Method and device for detecting Android malicious application

A malicious application and detection method technology, applied in the field of mobile Internet, can solve problems such as low accuracy, and achieve the effect of improving accuracy and large detection range

Active Publication Date: 2015-02-04
SHENZHEN TENCENT COMP SYST CO LTD
View PDF5 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the traditional technology, since the simulated operation process is generated by random clicks of the machine, malicious behaviors triggered by specific operations cannot be detected, so the accuracy is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting Android malicious application
  • Method and device for detecting Android malicious application
  • Method and device for detecting Android malicious application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In one embodiment, such as figure 1 As shown, a method for detecting Android malicious applications, the method completely depends on a computer program, and the computer program can run on a computer system based on the von Neumann architecture.

[0024] The method includes the following steps:

[0025] Step S102, acquiring the input program file of the Android application.

[0026] The program file corresponding to the Android application is usually an apk file. In this embodiment, a file selection box component can be displayed. The user can select the apk file of the corresponding Android application in the local file through the file selection box for input, and then the input program file of the Android application can be obtained through the file selection box component.

[0027] In step S104, the program file is loaded through the Android emulator, and a log output function is added to the system link library and / or Android library functions corresponding to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for detecting an Android malicious application. The method comprises the following steps: obtaining an input program file of an Android application; loading the program file through an Android simulator, wherein a log output function is added into a system link library and/ or Android library function corresponding to the Android simulator; obtaining operation flow information input by a user, and operating the Android application according to the operation flow information; obtaining log information which is output by the log output function and corresponds to the operation flow information; and according to the log information, generating a detection result. In addition, the invention also provides a device for detecting the Android malicious application. Detection accuracy can be improved.

Description

technical field [0001] The invention relates to the technical field of mobile Internet, in particular to a method and device for detecting Android malicious applications. Background technique [0002] With the development of the mobile Internet, especially the rise of the Android mobile operating system, there are more and more malicious applications based on Android. Existing Android malicious application inspection tools usually modify the Android open source code, add log output functions to some sensitive operation functions, such as the SMS sending function sendTextMessage, etc., and then generate a simulated operation process by randomly clicking on the machine in the operating environment of the Android emulator , and identify Android malicious applications by analyzing the log files formed by simulating the operation process. [0003] However, the inventor has found through research that the Android malicious application detection method in the prior art has at leas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F11/36
CPCG06F21/563
Inventor 林桠泉
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products