Method and system for detecting Android malicious application based on file access dynamic monitoring
A file access and malicious application technology, applied in the field of information security, can solve the problem that the method of Android malicious application software detection is not mature enough.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0093] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. It should be understood that the described embodiments are only some of the embodiments of the present invention, not all of them. example. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.
[0094] Such as figure 2 As shown, it is a schematic flowchart of a method for detecting Android malicious applications based on dynamic monitoring of file access according to an embodiment of the present invention. Now with examples, the method of the present invention is described in detail. The Android malicious application detection method based on file access dynamic monitoring of the present invention mainly involves the follo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 