Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for automatic program analysis based on strategy

An automated program and analysis system technology, applied in the field of system security, can solve problems such as waste of computing resources, false negative reports of malicious behavior, inability to schedule real-time dynamic analysis modules, etc., and achieve the effect of improving analysis efficiency and accuracy

Active Publication Date: 2016-11-23
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the scheduler cannot use the knowledge of static analysis, it can only continue to assign tasks to the dynamic sandbox according to the output of static analysis, thus wasting precious computing resources
Another scenario is that due to the limitations of the Android emulator, some software cannot run normally in the emulator under certain conditions. The dynamic analysis based on the emulator may miss malicious behaviors, and the real machine dynamic analysis module needs to be detected separately. , but because the scheduler cannot obtain this information, it cannot schedule the real machine dynamic analysis module

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for automatic program analysis based on strategy
  • System and method for automatic program analysis based on strategy
  • System and method for automatic program analysis based on strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] A method and system for automatically detecting Android malware based on policy scheduling tasks will be described in detail below with reference to the accompanying drawings, but the present invention is not limited to the following embodiments.

[0025] The overall structure of this embodiment is as follows figure 2 As shown, the system mainly includes three parts structurally: data source, four Android application analysis units, and scheduling management program, which includes scheduling program and configuration program. The data source is the Android software crawling module, and the Android software is output as the input task of the Android application analysis unit; the Android application analysis unit includes the following four types: dynamic UI detection module, static analysis module, dynamic stain tracking module, real machine detection module, During operation, 0 to several modules of each type can be parallelized.

[0026] In this embodiment, the XML...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a system and a method for automatic program analysis based on a strategy. The system comprises a data source, analysis units, and a dispatching management program. The data source is a set of to-be-analyzed software. The analysis unit is a packaged software analysis module, and is used to communicate with a scheduler, to complete program security analysis of a certain method or a certain stage of assigned software. The dispatching management program is used to configure an analysis strategy, and realizes dispatching and management of an analysis task through analyzing the configured analysis strategy and monitoring states of the plurality of analysis units, to form effective joining and combination of each analysis unit. Through the pre-configured strategy and global task dispatching, a plurality of analysis modules or a plurality of analysis stages are automatically joined, so as to realize a complete, efficient, and automatic analysis process of a program.

Description

technical field [0001] The invention relates to the technical field of system security, in particular to a strategy-based automatic program analysis system and method. Background technique [0002] With the rapid development of computers and smart terminals, and the increasing popularity of the Internet and mobile Internet, software has become an indispensable part of people's daily life and work. However, at the same time, more and more malicious software and vulnerable software have appeared, which have brought various direct or indirect threats and harms to software users and the whole society. [0003] Malicious software, especially mobile phone malware, poses a hazard to the property and privacy information security of users. For example, the malicious deduction of mobile phone malware has accounted for a very high proportion of various harmful behaviors. The "black economic chain" of malicious deduction of mobile phone bundled software was also exposed at the CCTV 315...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
Inventor 朴爱花龚晓锐王伟周建华霍玮孙丹丹邹维
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products