Malicious Android application program detection method, system and device

An application program and malicious technology, applied in transmission systems, software testing/debugging, instruments, etc., can solve problems such as heavy workload and inability to detect in a short time, and achieve the effect of reducing workload and accurate and timely malicious behavior detection

Inactive Publication Date: 2013-02-20
ZTE CORP +1
View PDF11 Cites 85 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The dynamic detection method relies on specific trigger conditions, and cannot detect all execution paths in a short time; the method based

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious Android application program detection method, system and device
  • Malicious Android application program detection method, system and device
  • Malicious Android application program detection method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The basic idea of ​​the present invention is: the server simulates the execution of the Android application program, matches the sensitive feature information of the system function called by the application program with the sensitive feature information stored in the sensitive data import rule base, and marks the variable of the successfully matched system function as Sensitive data: Match the functions containing sensitive data with the malicious behavior characteristic information stored in the malicious behavior detection rule base, and mark the successfully matched function parameters as malicious behaviors.

[0067] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0068] figure 1 It is a schematic flow chart of the Android malicious application detection method of the present invention, as figure 1 shown, including the following steps:

[0069] Step 11: the server simulates ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious Android application program detection method, system and device. The method comprises the following steps of: imitating the execution of Android application programs by a server; matching sensitive characteristic information and sensitive date of system functions called by the Android application programs with sensitive characteristic information stored in a rule base, and marking variables of the matched system functions as sensitive data; and matching the functions containing the sensitive data with characteristic information of malicious acts stored in a malicious act detection rule base, and marking parameters of the matched functions as malicious acts. According to the technical scheme, the method, the system and the device can be used for detecting malicious Android application programs on the premise that manual analysis of characteristic codes is not relied on, thus alleviating the workload of technicians.

Description

technical field [0001] The invention relates to malicious application program detection technology, in particular to a method, system and device for detecting an Android (Android) malicious application program. Background technique [0002] As an open source smartphone operating system, the Android system has attracted a large number of application program developers. Since there is a large amount of user privacy information stored in smart phones, a large number of malicious applications are attracted to the application program market to steal users' privacy information; The maliciousness of the application program is screened, so a large amount of user privacy information is leaked, and the user of the application program suffers a great loss. [0003] Android malicious applications refer to software that is installed and run on the user's computer or other terminals without explicitly prompting the user or without the user's permission, violating the user's legitimate ri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F11/36
CPCH04W12/00H04W12/12G06F21/566H04L63/145H04W12/128
Inventor 程绍银巫妍吴俊昌蒋凡
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products