Method and apparatus for malware detection

A malware, call graph technology, used in computer security devices, electrical components, instruments, etc.

Inactive Publication Date: 2016-08-17
NOKIA TECHNOLOGLES OY
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the problems described above and to overcome limitations that will be apparent upon reading and understanding the prior art, the present disclosure provides methods for effectively and efficiently detecting malware in an offline situation and / or at runtime

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for malware detection
  • Method and apparatus for malware detection
  • Method and apparatus for malware detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Examples of methods, apparatus, systems and computer programs for providing malware detection are disclosed. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the embodiments of the invention may be practiced without these specific details or with an equivalent arrangement. In other instances, well-known structures and devices are shown in block diagram form in order not to unnecessarily obscure the embodiments of the invention. Like reference numerals refer to like elements throughout.

[0026] In the following, a mobile device will be used as an example of a computing device compromised by malware, but other types of computing devices such as laptop computers, desktop computers, home automation and / or control devices are also possible. Also, mobile malware will be used in the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An approach is provided for providing an offline malware detection, and in addition a real-time malware detection. The offline malware detection may comprise: detecting at least one of function calling map of the application offline, wherein a function calling map records relationships of callings among functions called by the application; extracting patterns of the function callings of the application from the at least one function calling map; and comparing the extracted pattern with at least one basic pattern of normal applications. The real-time malware detection may comprises: running an application in a real environment; recording behaviors of the application at runtime of the application; extracting behavior patterns from the recorded behaviors; and comparing the extracted behavior patterns with at least one of basic patterns of normal applications or patterns previously recorded for the application.

Description

technical field [0001] The present invention relates generally to computer and network security. More specifically, the present invention relates to malware detection. Background technique [0002] Mobile devices have evolved into open platforms for executing various applications. An application, also referred to as an "app," generally refers to a software application executable on a computing device, such as a mobile device. Apps, especially mobile apps, for example, enhance many of our daily activities by instantly accessing vast amounts of information on the Internet and providing various functions. The rapid growth of mobile apps will play a key role in the success of the future mobile internet and economy. Today there are more than one million mobile apps and about 2000 new apps are launched into the market every day. [0003] However, mobile apps can be malicious, buggy, run unexpectedly or introduce security holes to mobile devices. Furthermore, malicious apps ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566G06F21/562G06F21/56H04L51/212
Inventor 闫峥
Owner NOKIA TECHNOLOGLES OY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products