Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Android application maliciousness detection method based on application behaviors

A detection method and malicious technology, applied in the field of Android application detection, can solve problems such as difficult unknown application analysis, inability to learn complex information representation, difficult problems, etc., to achieve automatic classification learning, avoid path explosion problems, and reduce analysis time Effect

Active Publication Date: 2019-06-18
NANJING UNIV OF SCI & TECH
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such methods often rely too much on people's subjective consciousness, and the selected features are mostly coarse-grained features, making it difficult to describe specific behaviors.
[0005] Due to the problem of path explosion and path integrity in the static analysis of all execution paths of Android applications, the current methods for behavior analysis in Android applications usually only focus on a specific feature in the behavior, but do not analyze the execution path of the application. Although this method can detect some Android malicious applications to a certain extent, it cannot accurately describe specific malicious behaviors, and it is difficult to adapt to the analysis of unknown applications.
In addition, if only the fine-grained description and analysis of the application behavior is carried out at the code level, although the behavior description becomes more accurate, it is impossible to use a simple machine learning model for training and classification, because the shallow machine learning model has limited expressive ability and cannot learn Representation of such complex information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Android application maliciousness detection method based on application behaviors
  • An Android application maliciousness detection method based on application behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention provides a static analysis method aimed at Android application behavior analysis. Aiming at the characteristics of the Android system, Android application function call graphs and control flow graphs are used, and reverse analysis and program slicing techniques are used to extract malicious behaviors that may be contained in Android applications. The complete behavior path of the Android application is finally combined with the deep learning model to detect the maliciousness of the behavior of the Android application.

[0020] The principle of the present invention is: because malicious functions are usually hidden in legal function codes, and the inherent multi-component and event-driven features of the Android system make malicious function codes more fragmented and more concealed, which intensifies the analysis of malicious functions of Android applications. difficulty. The present invention first uses the static analysis technology to analyze t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Android application maliciousness detection method based on application behaviors. Aiming at the characteristics of an Android system, factors in the aspects of a componentlife cycle, an asynchronous call function, a call relation between components and the like in Android are considered, and corresponding processing is carried out on the factors, so that the integrityof analysis is ensured, and therefore, a complete control flow graph and a complete function call graph of the Android application can be obtained. And then by defining a safety sensitive function andcombining a reverse analysis technology and a program slice analysis technology, reliable safety sensitive behavior path information is obtained. And finally, by using the convolutional neural network of one of the deep learning models, the extracted behavior paths are trained and classified, and the trained model can carry out maliciousness detection on an unknown Android application. Accordingto the invention, all behavior paths which may be related to malicious behaviors in the Android application can be effectively extracted; and the key information in the behavior path is stored for subsequent analysis, and the behavior path can accurately describe the specific behavior of the application, so that the analysis model based on the behavior path has better detection precision.

Description

technical field [0001] The invention belongs to an Android application detection method, in particular to a static analysis-based Android application malicious detection method, combining the advantages of the accuracy of the behavior path information description and the automatic feature extraction of the convolutional neural network to ensure the Android application malicious detection accuracy. . Background technique [0002] The Android system is an operating system for mobile terminals launched by Google. Its inherent open source and customizability make the usage rate and market share of the Android system rise rapidly. According to data from Kantar Worldpanel, a foreign market data research company, in the first quarter of 2017, the market share of Android mobile phones in China rose to 86.4%, making it the system with the largest share of mobile terminal operating systems. [0003] Due to the large number of mobile phone users of the Android system, the development...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06N3/04G06N3/08G06F8/53
Inventor 俞研黄兴远苏铓黄婵颖付安民王永利
Owner NANJING UNIV OF SCI & TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More