Method and device for detecting malicious code

A malicious code and detection module technology, applied in the field of malicious code detection, can solve problems such as the huge variety of plug-in programs and the inability of protection software to completely prevent plug-in program intrusion, and achieve the effect of accurate judgment.

Active Publication Date: 2017-06-13
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF9 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the large number of applications, the types of corresponding plug-in programs are also very complex, and the intrusion principles of malicious codes are also emerging one after another. As a result, even if the protection software is frequently updated, the intrusion of plug-in programs cannot be completely eliminated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting malicious code
  • Method and device for detecting malicious code
  • Method and device for detecting malicious code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Specific embodiments of the present disclosure will be described in detail below. It should be noted that the embodiments described here are for illustration only, and are not intended to limit the present disclosure.

[0020] The following examples are used to illustrate the present disclosure, but not to limit the scope of the present disclosure.

[0021] In this disclosure specification, malicious code refers to any code that is added and run in conjunction with the application without authorization by any third party other than the original provider of the application, regardless of the purpose of adding this part of the code. On the other hand, a plug-in program refers to the manifestation of malicious code when running together with the original application program or alone, and the plug-in program and malicious code may be used interchangeably in the following description unless otherwise specified.

[0022] As mentioned above, in the prior art, there are endles...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for detecting a malicious code which is applied to a client program operating on a terminal. The method comprises the steps of responding to an operation request received by the client program, and carrying out one or more steps selected from the following groups to determine whether or not there is a malicious code: detecting whether or not a system application file of an operation system starting the terminal is legal; detecting whether or not there is an illegal program package name in an installation package manager provided by the operation system; detecting whether or not there is a file name in a preset blacklist in a file loaded in a process space of the operation system; transversing a key application program interface API in a current running process on the terminal, and detecting whether or not method type identification of the key API is legal.

Description

technical field [0001] The present disclosure relates to the technical field of mobile terminals, and in particular to a method and device for detecting malicious codes. Background technique [0002] With the development of mobile terminal technology, more and more users choose to use various applications downloaded from mobile terminals to complete various matters related to daily life and even work, such as payment, shopping, scheduling and so on. Correspondingly, more and more merchants choose to provide applications to provide users with various services, such as news, social networking, food delivery, and so on. On a terminal using an open operating system such as Android (Android), applications may be invaded by malicious codes to cause adverse effects. For example, some users will deliberately download and install plug-in programs illegally provided by third parties (such as based on the xposed architecture) for the purpose of grabbing tickets and swiping orders. The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F2221/033
Inventor 李晓阳吴坤
Owner BEIJING SANKUAI ONLINE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products