Android platform malicious application detection method and device

A malicious application and detection method technology, applied in the direction of platform integrity maintenance, computer security devices, instruments, etc., can solve problems such as the influence of detection results, and achieve the effect of avoiding path coverage problems, overcoming limitations, and achieving accurate detection.

Active Publication Date: 2017-09-22
INST OF INFORMATION ENG CAS
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the traditional machine learning algorithm has a shallow model structure, which has a certain impact on the final detection results
[0007] In view of this, how to provide a method and device for detecting malicious applications on the Android platform, so as to avoid the path coverage problem existing in dynamic taint tracking, overcome the need for accurate modeling of the application operation process and the need to accurately obtain communication inf...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android platform malicious application detection method and device
  • Android platform malicious application detection method and device
  • Android platform malicious application detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0050] figure 1 A schematic flow diagram of a method for detecting malicious applications on the Android platform provided by an embodiment of the present invention is shown, as shown in figure 1 As shown, the method for detecting malicious applications on the Android platform in this embodiment is as follows.

[0051] 101. Call the FlowDroid to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an Android platform malicious application detection method and device. The method comprises the steps that a FlowDroid tool is called, and static data stream features of a to-be-detected Android application are extracted; an SUSI technology is utilized to process the static data stream features of the to-be-detected Android application, and feature vectors of a data stream of the to-be-detected Android application are generated; and the generated feature vectors of the data stream of the to-be-detected Android application are input into a deep belief network detection model trained in advance, and a detection result about whether the to-be-detected Android application is a malicious application is obtained. Through the Android platform malicious application detection method and device, an Android platform malicious application can be accurately detected, the path cover problem existing in dynamic stain tracking is avoided, the two major challenges that accurate modeling needs to be performed on an application running process and target components in communication among components need to be accurately acquired according to a static data stream analysis technology are overcome, accurate and comprehensive extraction of the Android application sensitive data stream is realized, and meanwhile the limitation existing when a detection model is constructed through a traditional shallow machine learning algorithm is overcome.

Description

technical field [0001] The invention relates to the technical fields of mobile security and machine learning, in particular to a method and device for detecting malicious applications on an Android platform. Background technique [0002] In the field of mobile smart terminals, there are a large number of malicious software, which can covertly obtain the private data stored on the device by the user without the user's awareness, and send it to the attacker's mailbox or server, which is harmful to the user's financial security and privacy. Security is a big concern. With the popularity of smart terminals on the Android platform, privacy theft attacks and malicious application detection technologies on Android smart terminals have attracted more and more attention. [0003] At present, the existing data flow analysis technologies for detecting malicious applications on the Android platform mainly include: dynamic taint tracking and static data flow analysis technologies. Dyna...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 朱大立金昊杨莹
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products