Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An android malicious code detection method based on category analysis

A malicious code detection, classification technology

Active Publication Date: 2016-05-25
XI AN JIAOTONG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] On the one hand, the above malicious code detection methods are too complicated, on the other hand, there are problems in practical application, or they can only detect samples of known malicious code families
For example, RiskRanker needs to extract a large amount of feature information to construct feature vectors, and at the same time, it can only detect samples of known malicious code families; TaintDroid can dynamically detect privacy leaks of Android programs, but it needs to modify the Android source code, which is complex to implement, and for frequent upgrades The updated Android system needs to modify the source code for different Android system versions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An android malicious code detection method based on category analysis
  • An android malicious code detection method based on category analysis
  • An android malicious code detection method based on category analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0025] The overall idea of ​​the present invention is to adopt a category classification method based on permission information, extract permission information from the Android program to be detected, input it into the classification model for classification, compare the classification result with the declared category, and judge whether there is malicious behavior according to the discrimination rules .

[0026] refer to figure 1 , 2 , in a specific embodiment, the present invention comprises the following steps:

[0027] The first step is to collect a predetermined amount of M Android programs and divide them into six categories: communication, camera, map, network, system, and general. Those skilled in the art should understand that the value of the predetermined amount M should be large enough to meet the needs of sample analysis. In...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an Android malicious code detection method based on class analysis. The method comprises the following steps: extracting permission information from an Android program to be detected by adopting a classifying method based on permission information; inputting the permission information into a classifying model for classifying; comparing a classification result with a claimed class; judging the malicious threat degree of the Android program to be detected according to a judging rule. The Android malicious code detection method is suitable for automatic malicious code detection of mass Android applications, and has the characteristics of easiness, high efficiency and high speed.

Description

technical field [0001] The invention relates to the technical field of mobile Internet, and mainly relates to a method for detecting malicious codes on an Android system. Background technique [0002] In recent years, smartphones based on the Android system have developed very rapidly. The latest statistical report from IDC shows that in the fourth quarter of 2012, the shipment of smartphones based on the Android system reached 159.8 million units, with a market share of 70.1%. In May, the number of activated Android devices worldwide exceeded 900 million. The number of applications based on the Android system is also increasing, and these applications involve daily life, office entertainment, e-commerce and many other fields. Google claims that as of May 2013, the number of downloads of GooglePlay applications in the official Android electronic market reached 48 billion. At the same time, in addition to GooglePlay, there are many third-party electronic markets such as Amaz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55H04L29/06
Inventor 陶敬胡文君周文瑜赵双马小博
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products