Method for analyzing application, terminal and storage medium

A technology of application program and analysis method, applied in the field of information security, can solve the problem of high false positive rate and false negative rate of analysis, and achieve the effect of improving the accuracy rate

Active Publication Date: 2018-12-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF16 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of high false alarm rate and false negative rate in the analysis method analysis in the related art, the present invention provides an application program analysis method, terminal and storage medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for analyzing application, terminal and storage medium
  • Method for analyzing application, terminal and storage medium
  • Method for analyzing application, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the objectives, technical solutions and advantages of the present invention clearer, the embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0032] figure 1 It is a schematic diagram of an application scenario of an application analysis method provided by an embodiment of the present invention, refer to figure 1 , The application analysis method can be applied to the terminal 01, and the behavior analysis application 02 can be installed in the terminal 01. For example, the behavior analysis application 02 can be figure 1 "AA box" shown in. The behavior analysis application 02 can detect and analyze the behavior of the installed application in the terminal and the installation package of the downloaded application, and generate a behavior report of the application so that the user can understand the application in time based on the behavior report Security of the program.

[0033] In ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for analyzing an application, a terminal and a storage medium and belongs to the technical field of information security. The method comprises a step of creating a virtual running environment for a specified application in the terminal when obtaining a behavior analysis instruction for the specified application, a step of running the specified application in the virtual running environment and monitoring the behavior of the specified application in the process of running the specified application, and a step of recording the behavioral information of a sensitive behavior in a behavior report when the sensitive behavior is detected. Since the application runs in the virtual running environment created by the terminal, the function of the terminal and the security of user information are not affected. The application is virtually and locally run through the terminal, the sensitive behavior in the application can be comprehensively detected, and the accuracy of the analysis method is effectively improved.

Description

Technical field [0001] The present invention relates to the technical field of information security, in particular to an application program analysis method, terminal and storage medium. Background technique [0002] With the continuous development of Internet technology, the types of applications are becoming more and more abundant, and users are paying more and more attention to the security of applications. [0003] In the related technology, the user can upload the installation package of the specified application to the virus analysis system, and the virus analysis system can detect whether the installation package of the application includes preset sensitive functions through the method of static code analysis. The set sensitive function may be a function used to perform a sensitive behavior, and the sensitive behavior may include behaviors that endanger terminal functions and user privacy, such as calling a camera, making a phone call, file encryption, and obtaining call rec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/53
CPCG06F21/53G06F21/562G06F21/566G06F2221/033
Inventor 王斌宋兰齐
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products