Method and device for detecting malicious code in intelligent terminal

A malicious code, intelligent terminal technology, applied in the field of intelligent terminal security, can solve problems such as personal data security, and achieve the effect of protecting security

Active Publication Date: 2014-04-30
BEIJING QIHOO TECH CO LTD
View PDF3 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, an increasing variety of malicious code attacks on mobile phones and increasingly serious personal data security issues have followed, and more and more mobile phone viruses have caused smartphone users to suffer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting malicious code in intelligent terminal
  • Method and device for detecting malicious code in intelligent terminal
  • Method and device for detecting malicious code in intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0035] Taking the Android (Android) operating system as an example, it includes an application program layer (app layer) and a system framework layer (framework layer). As for other layers that may be included in terms of functional division, the present invention will not discuss it. Among them, usually the app layer can be understood as the upper layer, which is responsible for the interface that interacts with the user, such as a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for detecting a malicious code in an intelligent terminal. The method comprises the steps of obtaining a virtual machine execution file of an application program from an application program layer of an intelligent terminal operation system; performing decompilation on the virtual machine execution file to obtain a decompiled function information structure; resolving the decompiled function information structure and extracting a function call sequence from the decompiled function information structure; utilizing a preset malicious code feature library, performing matching of the function call sequence and conforming that the virtual machine execution file of the application program includes the malicious code if the matching succeeds. By applying the method and the device, the malicious code including situation of the application program can be analyzed and confirmed through the virtual machine execution file of the application program, so that a tampered application program or malicious software can be searched and killed, and the safety of the intelligent terminal can be ensured.

Description

technical field [0001] The invention relates to the technical field of intelligent terminal security, in particular to a method and device for detecting malicious codes in an intelligent terminal. Background technique [0002] With the development of science and technology, smart terminals have more and more functions. For example, people's mobile phones have shifted from traditional GSM and TDMA digital mobile phones to smart phones that can handle multimedia resources and provide various information services such as web browsing, conference calls, and e-commerce. However, more and more types of malicious code attacks on mobile phones and increasingly severe personal data security issues have followed, and more and more mobile phone viruses have caused smartphone users to suffer. Contents of the invention [0003] In view of the above problems, the present invention is proposed to provide a method and device for detecting malicious codes in smart terminals that overcome ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/56G06F21/562
Inventor 杨康陈卓唐海
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products