Android mobile attack traceability method

An API calling and sensitive technology, applied in the computer field, can solve problems such as false negatives, inability to meet the traceability of mobile attacks, and difficulty in completely covering the program code in the execution path, so as to achieve the effect of improving accuracy

Inactive Publication Date: 2018-10-19
UNIV OF SCI & TECH OF CHINA
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The difficulty of dynamic detection is that the generated execution path is difficult to completely cover the entire program code, and some malicious applications will use some means, such as setting the time period for executing malicious behaviors, identifying whether they are in a virtual operating environment, etc., to avoid dynamic detection
The result of dynamic detection depends on whether the execution path is complete, which is prone to false positives
[0007] However, the existing methods for identifying Android malware cannot meet the purpose of mobile attack traceability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android mobile attack traceability method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0018] The embodiment of the present invention provides a method for tracing the source of an Android mobile attack. The method reads the list of rights items applied for by the malicious application program from the AndroidManifest.xml file of the malicious application program, and determines the sensitive authority by matching with the sensitive authority database; The data flow analysis tool extracts sensitive data flow pairs of malicious applica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an android mobile attack traceability method, which comprises the following steps that: reading a claim list applied by a malicious application from the AndroidManifest.xml file of the malicious application, and matching with a sensitive permission library to determine sensitive permission; utilizing a data stream analysis tool to extract the sensitive data stream pair of the malicious application, and extracting a sensitive API calling sequence characteristic, context information and constant information between the API calling sequence and the sensitive data stream pair in the sensitive data stream pair; and combining with each piece of information obtained in the above two steps, and utilizing a clustering or classified machine learning method to carry out tracking and traceability on the malicious application. By use of the method, the traceability of the malicious application can be realized, and development personnel or organizations are tracked.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a source tracing method for Android mobile attacks. Background technique [0002] With the rapid development of smart phones and wireless communication technologies, more and more users store personal information on their mobile phones, such information includes address book, geographical location, personal reading habits and even user bank card information, etc. Sensitive information can attract the attention of attackers. Attackers develop various malicious software to infect user devices and obtain users' personal information. Problems such as SMS harassment, extortion, malicious tariffs, and personal information leakage emerge in an endless stream. These malicious softwares have caused severe financial losses and privacy breaches. [0003] Due to its high degree of openness and customizability, the Android system occupies an absolute user market. According to statistics...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06K9/62G06N99/00
CPCG06F21/56G06F18/23H04W12/128
Inventor 程绍银楼松豪蒋凡
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products