Unlock instant, AI-driven research and patent intelligence for your innovation.

Application malicious behavior detection method and device in Android system

An application program and Android system technology, applied in the computer field, can solve the problems of overlay security risks, defrauding users of money, stealing user information, etc.

Active Publication Date: 2020-04-07
TSINGHUA UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Therefore, in the current popular Android system, there is such a security risk about Overlay. The cooperation between the Overlay of the display interface and the Overlay of receiving events can affect the user's judgment on the interactive application program currently in the foreground, thus causing some misunderstandings of the user. Malicious programs can use user misoperations to open some sensitive permissions and functions to steal user privacy, and even achieve the purpose of defrauding users of money
[0004] Therefore, it is necessary to provide a detection method to solve the detection problem of malicious programs that steal user information through malicious windows.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application malicious behavior detection method and device in Android system
  • Application malicious behavior detection method and device in Android system
  • Application malicious behavior detection method and device in Android system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The invention will be described below in connection with an exemplary system.

[0036] It should be noted that the Android window overlay in this article refers to the overlay of one view on another view in the Android system, also known as android overlay. It should be noted that the android overlay in this article is different from the android overlay mechanism , the Android overlay mechanism is to allow resource files in the custom framework and package to realize resource customization without modifying the apk in the packages. In this article, it refers to the situation where the View of the floating window covers another View.

[0037] Such as figure 1 As shown, the present invention provides a method for detecting malicious behaviors of applications in the Android system, including:

[0038] S101. An input instruction is detected. If an input instruction is detected, then S102 detects whether there is a window overlay. If so, S103 detects the window W displayed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a detection method and equipment for an application program malicious act in an Android system. The detection method and equipment are used for detecting a malicious program through which user information is stolen by use of superposed windows. According to the method, if an input instruction is detected, whether window superposition exists is detected; if yes, a window W displayed at the top layer and an application program X corresponding to the window W displayed at the top layer are detected according to preset detection content; and whether window superposition is malicious is judged according to the detection result. Whether the appearance of the window W is malicious is judged according to properties and acts of the window W and the application program X, andtherefore the malicious program through which the user information is stolen by use of the superposed windows is detected.

Description

technical field [0001] The invention relates to computer technology, in particular to a method and device for detecting malicious behaviors of application programs in an Android system. Background technique [0002] Android's system Overlay can superimpose a view in front of the current view of the application. The view can be divided into two types: visible and invisible. If the overlay View is artificially set without any content and the background is transparent, these Views It can become an invisible object. Such an invisible View can have certain functions by adding some other attributes. For example, you can add a type attribute that is always in front of it to make it appear in all application windows of the current Android system. Before; it is also possible to add a flag attribute that captures events other than its interface so that it can capture the user's click event on the screen and so on. [0003] Therefore, in the current popular Android system, there is su...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
Inventor 严宇轩李振华
Owner TSINGHUA UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More