Android application program risk assessment method based on dynamic monitoring

A technology of dynamic monitoring and application programs, applied in the field of information security, can solve problems such as the inability to detect unknown malicious programs, and achieve the effect of detecting potential safety hazards

Inactive Publication Date: 2014-07-16
SOUTHEAST UNIV
View PDF3 Cites 67 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The number of malicious programs is huge and growing, and many malicious variants may be derived at the same time. Detecting malware through signature codes requires a larger signature database. More importantly, signature detection cannot detect unknown malicious programs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android application program risk assessment method based on dynamic monitoring
  • Android application program risk assessment method based on dynamic monitoring
  • Android application program risk assessment method based on dynamic monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Below in conjunction with specific embodiment, further illustrate the present invention, should be understood that these embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various equivalent forms of the present invention All modifications fall within the scope defined by the appended claims of the present application.

[0022] Such as figure 1 Shown is the overall architecture diagram of the present invention, including a dynamic monitoring module and a risk assessment module.

[0023] The dynamic monitoring module injects the monitoring code into the memory space of the system target process ServiceManager, intercepts the Binder IPC data of the inter-process communication, and collects the behavior characteristic information of the application application service. The injection of dynamic monitoring code includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Android application program risk assessment method based on dynamic monitoring, and belongs to the technical field of information safety. The method comprises the steps that firstly, monitoring codes are dynamically injected to a ServiceManager system process, and the aim of monitoring behaviors is achieved by monitoring an application service of an application program; then the risk grade of the application program is determined according to the behavior features of the application program, wherein the behavior features comprise whether a sensitivity operation is executed or not, whether operating is carried out in a background or not, whether operation frequency exceeds a certain threshold value or not and the like. The risk is divided into five grades, and meanwhile a white list and black list mechanism is set up to improve efficiency and accuracy. According to the method, maliciousness of unknown (malicious) software can be predicated, and potential safety hazards of an Android platform can be detected.

Description

technical field [0001] The invention relates to a dynamic monitoring-based Android application risk assessment method, which belongs to the technical field of information security. Background technique [0002] With the rapid development of the mobile Internet, smart terminals have become an important access point for people's life or work, carrying more and more users' personal privacy data. As the most active mobile terminal platform in the world, the Android platform is the primary target of malicious attackers. At present, there are various types of software on the Android platform, and malicious software emerges in an endless stream and is highly concealed. In addition, some companies use applications to collect user privacy data in the background due to business needs and the need for big data analysis. [0003] Commonly used malware detection methods are mainly based on signatures, but this method has certain limitations. The number of malicious programs is huge an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/033
Inventor 秦中元郑勇鑫
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products