Malicious code positioning device of Android repackaging application

A malicious code and positioning device technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problem of low accuracy and achieve the effect of improving accuracy and ensuring integrity

Inactive Publication Date: 2019-08-02
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, existing methods for locating malicious code ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code positioning device of Android repackaging application
  • Malicious code positioning device of Android repackaging application
  • Malicious code positioning device of Android repackaging application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application. The relevant directional indications (such as up, down, left, right, front, back, etc.) in the embodiments of the present invention are only used to explain the relative positional relationship between the components in a certain posture (as shown in the drawings). Sports conditions, etc., if the specific posture changes, the directional indication will also change accordingly.

[0029] As described in the background art, the prior art mainly uses feature matching to locate malicious ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A malicious code positioning device of an Android repackaging application comprises a position determining unit suitable for determining the position of a sensitive API in the Android repackaging application when it is determined that the preset sensitive API is called in the Android repackaging application; a code determining unit suitable for determining suspicious codes existing in the Androidrepackaging application based on the determined position of the sensitive API in the Android repackaging application and a calling path of the sensitive API determined in the Android repackaging application; and a detection unit suitable for independently executing the determined suspicious codes so as to detect whether the suspicious codes are malicious codes or not. According to the scheme, themalicious code existing in the Android repackaging application can be accurately determined.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a device for locating malicious codes of Android repackaged applications. Background technique [0002] Mobile Internet combines mobile communication and the Internet into one, and is a general term for activities that combine and practice Internet technologies, platforms, business models and applications with mobile communication technologies. In recent years, with the continuous development of Internet technology and the reduction of manufacturing costs, mobile terminal devices represented by smart phones have gradually penetrated into people's lives. [0003] While mobile Internet technology brings us convenience, it also brings various hidden dangers. Especially after the launch of the Android operating system, with its openness and ease of development, it quickly occupied half of the mobile operating system, but this also made it a target for malicious program att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 何高峰谭炜骞王雷范丽蓉
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products