Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious application detection method, device and computer-readable storage medium

A malicious application and detection method technology, applied in the field of mobile Internet, can solve the problems of low accuracy of detection methods, and achieve the effects of solving low accuracy, improving detection rate, and reducing false alarm rate.

Active Publication Date: 2021-08-10
NUBIA TECHNOLOGY CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to propose a malicious application detection method, device and computer-readable storage medium, aiming to solve the technical problem of low accuracy of traditional malicious application detection methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious application detection method, device and computer-readable storage medium
  • Malicious application detection method, device and computer-readable storage medium
  • Malicious application detection method, device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0037] In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention and has no specific meaning by itself. Therefore, 'module', 'part' or 'unit' may be used in combination.

[0038] Terminals may be implemented in various forms. For example, the terminals described in the present invention may include mobile phones, tablet computers, notebook computers, palmtop computers, personal digital assistants (Personal Digital Assistant, PDA), portable media players (Portable Media Player, PMP), navigation devices, portable Mobile terminals such as wearable devices, smart bracelets, and pedometers, and fixed terminals such as digital TVs and desktop computers.

[0039] In the following description, a mobile terminal will be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a malicious application detection method, device and computer storage medium. The malicious application detection method obtains the application authority information in known malicious applications, and obtains the authority between the application authority information according to preset rules. Relevance, and establish a permission signature database according to the permission correlation; when receiving an application detection instruction, obtain the permission request information of the target application; judge whether the target application is malicious according to the permission signature database and permission request information application. The present invention establishes frequent permission sets for malicious applications. And the application program is detected through the frequent permission set, so that the malicious program can be more accurately identified, the false positive rate of the normal software in the prior art is reduced, the detection rate of the malicious software is improved, and the problem of the traditional malicious application program is solved. The technical problem of low precision of the detection method.

Description

technical field [0001] The present invention relates to the technical field of mobile Internet, in particular to a detection method, device and computer-readable storage medium for malicious applications. Background technique [0002] The Android system is a completely open operating system, so it is easy to become an active site for many malicious application developers. Malicious application developers add malicious code to popular domestic and foreign applications and publish them on major forums and application stores. Since there is usually a large amount of user privacy information in smartphones, malicious applications in the Android system usually obtain private information on the user's mobile phone without explicitly prompting the user or without the user's permission, violating the legitimate rights and interests of the user. For example, the main malicious behaviors of malicious applications include: malicious fee deduction, privacy theft, remote control, malici...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/56G06F2221/2141
Inventor 梅俊
Owner NUBIA TECHNOLOGY CO LTD