-
1.
公开(公告)号:US20170242664A1
公开(公告)日:2017-08-24
申请号:US15434202
申请日:2017-02-16
Applicant: LINE Corporation
Inventor: Sang Min CHUNG , SangHun JEON , Tae Woo KIM , Joo Hyeon RYU , Dongpil SEO , Sungbeom AHN , Wang Jin OH , Seong Yeol LIM , Myungju CHUNG , Kwang-Hee HAN
IPC: G06F9/44
Abstract: Provided is a method, apparatus, system, and non-transitory computer readable medium for extending at least one function of a package file. A function addition method executed at a computer may include storing a package file for an application; extracting, from the package file, a file in which information about a class most initially called in response to execution of the application is set as configuration information of the application; and setting a class name of a new class to an item to which information about the most initially called class is set in the extracted file.
-
公开(公告)号:US20180157808A1
公开(公告)日:2018-06-07
申请号:US15887310
申请日:2018-02-02
Applicant: LINE Corporation , LINE Plus Corporation
Inventor: SangHun JEON , Dongpil SEO , Sungbeom AHN , Kwang-Hee HAN , Wang Jin OH , Seong Yeol LIM
Abstract: Provided is a method and system for code obfuscation of an application. A method configured as a computer may include receiving an application program package that includes an intermediate language (IL) code generated by compiling code for an application including a plurality of classes and a plurality of methods as a dex file over a network, selecting a protection target class or a protection target method from among the plurality of classes and the plurality of methods, encrypting the selected protection target class or the selected protection target method by retrieving and encrypting an IL code corresponding to the selected protection target class or the selected protection target method from the dex file, and adding decryption information for decrypting the encrypted protection target class or the encrypted protection target method to a secure module that is further included in the application program package.
-
公开(公告)号:US20170242716A1
公开(公告)日:2017-08-24
申请号:US15434217
申请日:2017-02-16
Applicant: LINE Corporation
Inventor: Sang Min CHUNG , SangHun JEON , Myungju CHUNG , Wang Jin OH , Sungbeom AHN , Dongpil SEO , Kwang-Hee HAN , Tae Woo KIM , Seong Yeol LIM , Joo Hyeon RYU
CPC classification number: G06F9/45525 , G06F21/51 , G06F2221/033 , H03M13/09
Abstract: A non-transitory computer-readable medium stores computer-executable instructions that, when executed by a computer, cause the computer to perform operations including generating a changed optimization file by changing an original optimization file, the original optimization file being an optimization file created at a point in time at which an intermediate language file for an application is loaded; storing the changed optimization file; creating and storing verification information for verifying whether the intermediate language file is changed; determining whether the intermediate language file is changed based on the stored verification information in response to reloading of the intermediate language file; and creating a new optimization file by deleting the changed optimization file or recovering the original optimization file based on the changed optimization file and reusing the original optimization file, based on whether the intermediate language file is changed.
-
公开(公告)号:US20170103205A1
公开(公告)日:2017-04-13
申请号:US15201832
申请日:2016-07-05
Applicant: LINE Corporation
Inventor: Sungbeom AHN , Kwang-Hee HAN , Seong Yeol LIM , Dongpil SEO , Wang Jin OH , SangHun JEON , Myungju CHUNG
CPC classification number: G06F21/566 , G06F12/1458 , G06F21/79 , G06F2212/1052 , G06F2221/034
Abstract: A memory hacking detecting method and a system therefor are provided. The memory hacking detecting method for accurately detecting a level of a hacker (or a cheating user) and action of memory hacking by detecting the memory hacking on a stage-by-stage basis and assigning attributes to each of variables of a program executed on a memory and detecting memory hacking in different ways based on the assigned attributes.
-
公开(公告)号:US20180307837A1
公开(公告)日:2018-10-25
申请号:US15958115
申请日:2018-04-20
Applicant: LINE Corporation
Inventor: Sungbeom AHN , Myungju CHUNG , Tae Woo KIM , Sang Min CHUNG , Seong Yeol LIM , SangHun JEON , Kwang-Hee HAN , Dongpil SEO , Joo Hyeon RYU
CPC classification number: G06F21/563 , G06F21/14 , G06F21/6218 , G06F2221/2107
Abstract: Provided are methods and/or systems for evaluating security of an application. A security evaluation method including storing pattern-information-by-perspective for analyzing a file package based on an obfuscation perspective and a vulnerability perspective, receiving a registration on the file package to be distributed to users for installing and executing an application, analyzing the registered file package based on the pattern-information-by-perspective and generating analysis information of the obfuscation perspective and analysis information of the vulnerability perspective, and providing the generated analysis information of the obfuscation perspective and the analysis information of the vulnerability perspective may be provided.
-
6.
公开(公告)号:US20170235963A1
公开(公告)日:2017-08-17
申请号:US15429665
申请日:2017-02-10
Applicant: LINE Corporation
Inventor: Sungbeom AHN , SangHun JEON , Wang Jin OH , Myungju CHUNG , Dongpil SEO , Seong Yeol LIM , Kwang-Hee HAN
CPC classification number: G06F21/602 , G06F21/14 , G06F21/54 , G06F2221/033 , H04L9/14 , H04L2209/76
Abstract: A code protection method may include storing, using a processor of a computer, a package file that includes files for an application on a storage device of the computer; transforming, at the processor, a protection target method and/or function selected from a file that includes an execution code among the files, or converting or deleting a library file among the files; regenerating the package file by adding, to the package file, a first protection module file for restoring the transformed protection target method and/or function or a second protection module file for restoring the library file; and providing the regenerated package file over a network.
-
-
-
-
-