Anti-detecting method and device of terminal simulator system

A terminal simulation and simulator technology, applied in the field of Internet security, can solve problems such as the difficulty of analysis work and the inability of terminal simulators to confirm malicious environments, so as to avoid deliberately hiding their own characteristics.

Inactive Publication Date: 2014-11-05
BEIJING QIHOO TECH CO LTD +1
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, the terminal emulator cannot confirm the hostile environment, making analysis more difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-detecting method and device of terminal simulator system
  • Anti-detecting method and device of terminal simulator system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages ​​can be used to implement the contents of the present invention described herein, and the above description of specific languages ​​is for disclosing the best mode of the present invention.

[0029] figure 1 It is a schematic diagram of an anti-detection device 100 of a terminal emulator system according to an embodiment of the present invention. The anti-detection device 100 of the terminal emulator system can be installed in a computing device running a terminal emulator system, such as a personal computer, a server, mobile ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anti-detecting method and device of a terminal simulator system. The anti-detecting method of the terminal simulator system comprises the steps of acquiring multiple system parameters describing simulation terminal information in a terminal simulator and parameter values of the system parameters; respectively matching the parameter values of the system parameters with preset default parameter values stored in a parameter base, wherein multiple default parameter values identified as simulator information are stored in the parameter base; revising the matched parameter values of the system parameters as numerical values which are different from the default parameter values and conform to a system parameter assignment rule in an actual operation environment of a terminal. By means of the anti-detecting method, the parameter values of the system identified as the simulator information of the current terminal simulator can be revised, detection measures of malicious applications lose efficacy, detection on application software operating in the terminal simulator is evaded, and the application software can be detected fully to analyze operating characteristics.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to an anti-detection method and an anti-detection device of a terminal emulator system. Background technique [0002] The widespread popularity of smart terminals such as mobile phones has brought great convenience to people's daily life, followed by the generation of a large number of malicious applications, which can disguise as ordinary third-party applications to steal user information, Stealing the account has brought great security risks to the user's property. [0003] In order to eliminate the influence of malicious applications, it is necessary to conduct an in-depth analysis of malicious applications to obtain their characteristics, such as file information of malicious applications, files or data generated when malicious programs are running, and operating system permissions of malicious programs. The calls, etc. are analyzed to obtain its characteristics. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 张东谊谢军样
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products