Static behavior analysis method of mobile smart terminal software

A mobile intelligent terminal and behavior analysis technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as seldom considering terminal characteristics and little behavior analysis, and achieve the effect of preventing threats, stable and efficient analysis

Inactive Publication Date: 2015-07-01
CHANGSHU RES INSTITUE OF NANJING UNIV OF SCI & TECH
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, at present, there are very few behavioral analyzes of software on mobile smart terminals, and the characteristics of the terminal itself are rarely considered.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Static behavior analysis method of mobile smart terminal software
  • Static behavior analysis method of mobile smart terminal software
  • Static behavior analysis method of mobile smart terminal software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0021] combine figure 1 , the present invention relates to a static behavior analysis method of mobile intelligent terminal software, the steps are as follows:

[0022] The first step is to obtain the software package by decompression, and then use reverse engineering and other means to obtain the source code of the software. Extract the software signature information, and compare the signature information by calculating the MD5 value.

[0023] 1. Extraction of signature information:

[0024] By extracting the MD5 check code of the signature file in each software package, and using the file name to form a key-value pair, the signature information is compared and analyzed one by one, so as to determine whether the software has been modified.

[0025] 2. Implementation method of software package signature comparison:

[0026] Analyze and obtain the information in the software package by observing and analyzing the software source code.

[0027] The second step,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a static behavior analysis method of mobile smart terminal software. The static behavior analysis method includes steps of decompressing and decompiling to obtain software source codes by comparing signatures and machine learning concept, extracting kind function calling information and signature information, comparing the signature information at cloud and generating characteristic vectors of numeric types by an SDK (software development kit) dictionary, reducing Weka attribute to obtain behavior characteristics finally, and finally analyzing static behavior of the software by the machine learning algorithm. Accuracy and detecting rate are guaranteed while malicious software behaviors can be more precisely detected. Meanwhile, potential safety hazards during operating of the software are avoided and software behaviors of the mobile smart terminal can be more stably and efficiently analyzed.

Description

technical field [0001] The invention belongs to software behavior analysis, in particular to a static behavior analysis method based on mobile intelligent terminal software. Background technique [0002] With the rapid development of mobile communication technology and the emergence of the mobile Internet, mobile smart terminals play an increasingly important role in our lives, enabling us to enjoy rich and convenient services. However, with the expansion of user scale and people's gradual understanding of this technology, the security threats faced by mobile smart terminals are becoming more and more serious, and the security issues caused by them have become one of the emerging research hotspots at home and abroad. Among the many security risks faced, the harm caused by malicious software occupies the vast majority. At present, there are some relatively mature methods for the identification and analysis of malware behavior at home and abroad, but the inherent characterist...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
Inventor 李千目李嘉张宏
Owner CHANGSHU RES INSTITUE OF NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products