Unlock instant, AI-driven research and patent intelligence for your innovation.

Malware detecting device and method

A malware detection device technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as the huge number of APIs, the inability to realize automatic detection, and the inability to cope with a large number of software samples, so as to improve model training efficiency effect

Inactive Publication Date: 2018-04-24
SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although the permission features adopted by the detection method based on data mining are easy to extract, because the permissions declared by the application may not be used in practice, and some studies have shown that there are a large number of application software abuse permissions, so the permission is directly used as a feature to describe the application behavior. , the reliability is not good, and the use of API features is faced with the problem of a large number of APIs. It is necessary to rely on manual selection of some APIs as features, and it is impossible to achieve fully automated detection.
In addition, most of the malware detection methods in the prior art are based on a stand-alone version, which cannot cope with a large number of software samples.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malware detecting device and method
  • Malware detecting device and method
  • Malware detecting device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] see figure 1 , is a schematic structural diagram of a malware detection device according to an embodiment of the present invention. The malicious software detection device in the embodiment of the present invention includes a decompilation module, a feature extraction module, a feature formatting module, and a model training and detection module. The decompilation module is used to decompile the application software installation package (APK, AndroidPackage) to obtain the smali file therein; the feature extraction module is used to extract the API feature file from the smali file; the featu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the technical field of security detection, in particular to a malware detecting device and method. The malware detecting device comprises: a decompiling module which is used for decompiling an input application software installing package to obtain a smali file; a feature extracting module which is used for extracting an API (Application Programming Interface) signature file from the smali file; a feature formatting module which is used for formatting the extracted API signature file into a set file format; and a model training and detecting module which is used for training a random forest classifying model through the formatted API signature file and detecting malware through the random forest classifying model. The device disclosed by the invention has the advantages that the device is not interfered by the abuse of application software authority and the whole training and detecting process is automated with no need for the manual selection of APIs;and distributed random forests are introduced to effectively cope with the model training when large amount of malware serves as samples and improve the model training efficiency.

Description

technical field [0001] The invention relates to the technical field of security detection, in particular to a malicious software detection device and method. Background technique [0002] In recent years, the rapid development of mobile smart terminals has greatly changed people's habits of using mobile phones. Mobile phones are no longer just used to make and receive calls, but have penetrated into all aspects of personal life. At the same time, more and more personal privacy is stored in the mobile phone. Once the mobile phone is invaded by malicious software, it may face hazards such as theft of mobile phone information, theft of account numbers, and passwords, resulting in loss of personal property or interests. Or due to the illegal operation of the malicious program in the background, the function of the mobile phone is abnormal, affecting the normal use of the user. [0003] As one of the current popular smartphone operating systems, Android has a very high market sh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 蔡芷铃赵鹤张巍姜青山
Owner SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI