Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious behavior trigger system and method for android software capable of simulating user behaviors

A technology that simulates users and behaviors, applied in the computer field, can solve the problems of low control traversal coverage, detection failure, and inability to resist malware detection of virtual machine environments, etc., to achieve comprehensive triggering, high traversal speed, and low system overhead.

Active Publication Date: 2017-06-20
XIDIAN UNIV
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a system and method for triggering malicious behaviors of Android software that simulate user behaviors, aiming to solve the problem that the existing mobile terminal user identity authentication system has a low traversal coverage rate of controls and cannot resist malicious software's impact on the virtual machine environment. Detection, simply click on the control to trigger the malicious behavior of the software, which will easily lead to the problem of detection failure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious behavior trigger system and method for android software capable of simulating user behaviors
  • Malicious behavior trigger system and method for android software capable of simulating user behaviors
  • Malicious behavior trigger system and method for android software capable of simulating user behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0041] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0042] Such as figure 1 As shown, the Android software malicious behavior trigger system simulating user behavior provided by the embodiment of the present invention includes: a user information collection module 1 , a user data mining module 2 , and a traversal engine module 3 .

[0043] The user information collection module 1 includes: an application uploading submodule, an application monitoring submodule, and a result feedback submodule; wherein:

[0044] Application upload sub-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious behavior trigger system and a malicious behavior trigger method for android software capable of simulating user behaviors. A technology of simulating a real environment change of a mobile phone of a user is added, so that triggering of malicious software behaviors in a dynamic detection technology is more efficient and difficulty is created for malicious software in identification of a simulator environment. The system comprises a user information collection module, a user data mining module and a traversal engine module. The method comprises the specific steps of collecting a user behavior characteristic quantity by a mobile client, storing and analyzing the user behavior characteristic quantity by a server, generating an associated data set of the user behavior characteristic quantity, uploading a to-be-tested APK file by a user, preprocessing the APK file, analyzing an application control by using software, generating a control tree traversal policy, starting control tree traversal by using a traversal engine, judging whether triggering is completed or not, and storing screenshots of different interfaces. The traversal coverage rate is higher, triggering of the malicious behaviors is more comprehensive and the traversal speed is higher.

Description

technical field [0001] The invention belongs to the field of computer technology, and in particular relates to a system and method for triggering malicious behaviors of Android software that simulate user behaviors. Background technique [0002] With the development of mobile phone intelligence, various application software appear in major application stores, and the corresponding mobile phone operating systems are also constantly updated. Today, the global market share of mobile operating systems is almost occupied by the Android operating system and the IOS operating system, and the usage rate of the Android operating system undoubtedly ranks first. The open source of the Android system has always been an advantage talked about by major users and mobile phone manufacturers, but because of this feature, the Android system has to face more serious security issues than the IOS system. According to statistics, one of every five to six mobile phones running the Android operati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 李晖李代琛赵兴文朱辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products