Malicious Android application program detection method, system and device
An application program and malicious technology, applied in transmission systems, software testing/debugging, instruments, etc., can solve problems such as heavy workload and inability to detect in a short time, and achieve the effect of reducing workload and accurate and timely malicious behavior detection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0066] The basic idea of the present invention is: the server simulates the execution of the Android application program, matches the sensitive feature information of the system function called by the application program with the sensitive feature information stored in the sensitive data import rule base, and marks the variable of the successfully matched system function as Sensitive data: Match the functions containing sensitive data with the malicious behavior characteristic information stored in the malicious behavior detection rule base, and mark the successfully matched function parameters as malicious behaviors.
[0067] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0068] figure 1 It is a schematic flow chart of the Android malicious application detection method of the present invention, as figure 1 shown, including the following steps:
[0069] Step 11: the server simulates ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com