacement inserting step in intermediate file initialization procedure.
Second aspect, the embodiment of the present invention provide a kind of code encryption device, which includes: code compilation module, match It sets for being compiled to source code, generates original intermediate file;Bytecode information extraction modules are configured to extract in original Between bytecode information in file, wherein bytecode information includes one or more presumptive instruction;Instruction intercepts and filter module Block is configured to intercept one or more presumptive instruction in bytecode information, according to the finger for the constant character string being obtained ahead of time Feature is enabled, one or more presumptive instruction is filtered, obtains the original in one or more presumptive instruction comprising instruction features Begin the corresponding plaintext constant character string of instruction;Character string encrypting module is configured to execute encryption to plaintext constant character string Processing obtains encryption constant character string;Replacement insertion module is configured to replace plaintext constant word using encryption constant character string Symbol string, and it is inserted into the code of decryption processing corresponding with encryption, obtain encrypted intermediate file.
The third aspect, the embodiment of the present invention provide a kind of electronic equipment, which includes: memory, for storing Instruction;And processor, the instruction execution above method for calling memory to store.
Fourth aspect, the embodiment of the present invention provide a kind of computer readable storage medium, and computer readable storage medium is deposited Computer executable instructions are contained, computer executable instructions when executed by the processor, execute the above method.
Code encryption method, apparatus, electronic equipment and computer readable storage medium provided in an embodiment of the present invention pass through Instruction in bytecode information is intercepted, filtered and encrypted, and replaces plaintext string using encrypted characters string, is provided A method of the character string based on automatic script is searched, filters, encrypts and is replaced automatically.It solves plaintext string and is easy band The security risk problem come, substantially increases the security level of application program;Simultaneously solve manual encrypted characters string efficiency it is low, Heavy workload is easy the problem of error, improves the efficiency for searching encryption.
Detailed description of the invention
The following detailed description is read with reference to the accompanying drawings, above-mentioned and other purposes, the feature of embodiment of the present invention It will become prone to understand with advantage.In the accompanying drawings, several implementations of the invention are shown by way of example rather than limitation Mode, in which:
Fig. 1 shows the flow chart of the code encryption method of embodiment according to the present invention;
Fig. 2 shows the block diagrams of the code encryption device of embodiment according to the present invention;
Fig. 3 shows the block diagram of the electronic equipment of embodiment according to the present invention.
In the accompanying drawings, identical or corresponding label indicates identical or corresponding part.
Specific embodiment
The principle and spirit of the invention are described below with reference to several illustrative embodiments.It should be appreciated that providing this A little embodiments are used for the purpose of making those skilled in the art can better understand that realizing the present invention in turn, and be not with any Mode limits the scope of the invention.
As shown in Figure 1, an embodiment of the invention provides a kind of code encryption method 100.Method 100 includes step Rapid S101-S105.
S101 is code compilation step, is compiled to source code, and original intermediate file is generated.
S102 is bytecode information extracting step, extracts the bytecode information in original intermediate file, wherein bytecode letter Breath includes one or more presumptive instruction.
S103 is instruction interception and filtration step, one or more presumptive instruction in bytecode information is intercepted, according to pre- The instruction features of the constant character string first obtained are filtered one or more presumptive instruction, and it is original to obtain one or more Plaintext constant character string corresponding to presumptive instruction in instruction comprising instruction features.
In some embodiments, traversal interception can be carried out to the presumptive instruction in bytecode information, that is, intercept wherein Each presumptive instruction.It is of course also possible to intercept a part instruction therein according to demand.
It should be noted that " constant character string " concept is used in description of the invention, in reality for consistency of composing a piece of writing In, constant character string is referred to as constant field, constant character string information, constant information etc..
It in some embodiments, can be constant character after by intercepting and filtering acquisition plaintext constant character string The value of string saves, and prepares subsequent operation.For example, the value of plaintext constant character string can be stored in dictionary.
S104 is character string encrypting step, is performed encryption processing to plaintext constant character string, and encryption constant character string is obtained.
In some embodiments, encryption can be preset.In addition, encryption may include a variety of adds Close algorithm, for example, the conventional encryption algorithms such as Base64, AES, can choose at random according to demand, as long as allowing constant character string can not It is directly visible and searches.
It in some embodiments, can be opposite with the value of plaintext constant character string by the value of encrypted constant character string It is stored in dictionary with answering, is convenient for subsequent index and use.
S105 is to replace inserting step, replaces plaintext constant character string using encryption constant character string, and be inserted into and add The close code for handling corresponding decryption processing, obtains encrypted intermediate file.
It in some embodiments, can be by retrieving plaintext constant in dictionary when carrying out the replacement of constant character string The corresponding encryption constant character string of character string, to be replaced.
In some embodiments, the corresponding decryption processing of encryption can be inserted into the initialization of intermediate file In method, to guarantee being normally carried out for programmed logic.
The code encryption method 100 that embodiments of the present invention propose is by extracting the bytecode letter in original intermediate file Breath helps to search constant character string, has some common instructions because there is the instruction of constant character string in bytecode information Feature.By the way that the instruction in bytecode information is intercepted, filtered and is encrypted, and in plain text using the replacement of encryption constant character string Constant character string provides a kind of method that the character string based on automatic script is searched, filters, encrypts and replaced automatically.This hair The code encryption method 100 that bright embodiment proposes solves the problems, such as that plaintext string is easy bring security risk, significantly Improve the security level of application program;It solves low manual encrypted characters string efficiency simultaneously, heavy workload, be easy asking for error Topic improves the efficiency for searching encryption.
As an embodiment of the invention, instruction features may include load constant instruction features.With Java system language For speech, the instruction of usual defconstant character string is usually to load constant (Load Constant, LDC) instruction, and LDC is referred to The instruction features as constant character string are enabled, constant character string can easily, be rapidly found.
As an embodiment of the invention, by taking Java system language as an example, original intermediate file may include class file, That is, the file of .class suffix.
As an embodiment of the invention, bytecode information extracting step includes: to utilize bytecode (Bytecode) Plug-in unit or intermediate file decompose the bytecode information in the original intermediate file of order extraction.In some embodiments, intermediate It may include javap order that file, which decomposes order, can decompose class (.class) file, carry out decompiling to intermediate file, Check bytecode information.
As an embodiment of the invention, bytecode control frame, bytecode editor class libraries and byte can use Any execution character string encrypting step S104 in code engineering library (Byte Code Engineering Library, BCEL) With replacement inserting step S105.
As an embodiment of the invention, can in intermediate file initialization procedure execution character string encrypting step S104 and replacement inserting step S105.
In some embodiments, bytecode control frame may include ASM tool and SERP tool.Wherein, ASM tool It is the frame for being dedicated to bytecode operation and analysis, can be used to modify an already present class or dynamic generates one A new class.ASM provides some general bytecode conversions and parser, can be customized by these algorithms more complicated Tool.Compared with other bytecode tools, ASM is more concerned about execution efficiency, be designed it is smaller faster.SERP bytecode frame One group of advanced application programming interface (Application Programming Interface, API) progress can be provided The operation of bytecode various aspects.
In some embodiments, bytecode editor class libraries may include javassist tool, and javassist tool is Analysis, editor and the class libraries for creating Java bytecode of one open source.
Above-mentioned ASM tool, javassist tool, BCEL tool, SERP tool can carry out the .class code of generation After addition and modification, new .class file is generated.It should be noted that embodiments of the present invention are not limited to above-mentioned enumerate Several tools, under different programming language environment, can using different tool implementation classes like function.
As shown in Fig. 2, an embodiment of the invention provides a kind of code encryption device 200.Device 200 includes mould Block 201-205.
Code compilation module 201 may be configured to be compiled source code, generate original intermediate file;
Bytecode information extraction modules 202 may be configured to extract the bytecode information in original intermediate file, wherein Bytecode information includes one or more presumptive instruction.
Instruction intercepts and filtering module 203 may be configured to intercept one or more original finger in bytecode information Enable, according to the instruction features for the constant character string being obtained ahead of time, one or more presumptive instruction is filtered, obtain one or Plaintext constant character string corresponding to presumptive instruction in a plurality of presumptive instruction comprising instruction features.
Character string encrypting module 204 may be configured to perform encryption processing to plaintext constant character string, and it is normal to obtain encryption Measure character string.
Replacement insertion module 205 may be configured to replace plaintext constant character string using encryption constant character string, and It is inserted into the code of decryption processing corresponding with encryption, obtains encrypted intermediate file.
As an embodiment of the invention, instruction features may include load constant instruction features.
As an embodiment of the invention, original intermediate file may include class file.
As an embodiment of the invention, bytecode information extraction modules can also be configured to: utilize bytecode (Bytecode) plug-in unit or intermediate file decompose the bytecode information in the original intermediate file of order extraction.
As an embodiment of the invention, bytecode control frame, bytecode editor class libraries and byte can use The operation of any execution character string encrypting module 204 and replacement insertion module 205 in code engineering library (BCEL).
As an embodiment of the invention, can in intermediate file initialization procedure execution character string encrypting module 204 are inserted into the operation of module 205 with replacement.
The function that modules in device are realized is corresponding with the step in method as described above, specific implementation The description for method and step above is referred to technical effect, details are not described herein.
As shown in figure 3, an embodiment of the invention provides a kind of electronic equipment 300.Wherein, the electronic equipment 300 include memory 301, processor 302, input/output (Input/Output, I/O) interface 303.Wherein, memory 301, For storing instruction.Processor 302, the code encryption of the instruction execution embodiment of the present invention for calling memory 301 to store Method.Wherein, processor 302 is connect with memory 301, I/O interface 303 respectively, for example, can by bus system and/or other Bindiny mechanism's (not shown) of form is attached.Memory 301 can be used for storing program and data, including the embodiment of the present invention Involved in code encryption program, processor 302 is stored in the program of memory 301 by operation thereby executing electronic equipment 300 various function application and data processing.
Processor 302 can use digital signal processor (Digital Signal in the embodiment of the present invention Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), programmable patrol At least one of volume array (Programmable Logic Array, PLA) example, in hardware realizes, the processor 302 It can be central processing unit (Central Processing Unit, CPU) or there is data-handling capacity and/or instruction The combination of one or more of the processing unit of other forms of executive capability.
Memory 301 in the embodiment of the present invention may include one or more computer program products, the computer Program product may include various forms of computer readable storage mediums, such as volatile memory and/or non-volatile deposit Reservoir.The volatile memory for example may include random access memory (Random Access Memory, RAM) and/ Or cache memory (Cache) etc..The nonvolatile memory for example may include read-only memory (Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid state hard disk (Solid-State Drive, SSD) etc..
In the embodiment of the present invention, I/O interface 303 can be used for receiving input instruction (such as number or character information, and Generate key signals input related with the user setting of electronic equipment 300 and function control etc.), it can also be output to the outside various Information (for example, image or sound etc.).In the embodiment of the present invention I/O interface 303 may include physical keyboard, function button (such as Volume control button, switch key etc.), mouse, operating stick, trace ball, microphone, one in loudspeaker and touch panel etc. It is a or multiple.
In some embodiments, the present invention provides a kind of computer readable storage medium, the computer-readable storages Media storage has computer executable instructions, and computer executable instructions when executed by the processor, execute described above appoint Where method.
Although description operation in a particular order in the accompanying drawings should not be construed as requiring specific shown in Sequence or serial order operate to execute these operations, or shown in requirement execution whole to obtain desired result.? In specific environment, multitask and parallel processing be may be advantageous.
Methods and apparatus of the present invention can be completed using standard programming technology, using rule-based logic or its His logic realizes various method and steps.It should also be noted that herein and the terms used in the claims " device " " module " is intended to include using the realization of a line or multirow software code and/or hardware realization and/or for receiving input Equipment.
One or more combined individually or with other equipment can be used in any step, operation or program described herein A hardware or software module are executed or are realized.In one embodiment, software module use includes comprising computer program The computer program product of the computer-readable medium of code is realized, can be executed by computer processor any for executing Or whole described step, operation or programs.
For the purpose of example and description, the preceding description that the present invention is implemented is had been presented for.Preceding description is not poor Also not the really wanting of act property limits the invention to exact form disclosed, according to the above instruction there is likely to be various modifications and Modification, or various changes and modifications may be obtained from the practice of the present invention.Select and describe these embodiments and be in order to Illustrate the principle of the present invention and its practical application, so that those skilled in the art can be to be suitable for the special-purpose conceived Come in a variety of embodiments with various modifications and utilize the present invention.

Claims (9)

1. a kind of code encryption method, which comprises
Code compilation step, is compiled source code, generates original intermediate file;
Bytecode information extracting step extracts the bytecode information in the original intermediate file, wherein the bytecode information Including one or more presumptive instruction;
Instruction intercepts and filtration step, one or more presumptive instruction in the bytecode information is intercepted, according to preparatory The instruction features of the constant character string of acquisition are filtered one or more presumptive instruction, obtain described one or more Plaintext constant character string corresponding to presumptive instruction in presumptive instruction comprising described instruction feature;
Character string encrypting step performs encryption processing to the plaintext constant character string, obtains encryption constant character string;
Replace inserting step, replace the plaintext constant character string using the encryption constant character string, and insertion with it is described The code of the corresponding decryption processing of encryption, obtains encrypted intermediate file.
2. according to the method described in claim 1, wherein, described instruction feature includes load constant instruction features.
3. according to the method described in claim 1, wherein, the original intermediate file includes class file.
4. according to the method described in claim 1, wherein, the bytecode information extracting step includes:
The bytecode information in the order extraction original intermediate file is decomposed using bytecode plug-in unit or intermediate file.
5. according to the method described in claim 1, wherein, utilizing bytecode control frame, bytecode editor class libraries and bytecode Any one of engineering library executes the character string encrypting step and the replacement inserting step.
6. according to the method described in claim 1, wherein, the character string encryption step is executed in intermediate file initialization procedure The rapid and replacement inserting step.
7. a kind of code encryption device, described device include:
Code compilation module is configured to be compiled source code, generates original intermediate file;
Bytecode information extraction modules are configured to extract the bytecode information in the original intermediate file, wherein the word Saving code information includes one or more presumptive instruction;
Instruction intercepts and filtering module, is configured to intercept one or more presumptive instruction in the bytecode information, According to the instruction features for the constant character string being obtained ahead of time, one or more presumptive instruction is filtered, described in acquisition Plaintext constant character string corresponding to presumptive instruction in one or more presumptive instruction comprising described instruction feature;
Character string encrypting module is configured to perform encryption processing to the plaintext constant character string, obtains encryption constant character String;
Replacement insertion module, is configured to replace the plaintext constant character string using the encryption constant character string, and insert The code for entering decryption processing corresponding with the encryption, obtains encrypted intermediate file.
8. a kind of electronic equipment, the electronic equipment include:
Memory, for storing instruction;And
Processor, for calling the described instruction of the memory storage to execute such as side of any of claims 1-6 Method.
9. a kind of computer readable storage medium, the computer-readable recording medium storage has computer executable instructions, institute It states computer executable instructions when executed by the processor, executes such as method of any of claims 1-6.
CN201910283828.5A 2019-04-09 2019-04-09 Code encryption method, apparatus, electronic equipment and computer readable storage medium Pending CN110059455A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910283828.5A CN110059455A (en) 2019-04-09 2019-04-09 Code encryption method, apparatus, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910283828.5A CN110059455A (en) 2019-04-09 2019-04-09 Code encryption method, apparatus, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110059455A true CN110059455A (en) 2019-07-26

Family

ID=67317622

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910283828.5A Pending CN110059455A (en) 2019-04-09 2019-04-09 Code encryption method, apparatus, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110059455A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659490A (en) * 2019-09-20 2020-01-07 哈尔滨安天科技集团股份有限公司 Malicious sample processing method and device, electronic equipment and storage medium
CN111159662A (en) * 2019-12-25 2020-05-15 郑州阿帕斯数云信息科技有限公司 Data processing method and device
CN111400736A (en) * 2020-03-17 2020-07-10 同盾(广州)科技有限公司 Application program encryption method and device, storage medium and electronic equipment
CN111460516A (en) * 2020-06-22 2020-07-28 腾讯科技(深圳)有限公司 Non-invasive data protection method, device, terminal and storage medium
CN112115429A (en) * 2020-08-25 2020-12-22 北京基调网络股份有限公司 Java class encryption and decryption method and computer readable storage medium
CN112214653A (en) * 2020-10-29 2021-01-12 Oppo广东移动通信有限公司 Character string recognition method and device, storage medium and electronic equipment
CN112256275A (en) * 2020-10-22 2021-01-22 北京字节跳动网络技术有限公司 Code obfuscation method, device, electronic device and medium
CN113282294A (en) * 2021-05-19 2021-08-20 武汉极意网络科技有限公司 Android platform-based Java character string confusion method and device
CN113434148A (en) * 2021-06-30 2021-09-24 平安普惠企业管理有限公司 Decryption-preventing client development compiling method and device, electronic equipment and storage medium
CN113642015A (en) * 2021-08-02 2021-11-12 北京奇艺世纪科技有限公司 File encryption method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102043932A (en) * 2010-12-31 2011-05-04 中国航空工业集团公司第六三一研究所 Method for preventing Java program from being decompiled
CN104268444A (en) * 2014-08-25 2015-01-07 浪潮电子信息产业股份有限公司 Cloud OS Java source code protection method
CN105335151A (en) * 2014-08-14 2016-02-17 优视科技有限公司 Installation file protection method and apparatus
CN105718765A (en) * 2016-01-26 2016-06-29 国家信息技术安全研究中心 Method for achieving code obfuscation through finite automaton
CN105930745A (en) * 2016-04-25 2016-09-07 北京珊瑚灵御科技有限公司 Android platform-based character string reinforcement method
CN109409033A (en) * 2018-09-11 2019-03-01 平安科技(深圳)有限公司 Code encryption method, apparatus, computer installation and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102043932A (en) * 2010-12-31 2011-05-04 中国航空工业集团公司第六三一研究所 Method for preventing Java program from being decompiled
CN105335151A (en) * 2014-08-14 2016-02-17 优视科技有限公司 Installation file protection method and apparatus
CN104268444A (en) * 2014-08-25 2015-01-07 浪潮电子信息产业股份有限公司 Cloud OS Java source code protection method
CN105718765A (en) * 2016-01-26 2016-06-29 国家信息技术安全研究中心 Method for achieving code obfuscation through finite automaton
CN105930745A (en) * 2016-04-25 2016-09-07 北京珊瑚灵御科技有限公司 Android platform-based character string reinforcement method
CN109409033A (en) * 2018-09-11 2019-03-01 平安科技(深圳)有限公司 Code encryption method, apparatus, computer installation and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
孙聪 等编: "《软件逆向工程原理与实践》", 28 February 2018, 西安电子科技大学出版社 *
尹艳阳 等: "Java软件保护机制的研究与实现", 《现代计算机》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659490B (en) * 2019-09-20 2023-02-24 安天科技集团股份有限公司 Malicious sample processing method and device, electronic equipment and storage medium
CN110659490A (en) * 2019-09-20 2020-01-07 哈尔滨安天科技集团股份有限公司 Malicious sample processing method and device, electronic equipment and storage medium
CN111159662A (en) * 2019-12-25 2020-05-15 郑州阿帕斯数云信息科技有限公司 Data processing method and device
CN111400736B (en) * 2020-03-17 2022-07-22 同盾(广州)科技有限公司 Application program encryption method and device, storage medium and electronic equipment
CN111400736A (en) * 2020-03-17 2020-07-10 同盾(广州)科技有限公司 Application program encryption method and device, storage medium and electronic equipment
CN111460516A (en) * 2020-06-22 2020-07-28 腾讯科技(深圳)有限公司 Non-invasive data protection method, device, terminal and storage medium
CN112115429A (en) * 2020-08-25 2020-12-22 北京基调网络股份有限公司 Java class encryption and decryption method and computer readable storage medium
CN112256275A (en) * 2020-10-22 2021-01-22 北京字节跳动网络技术有限公司 Code obfuscation method, device, electronic device and medium
CN112256275B (en) * 2020-10-22 2023-09-29 抖音视界有限公司 Code confusion method, device, electronic equipment and medium
CN112214653A (en) * 2020-10-29 2021-01-12 Oppo广东移动通信有限公司 Character string recognition method and device, storage medium and electronic equipment
CN113282294A (en) * 2021-05-19 2021-08-20 武汉极意网络科技有限公司 Android platform-based Java character string confusion method and device
CN113434148A (en) * 2021-06-30 2021-09-24 平安普惠企业管理有限公司 Decryption-preventing client development compiling method and device, electronic equipment and storage medium
CN113434148B (en) * 2021-06-30 2024-03-22 广东迅维信息产业股份有限公司 Decryption-preventing client development compiling method and device, electronic equipment and storage medium
CN113642015A (en) * 2021-08-02 2021-11-12 北京奇艺世纪科技有限公司 File encryption method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110059455A (en) Code encryption method, apparatus, electronic equipment and computer readable storage medium
TWI515668B (en) Methods and systems for detection in a state machine
KR101873619B1 (en) Boolean logic in a state machine lattice
US9104657B2 (en) Using lexical analysis and parsing in genome research
CN107608750B (en) Device for pattern recognition
US10866973B2 (en) Test data management
US8615735B2 (en) System and method for blurring instructions and data via binary obfuscation
CN110825363B (en) Intelligent contract acquisition method and device, electronic equipment and storage medium
CN106575166A (en) Methods for processing handwritten inputted characters, splitting and merging data and encoding and decoding processing
CN108334490A (en) Keyword extracting method and keyword extracting device
Van Gompel et al. Efficient n-gram, skipgram and flexgram modelling with Colibri Core
CN106960156A (en) Data encryption and access method based on application program, device
US9563635B2 (en) Automated recognition of patterns in a log file having unknown grammar
CN106598828A (en) Method and device for determining invalid class in source code
CN109558735A (en) A kind of rogue program sample clustering method and relevant apparatus based on machine learning
US10534755B2 (en) Word, phrase and sentence deduplication for text repositories
Fang et al. SIFO: secure computational infrastructure using FPGA overlays
CN107122636A (en) A kind of APK reinforcement means and device based on SO files
CN110457869A (en) Program compiles encryption method, device, storage medium and electronic equipment
CN102707938A (en) Table-form software specification manufacturing and supporting method and device
CN104615935B (en) A kind of hidden method towards Xen virtual platforms
US9697018B2 (en) Synthesizing inputs to preserve functionality
US9286349B2 (en) Dynamic search system
US10360289B2 (en) Encoded text data management
CN103150401B (en) A kind of field entirety replacement method based on MapReduce

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190726