Check patentability & draft patents in minutes with Patsnap Eureka AI!

Malicious code positioning method of Android repackaging application, storage medium and terminal

A malicious code and positioning method technology, applied in the malicious code positioning method, storage medium and terminal field, can solve problems such as low accuracy, and achieve the effect of improving accuracy and ensuring integrity

Active Publication Date: 2019-07-30
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, existing methods for locating malicious code in Android repackaged applications have the problem of low accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code positioning method of Android repackaging application, storage medium and terminal
  • Malicious code positioning method of Android repackaging application, storage medium and terminal
  • Malicious code positioning method of Android repackaging application, storage medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application. The relevant directional indications (such as up, down, left, right, front, back, etc.) in the embodiments of the present invention are only used to explain the relative positional relationship between the components in a certain posture (as shown in the drawings). Sports conditions, etc., if the specific posture changes, the directional indication will also change accordingly.

[0040] As described in the background art, the prior art mainly uses feature matching to locate malicious ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious code positioning method for an Android repackaging application, a storage medium and a terminal, and the method comprises the steps: determining the position of a sensitive API in the Android repackaging application when determining that the preset sensitive API is called in the Android repackaging application; determining suspicious codes existing in the Android repackaging application based on a calling path of the determined sensitive API in the Android repackaging application; and independently executing the determined suspicious code to detect whether the suspicious code is a malicious code or not. According to the scheme, the malicious code in the Android repackaging application can be accurately determined.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a method for locating malicious codes of an Android repackaged application, a storage medium and a terminal. Background technique [0002] Mobile Internet combines mobile communication and the Internet into one, and is a general term for activities that combine and practice Internet technologies, platforms, business models and applications with mobile communication technologies. In recent years, with the continuous development of Internet technology and the reduction of manufacturing costs, mobile terminal devices represented by smart phones have gradually penetrated into people's lives. [0003] While mobile Internet technology brings us convenience, it also brings various hidden dangers. Especially after the launch of the Android operating system, with its openness and ease of development, it quickly occupied half of the mobile operating system, but this also made it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F8/71
CPCG06F21/562G06F8/71
Inventor 谭炜骞王雷范丽蓉何高峰
Owner NANJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More