Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Detection method for collusion behavior among Android third-party libraries

A detection method and behavioral technology, applied in the direction of instrumentation, computing, electrical digital data processing, etc., can solve the problems of collusion, impact, and slow detection speed of Android third-party libraries

Active Publication Date: 2018-10-26
HUAZHONG UNIV OF SCI & TECH
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Not only that, if there is collusion in third-party libraries, when these libraries are used by a large number of applications, it will have a more serious impact
[0004] In addition, since most of the analysis objects are paired applications when analyzing application collusion, the time complexity of detecting applications in pairs is O(n 2 ), the detection speed is slow
[0005] In general, there is no research on the detection of collusion between third-party libraries of Android applications. The existing research is more on the research and detection of application collusion. Risks already exist in the application, but these have been Existing technology cannot solve the collusion problem in Android third-party libraries, nor can it detect risks before they are introduced into the application. At the same time, there is still the problem of slow detection speed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method for collusion behavior among Android third-party libraries
  • Detection method for collusion behavior among Android third-party libraries
  • Detection method for collusion behavior among Android third-party libraries

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not conflict with each other.

[0064] Before describing the technical solution of the present invention, first briefly explain the related technical terms:

[0065] Android: A mobile operating system based on the Linux kernel, with its open features, has a relatively high market share in the mobile operating system market;

[0066] Android applications: applications running in the Android system, mainly developed by the Java language; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a detection method for a collusion behavior among Android third-party libraries. The method comprises the following steps that: obtaining an analysis pattern and a library fileused for storing an Android third-party library to be detected, and preprocessing the library file to obtain the basic information of the third-party library; according to the analysis pattern and the basic information, constructing a pseudo main function; according to the pseudo main function, constructing a calling flow graph, and analyzing the calling flow graph; according to the pseudo main function, constructing a data flow graph, and analyzing the data flow graph; and according to information obtained by analyzing the calling flow graph and information obtained by analyzing the data flow graph, carrying out matching analysis to obtain a detection result for the collusion behavior among Android third-party libraries. By use of the method, the detection of the collusion behavior amongAndroid third-party libraries and the data flow analysis of the Android third-party libraries can be realized, in addition, according to requirements, quickly analysis detection and deep analysis detection can be realized, detection speed is high, and library files of different formats can be detected.

Description

Technical field [0001] The invention belongs to the field of mobile security, and more specifically, relates to a method for detecting collusion behavior between Android third-party libraries. Background technique [0002] The openness and modular development of the Android ecosystem have led to the widespread use of third-party libraries in applications. This third-party library can reduce development time and provide applications with diverse functions to improve developer efficiency. However, since the main program and the third-party library may belong to different interest groups, while the third-party library brings benefits, it also brings certain security risks to users. [0003] A collusion attack is an attack that separates a combination of sensitive permissions and malicious behaviors into different applications. From the perspective of a single application, the applications participating in the collusion are usually regular applications, but they will be triggered after...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F21/55
CPCG06F21/556G06F21/562G06F2221/033
Inventor 李瑞轩张婧汤俊伟韩洪木辜希武代德顺涂建伟
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products