An Android application maliciousness detection method based on application behaviors

A detection method and malicious technology, applied in the field of Android application detection, can solve problems such as difficult unknown application analysis, inability to learn complex information representation, difficult problems, etc., to achieve automatic classification learning, avoid path explosion problems, and reduce analysis time Effect

Active Publication Date: 2019-06-18
NANJING UNIV OF SCI & TECH
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such methods often rely too much on people's subjective consciousness, and the selected features are mostly coarse-grained features, making it difficult to describe specific behaviors.
[0005] Due to the problem of path explosion and path integrity in the static analysis of all execution paths of Android applications, the current methods for behavior analysis in Android applications usually only focus on a specific feature in the behavior, but do not analyze the execution path of the application. Although this method can detect some Android malicious applic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Android application maliciousness detection method based on application behaviors
  • An Android application maliciousness detection method based on application behaviors

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0019] The present invention provides a static analysis method for Android application behavior analysis. Aiming at the characteristics of the Android system, it uses Android application function call graphs and control flow graphs, and adopts reverse analysis and program slicing technology to extract malicious behaviors in Android applications. Finally, combined with the deep learning model, the behavior of Android applications is detected for maliciousness.

[0020] The principle of the present invention is: because malicious functions are usually hidden in legitimate function codes, the inherent multi-component and event-driven features of the Android system make the malicious function codes more fragmented and more concealed, which intensifies the analysis of malicious functions of Android applications. Difficulty. The present invention firstly uses static analysis technology to analyze the control flow and data flow of the Dalvik executable file (dex file) of the Android app...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Android application maliciousness detection method based on application behaviors. Aiming at the characteristics of an Android system, factors in the aspects of a componentlife cycle, an asynchronous call function, a call relation between components and the like in Android are considered, and corresponding processing is carried out on the factors, so that the integrityof analysis is ensured, and therefore, a complete control flow graph and a complete function call graph of the Android application can be obtained. And then by defining a safety sensitive function andcombining a reverse analysis technology and a program slice analysis technology, reliable safety sensitive behavior path information is obtained. And finally, by using the convolutional neural network of one of the deep learning models, the extracted behavior paths are trained and classified, and the trained model can carry out maliciousness detection on an unknown Android application. Accordingto the invention, all behavior paths which may be related to malicious behaviors in the Android application can be effectively extracted; and the key information in the behavior path is stored for subsequent analysis, and the behavior path can accurately describe the specific behavior of the application, so that the analysis model based on the behavior path has better detection precision.

Description

technical field [0001] The invention belongs to an Android application detection method, in particular to a static analysis-based Android application malicious detection method, combining the advantages of the accuracy of the behavior path information description and the automatic feature extraction of the convolutional neural network to ensure the Android application malicious detection accuracy. . Background technique [0002] The Android system is an operating system for mobile terminals launched by Google. Its inherent open source and customizability make the usage rate and market share of the Android system rise rapidly. According to data from Kantar Worldpanel, a foreign market data research company, in the first quarter of 2017, the market share of Android mobile phones in China rose to 86.4%, making it the system with the largest share of mobile terminal operating systems. [0003] Due to the large number of mobile phone users of the Android system, the development...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06N3/04G06N3/08G06F8/53
Inventor 俞研黄兴远苏铓黄婵颖付安民王永利
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products