Malicious program detection method and device, computing device and computer storage medium

A malicious program and detection method technology, which is applied in the field of application security, can solve the problems of virus variants, malicious program generation, and detection personnel are not easy to find malicious programs, etc., and achieve the effect of accurate virus detection

Inactive Publication Date: 2019-04-16
JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD
View PDF11 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are at least the following deficiencies in the prior art: some malicious programs modify APK characteristic parameters (such as file names) to parameters that do not have obvious malicious characteristics, so that malicious programs generate virus variants, making it difficult for detectors to find the malicious program, namely : Not all malicious programs will have such obvious characteristic parameters; when virus variants occur due to means such as repackaging, the APK characteristic parameters in the malicious program to be detected, such as: when MD5 changes, the existing technical solutions will not will detect the pending APK
Therefore, the judgment method adopted in the prior art is too simple, the judgment result is inaccurate, and misjudgment is likely to occur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious program detection method and device, computing device and computer storage medium
  • Malicious program detection method and device, computing device and computer storage medium
  • Malicious program detection method and device, computing device and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0026] figure 1 A flow chart of a method for detecting a malicious program according to an embodiment of the present invention is shown. Such as figure 1 As shown, the method includes:

[0027] Step S101: When the program to be tested is running, monitor the instruction features of the program to be tested; the instruction features at least include the method call sequence to be tested, and / or the instruction sequence to be teste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious program detection method and device, a computing device and a computer storage medium. The method comprises the steps that when a to-be-detected program is operated, instruction characteristics of the to-be-detected program are monitored; wherein the instruction feature at least comprises a to-be-tested method calling sequence and/or a to-be-tested instruction sequence corresponding to each method; matching the to-be-tested method calling sequence with a reference method calling sequence of a known malicious program; and/or matching the to-be-tested instruction sequence corresponding to each method with a reference instruction sequence of a known malicious program; and determining whether the to-be-detected program is a malicious program or not accordingto a matching result. According to the scheme provided by the invention, whether the program to be detected is a malicious program is determined from the level of the to-be-detected method calling sequence and/or the to-be-detected instruction sequence of the program to be detected, so that virus detection can be accurately carried out on the program to be detected including malicious variant viruses caused by means of repackaging and the like.

Description

technical field [0001] The invention relates to the technical field of application security, in particular to a malicious program detection method, device, computing device and computer storage medium. Background technique [0002] While applications provide a large number of convenient services for the society, various security issues and industry chaos also emerge in an endless stream, such as malicious charging, SMS phishing, stealing payment information, stealing personal privacy, remote control, traffic consumption, system damage, etc. These behaviors seriously endanger the user's privacy and property security, and programs that have the above-mentioned behaviors that endanger user privacy and property security are malicious programs. In general, malicious programs can refer to programs that are installed and run in mobile terminal systems without the user's knowledge or authorization to achieve certain illegitimate purposes, or programs that violate relevant national l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 汪德嘉华保健邵根波赵迪
Owner JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products