Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Android malicious software detection method based on program slicing technology

A technology of program slicing and detection method, applied in computer security devices, instruments, electrical digital data processing and other directions, can solve problems such as large energy consumption, and achieve the effects of high accuracy, clear logic structure, and strong flexibility

Inactive Publication Date: 2014-08-06
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The usual solution is to use sandboxes and virtual machines to simulate execution programs, but this also brings greater energy consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android malicious software detection method based on program slicing technology
  • Android malicious software detection method based on program slicing technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The malware detection method based on program slicing starts from source code analysis, uses the idea of ​​complex networks, and combines AndroidSDK classes and function dictionaries. The specific implementation steps are as follows:

[0028] Step 1 Obtain the APK file of the Android application. The APK file is the installation file of the Android application, which can be directly downloaded from Google's official application market and third-party Android application markets (such as Android market, App Exchange, etc.).

[0029] Step 2 decompile the APK file in step 1 to get the .class file. Use the Eclipse plug-in JadClipse to decompile the APK file to get the .class file, and you can easily view the source code of the Android application.

[0030] Step 3 uses the Java program slicing technology to obtain the system dependency graph of the .class file generated in step 2. The system dependency graph is a directed and marked multigraph composed of a program depende...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides the design scheme of an Android malicious software detection method based on a program slicing technology. According to the scheme, starting from an installation file APK of an installation application, source codes of the application are analyzed through the program slicing technology, key nodes affecting the safety of the application are found out, Android malicious software is detected, and the purpose of reducing manual operation is achieved. The test result shows that the Android malicious software detection method based on the program slicing technology can reliably detect the Android malicious software; the method based on the program slicing is more accurate than a traditional detection method; the Android malicious software is analyzed from the angle of the source codes, and flexibility is higher for continuously updated viruses and Trojan variants.

Description

technical field [0001] The invention provides a design scheme of an Android malware detection method based on program slicing technology, which mainly solves the problem of key node discovery involved in the application of program slicing technology to the Android platform, and belongs to the field of information security of the Android system. Background technique [0002] With the rapid development of the mobile Internet, smart phones with mobile operating systems have become the mainstream of mobile terminal development. Smartphones are no longer traditional communication tools. Like handheld computers, smartphones already have an independent operating system, and users can install or uninstall applications provided by third-party developers such as QQ, Baidu Maps, and Mobile Security Guard. To expand the functions of mobile phones. Among them, the Android mobile terminal operating system based on the Linux kernel has developed the fastest. Due to its open source nature,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 张迎周孙韦翠仉雪玲孙健高海燕汪洋龙昊丁磊
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products