Method for statically identifying malicious codes of Android system in heuristic manner

A malicious code detection and malicious technology, applied in the field of malicious code, can solve the problem that new unknown malware does not have the ability to detect and kill, and achieve the effect of improving the ability of identification and detection and killing

Active Publication Date: 2013-12-11
XI AN JIAOTONG UNIV
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing malicious code detection technologies on the Android platform mostly use th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for statically identifying malicious codes of Android system in heuristic manner
  • Method for statically identifying malicious codes of Android system in heuristic manner
  • Method for statically identifying malicious codes of Android system in heuristic manner

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0021] Such as figure 1 As shown, the present invention adopts the construction of Apk software heterogeneous method call graph, calibrates sensitive functions, and then realizes the location of Android malicious code in the correlation mode of the graph. In a specific embodiment, the detection method specifically includes the following steps:

[0022] The first step is to collect malicious samples of Android software, conduct manual analysis, and extract sensitive functions.

[0023] The sensitive functions include seven categories: network, short message, phone, file operation, device operation, code execution, and geographic location. In one embodiment, the sensitive functions have a total of 31 sensitive api function interfaces, as shown in Table 1.

[0024] Table 1 Sensitive functions and examples of sensitive receivers

[0025] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an Android malicious software detection method. Graphs are called by adopting an isomerism method for constructing Apk software of Android application, sensitive functions are calibrated, and malicious codes are positioned according to the continuity of the graphs. The method specifically comprises the following steps of performing graph continuity scanning on the graphs called by the isomerism method to obtain all sub-graphs, performing sensitive function marking on all the sub-graphs, and determining that the sub-graphs of which the marks exceed a threshold value are malicious code modules. According to the method, unknown malicious software can be heuristically found, and security scanning and protection are supplied to a large range of Android third-party markets and individual users.

Description

technical field [0001] The invention relates to the technical field of mobile Internet, and mainly relates to a method for identifying malicious codes on an Android system through heuristic static analysis. Background technique [0002] With the rapid development of smart phones, the Android platform has gradually become the largest mobile terminal platform in the world. Its products cover set-top boxes, mobile phones, tablets, and various smart terminals, affecting people's lives from all angles. Moreover, the functions of these smart terminals are becoming more and more powerful, including voice calls, data services, NFC near field communication, etc. Android smart terminals have deeply entered the lives of each of us, including payment services, life services, map services, entertainment services, and personal information services. Under such circumstances, the security issue on the Android platform has gradually become a problem that has to be paid attention to. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
Inventor 陶敬周文瑜胡文君赵双马小博
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products