Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Android application safety analysis method based on sensitive behavior identification

An analysis method and security technology, applied in computer security devices, platform integrity maintenance, instruments, etc., can solve problems such as information not involved in code hiding, false negatives, low code coverage, etc., to improve accuracy, improve The effect of detection accuracy

Inactive Publication Date: 2016-02-17
NANJING UNIV
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantage of dynamic analysis is that it bypasses the problems of code dynamic loading and encryption encountered by static methods, but at the same time it has disadvantages such as low code coverage and false negatives
[0006] The machine learning method only captures the most intuitive features in the program code fragments, and does not involve the hidden information behind the code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android application safety analysis method based on sensitive behavior identification
  • Android application safety analysis method based on sensitive behavior identification
  • Android application safety analysis method based on sensitive behavior identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Process flow of the present invention such as figure 1 As shown, the main part is the feature extraction using the sensitive behavior analysis method. What needs to be done is to obtain the data that can be used by the support vector machine algorithm by analyzing the installation file APK of the Android application. For Android applications with known security, its features are obtained through analysis and organized as a training data set; for Android applications with unknown security, features other than security can be obtained through feature analysis, and these features are combined with data training As a result, its safety is predicted.

[0058] Step 1: The APK file cannot be analyzed directly, and Manifest.xml, class.dex, and layout.xml files related to the layout need to be obtained after decompression. These files cannot be directly used as the input for the next step of analysis. We need to use the tool dex2jar (http: / / sourceforge.net / projects / dex2jar / ) to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an Android application safety analysis method based on sensitive behavior identification. The Android application safety analysis method comprises the following steps: 1) obtaining and analyzing a source code; 2) obtaining sensitive behaviors; 3) extracting a UI (User Interface) text; 4) processing sensitive behavior data; 5) extracting feature values; 6) forming a training data set; and 7) analyzing safety. A relationship between the UI text and a sensitive API (Application Program Interface) is taken as the characteristics of machine learning, and accuracy for detecting the malicious applications of an Android platform is effectively improved.

Description

technical field [0001] The invention belongs to the field of software engineering, adopts a method for identifying sensitive behaviors of Android applications to analyze the security of Android applications, and can automatically, efficiently and accurately identify sensitive behaviors in Android applications starting from source codes. Background technique [0002] With the increasing number of people using smart phones, the security threats to smart phones are becoming more and more prominent. Among them, because of the openness of the Android platform and the wider access channels for Android applications, the security threats to smartphones on the Android platform are particularly serious. Therefore, malicious application detection for the Android platform has always been a hot spot in the industry and academia. [0003] Malicious applications may privately send paid text messages, install other applications without the user's permission, or steal user account informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/033
Inventor 许蕾缪小川李言辉徐宝文
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products