Automatic detection method for malicious software

A technology for automatic detection and malware, applied in the fields of instruments, digital data processing, platform integrity maintenance, etc., can solve problems such as threats to user privacy and information security, and achieve the effect of protecting privacy and security

Active Publication Date: 2015-12-30
GUANGZHOU UNIPOWER COMP
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, malicious software has flooded the application market. Users who do not have common knowledge of software often cannot distinguish what is malicious software by themselves. It is easy to install malicious software, threatening user privacy and information security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic detection method for malicious software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Below in conjunction with accompanying drawing and specific embodiment, the present invention will be further described:

[0016] See figure 1 , the present invention relates to a kind of malware automatic detection method, and its preferred embodiment comprises the following steps:

[0017] Step A: Disassemble the application software to be detected to obtain all API (Application Programming Interface, Application Programming Interface) functions;

[0018] Step B: judging whether at least one API function is in the preset illegal API function database, if yes, execute step C; if not, execute step E;

[0019] Step C: Determine whether the API function is called, if so, execute step D; if not, execute step E;

[0020] Step D: According to the call path of the API function, it is judged whether the trigger mode of the API function is triggered by the user, if so, execute step E; if not, execute step F;

[0021] Step E: determine that the application software is legal a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An automatic detection method for malicious software comprises steps as follows: step A, to-be-detected application software is disassembled, and all API (application program interface) functions are acquired; step B, whether each API function is in a default illegal API function database is judged, and if yes, a step C is executed; otherwise, a step E is executed; step D, whether each API function is initially triggered by a user is judged according to a call path of the API function, and if yes, the step E is executed; otherwise, a step F is executed; step E, the application software is determined to be legal and normal; step F, the application software is determined to be malicious, and the application software is shielded and forbidden automatically. With the adoption of the automatic detection method for the malicious software, whether operating application software is malicious software can be detected automatically, the malicious application software is shielded and forbidden after detection, and privacy and security of the user can be further protected.

Description

technical field [0001] The invention relates to a malicious software automatic detection method. Background technique [0002] With the popularization of smart phones, various mobile application software brings convenience to people's life, but also buries certain security risks; Malicious software is published in the application market. At present, malicious software has flooded the application market. Users who do not have common knowledge of software often cannot distinguish what is malicious software by themselves. It is easy to install malicious software, threatening user privacy and information security. Contents of the invention [0003] Aiming at the deficiencies of the prior art, the present invention aims to provide a malicious software automatic detection method that can solve the above technical problems. [0004] To achieve the above object, the present invention adopts the following technical solutions: [0005] A malicious software automatic detection met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 袁进波
Owner GUANGZHOU UNIPOWER COMP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products