Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Android software visualization safety analysis method based on module relations

A technology of security analysis and components, which is applied in the field of network technology and network security, can solve problems such as easy misjudgment, uneven programming level of developers, and multiple malware features, so as to reduce the misjudgment rate.

Active Publication Date: 2016-07-20
SHANGHAI JIAO TONG UNIV
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the complexity and diversity of current software functions, the uneven programming level of developers, and the different usage scenarios, it is inappropriate and easy to mechanically judge whether the software has malicious behavior based on software permissions or the process of private data transmission. cause misjudgment
[0005] In summary, the existing security-related program analysis methods for Android applications mostly use static analysis methods, which require more malware features and have a higher false positive rate.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android software visualization safety analysis method based on module relations
  • Android software visualization safety analysis method based on module relations
  • Android software visualization safety analysis method based on module relations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0044] The present invention aims at analyzing the source code file of the Android program package before the installation of the Android program package of the Android application software, by establishing a componentized description model of the Android software, and preprocessing the software source code according to the componentized description model Automated modeling, identifying components that may be attacked or leaking private data, performing component relationship analysis, and converting to Gr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an Android software visualization safety analysis method based on module relations.According to the method, module recognition is conducted on Android software source codes according to a standard module model, all Android modules are extracted, then all attributes of individual module are obtained through regulation matching engine analysis, automated module type modeling of Android software is achieved, software behavior is described in the modularized form, meanwhile, user privacy data serve as the core, privacy data and data leakage outlets are recognized, the weakness degree of each module is quantified, visualization description is conducted on possible privacy disclosure behavior of the software, module positions which is attacked by malicious applications possibly and the module calling relation, and visualization display of the software behavior with respect to safety is achieved.Artificial distinguishing of a user and a program analysis method are effectively combined, so that the user has more visualized knowledge about the software behavior related to privacy data, and the purpose of distinguishing safety of an application is achieved.

Description

technical field [0001] The invention relates to the field of network technology and network security, in particular to the security evaluation and analysis of application software in an Android mobile phone system, in particular to a visual security analysis method for Android software based on component relationships. Background technique [0002] With the rapid development of mobile Internet technology, the functions of smart terminals are rapidly increasing, making them gradually replace traditional desktops and become the next-generation computing platform. As the most popular smart terminal system, the Android system has entered important industries such as education, medical care, automobiles, and home furnishing from the initial field of smart phones. Since the Android system allows users to install a variety of rich applications by themselves, the functions of the Android system are constantly being upgraded and expanded. SMS, contacts and other important informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/563G06F2221/033
Inventor 潘理陈昊
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products