Android privilege escalation attack detection system and method based on cloud platform

A technology for privilege escalation and attack detection, applied in the field of computer security and mobile security, it can solve the problems of resource consumption, time-consuming, insufficient terminal capability, etc., and achieve the effect of improving sharing and reducing costs.

Inactive Publication Date: 2013-04-03
HUAZHONG UNIV OF SCI & TECH
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the defects of the prior art, the object of the present invention is to provide a cloud platform-based Android privilege escalation attack detection system, which uses the powerful computing power of the cloud platform to solve the problem of insufficient terminal capabilities, and pre-configures the system according to the strategy defined by the administrator. Classify the application software, so as to avoid the time-consuming and resource-consuming detection operation of the terminal every time ICC (inter-component communication) is called

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android privilege escalation attack detection system and method based on cloud platform
  • Android privilege escalation attack detection system and method based on cloud platform
  • Android privilege escalation attack detection system and method based on cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0064] Such as figure 1 As shown, the present invention is based on the cloud platform android privilege escalation attack detection method comprising the following steps:

[0065] (1) The cloud uses crawlers to download applications from the application market and add them to the application information database. The application market includes official markets and third-party markets, and formulates security policies based on known privilege escalation attack samples; security policies specifically include application programs. Permissions, communication between applications, whether to allow ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an android privilege escalation attack detection system and method based on cloud platform, which comprises the following steps: a cloud end downloads application programs from an application market and adds into an application program information database by using the crawler program, the application market comprises an official market and a third-party market, and formulates the security policy according to known privilege escalation attack sample, the cloud end classifies the application programs according to the security policy, the mobile terminal initializes the classified application program database and judges whether the application programs have update operation, if yes, the mobile terminal judges the type of the update operation is installation operation or un-installation operation, and the mobile terminal updates the classified application program database and the program privilege database directly or according to the result sent by the cloud end. By adoption of the method disclosed by the invention, the problem that the detection operation which wastes time and resource is performed every time when invoking the ICC (inter-component communication) is avoided.

Description

technical field [0001] The invention belongs to the fields of computer security and mobile security, and more specifically relates to a system and method for detecting an Android privilege elevation attack based on a cloud platform. Background technique [0002] In recent years, smart terminals have been widely popularized around the world, especially the smart terminals represented by Google's Android system and Apple's iOS system. According to Gartner's report, in the first quarter of 2012, mobile phones with Android and iOS systems accounted for 79% of the total global smart phone market, of which mobile phones with Android system accounted for 56%. Due to the high market share of Android and the open source code of the system, this patent is aimed at mobile terminals with the Android system which are more popular at present. With the popularity of Android smart terminals, malicious codes targeting Android systems are also increasing. According to the latest Kaspersky co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F17/30
Inventor 邹德清金海王代斌羌卫中陈刚冯毅
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products