A file processing method

A file processing and file technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as unproposed solutions, behavior sequence feature code obfuscation technology, etc., to achieve the effect of reducing feature size, resisting interference, and improving computing efficiency

Active Publication Date: 2017-12-08
四川神虎科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can identify changes in application code, but the extraction of behavioral sequence features is easily affected by code obfuscation techniques, so it has certain limitations when analyzing practical problems
[0003] Therefore, for the above-mentioned problems existing in related technologies, effective solutions have not yet been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A file processing method
  • A file processing method
  • A file processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0018] figure 1 is a flowchart of a file processing method according to an embodiment of the present invention. A camouflage recognition method for application installation files is proposed. By analyzing the attributes of applicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a file processing method, the method includes: selecting a predefined type of feature file from the installation file, the predefined type of feature file includes interface description file, audio file and image file, using the feature extraction step to extract Based on the features of the feature file, it is identified whether the installation file is disguised by comparing the similarity with a preset threshold. The invention proposes a kind of file processing, which is identified by extracting the content features of application installation files, and can effectively resist the interference caused by the camouflage and malicious modification of files and directories, and use the feature extraction process to reduce the feature scale of file content and improve the operation efficiency.

Description

technical field [0001] The invention relates to file processing, in particular to a method for safely processing application installation files. Background technique [0002] In the field of mobile applications, developers submit applications to the application market, and users download applications through the application market. However, the existence of malicious software is still unavoidable in the official market; the security mechanism is not perfect, resulting in a high proportion of malicious software. Among them, embedding known code and disguising application installation files are the main threats. Existing technical solutions use decompilation tools or dynamic behavior analysis tools to obtain application behavior sequences, preprocess the behavior sequences to obtain behavior sequence features, and obtain quantitative data on whether the application is camouflaged by comparing the distance between the behavior sequence features. This method can identify chang...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
Inventor 罗阳陈虹宇王峻岭
Owner 四川神虎科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products