Method, device, client and server for detecting malicious APK

A client and server technology, applied in the field of network security, can solve the problems of frequent update of signature database and inability to identify malware, etc., to prevent the installation of Trojan horses and virus programs, improve experience, and improve security

Active Publication Date: 2015-04-15
三六零数字安全科技集团有限公司
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The signature-based detection scheme has the following disadvantages: 1. It has hysteresis and cannot identify unknown malware; 2. The bytecode signature is easily changed through encryption and obfuscation, resulting in frequent update of the signature database

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, client and server for detecting malicious APK
  • Method, device, client and server for detecting malicious APK
  • Method, device, client and server for detecting malicious APK

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0046]Embodiments of the invention are applicable to computer systems / servers that are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments and / or configurations suitable for use with computer systems / servers include, but are not limited to: personal computer systems, server computer systems, thin clients, thick clie...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device, a client and a server for detecting a malicious APK. The method comprises the following steps: statically analyzing one APK; disassembling at least one functional module from the APK according to a logic function; with regard to the functional module, judging whether the functional module has a process of interacting with a user or not when realizing the function; if not, determining that the functional module has risks; and if so, determining that at least one functional module in the APK has risks, namely determining the APK to be the malicious APK. The operation rule is carried out based on the malicious APK under the condition that a user does not know the condition, and whether each functional module of the APK is interacted with the user or not is judged so as to determine the safety grade of the APK. The method, which can be used for heuristically and directly detecting the malicious APK, is provided, and the detection of the unknown APK can be realized.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, device, client and server for detecting malicious APK. Background technique [0002] In recent years, with the development of the Android system and the popularity of Android devices, Android has become the operating system most concerned by malware developers. Malware developers embed malware codes into normal applications by modifying popular applications, and then release APKs containing malicious codes through third-party software stores or forums. At present, malicious software mainly takes advantage of system security loopholes in the operating system to steal users' mobile phone bills and private data, such as text messages, emails, and address books, by privately registering for paid services, deleting reminders or confirming text messages. Seriously endanger the user's information and property security. [0003] In the prior art, the signature-based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/563G06F2221/033
Inventor 李伟
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products