摘要 |
The present invention relates to an execution file recovery corresponding to obfuscation of an android platform execution file. When an execution file, including a DEX file or the like, is obfuscated, a parent-child relation is configured to be recursive by making reference to class-relevant information on a header of the obfuscated execution file. Accordingly, an original hierarchy structure is able to be restored by analyzing information of the parent-child relation regarding each of the class defined by a class definition item in the execution file. |