A core code reinforcement method based on dynamic loading on Android platform
Recently, those methods of protecting application from crack have a great development. Code obfuscation, dynamic link library, software shelling, those methods all have different levels of innovation and optimization [1]. However, various software crack technology also became increasingly mature. St...
Saved in:
| Published in | 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC) pp. 284 - 287 |
|---|---|
| Main Authors | , , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.09.2016
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781509012459 1509012451 |
| DOI | 10.1109/ICNIDC.2016.7974581 |
Cover
| Summary: | Recently, those methods of protecting application from crack have a great development. Code obfuscation, dynamic link library, software shelling, those methods all have different levels of innovation and optimization [1]. However, various software crack technology also became increasingly mature. Static code analysis cooperating with dynamic code analysis makes mostly code reinforcement method failed. After analyzing all of those code reinforcement method, author came up with a kind of core code reinforcement method, which is organized with client and server architecture and based on dynamic loading. Different with most methods, this method can ensure even if hacker has obtained the original dex file, the application can still be safe. |
|---|---|
| ISBN: | 9781509012459 1509012451 |
| DOI: | 10.1109/ICNIDC.2016.7974581 |