Android malicious application detection method, system and device

An application program and malicious technology, applied in the field of malicious application program detection, can solve problems such as inability to detect in a short time and heavy workload, achieve accurate and timely malicious behavior detection, and reduce workload

Inactive Publication Date: 2016-11-30
ZTE CORP +1
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The dynamic detection method relies on specific trigger conditions, and cannot detect all execution paths in a short time; the method based on feature matching relies on the signature database, and the acquisition of signatures basically relies on manual analysis, with a huge workload

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android malicious application detection method, system and device
  • Android malicious application detection method, system and device
  • Android malicious application detection method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The basic idea of ​​the present invention is: the server simulates the execution of the Android application program, matches the sensitive feature information of the system function called by the application program with the sensitive feature information stored in the sensitive data import rule base, and marks the variable of the successfully matched system function as Sensitive data: Match the functions containing sensitive data with the malicious behavior characteristic information stored in the malicious behavior detection rule base, and mark the successfully matched function parameters as malicious behaviors.

[0067] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0068] figure 1 It is a schematic flow chart of the Android malicious application detection method of the present invention, as figure 1 shown, including the following steps:

[0069] Step 11: the server simulates ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a detection method, system and equipment for an Android malicious application program, wherein the detection method comprises: a server simulates and executes an Android application program, and introduces sensitive feature information and sensitive data of a system function called by the Android application program into a rule base Sensitive feature information is matched, and the variable of the successfully matched system function is marked as sensitive data; the function containing sensitive data is matched with the malicious behavior feature information stored in the malicious behavior detection rule base, and the successfully matched function parameter is marked as malicious Behavior. By adopting the technical scheme of the invention, the detection of Android malicious application programs is realized without relying on manual analysis of characteristic codes, thereby reducing the workload of technicians.

Description

technical field [0001] The invention relates to malicious application program detection technology, in particular to a method, system and device for detecting an Android (Android) malicious application program. Background technique [0002] As an open source smartphone operating system, the Android system has attracted a large number of application program developers. Since there is a large amount of user privacy information stored in smart phones, a large number of malicious applications are attracted to the application program market to steal users' privacy information; The maliciousness of the application program is screened, so a large amount of user privacy information is leaked, and the user of the application program suffers a great loss. [0003] Android malicious applications refer to software that is installed and run on the user's computer or other terminals without explicitly prompting the user or without the user's permission, violating the user's legitimate ri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F11/36
Inventor 程绍银巫妍吴俊昌蒋凡
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products