Application program attack detection method and device

An application program and attack detection technology, which is applied in the computer field, can solve problems such as the inability to implement batch maintenance of program reinforcement methods, the inability to accurately monitor application program attacks, and waste of system resources, etc., to achieve easy batch maintenance, simple and flexible implementation process, and security Effect

Active Publication Date: 2021-07-02
JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the inventor found in the process of implementing the present invention that the above-mentioned methods in the prior art have at least the following defects: the program reinforcement method provided in the prior art is usually a code obfuscation method such as adding flowery instructions in the program, however, This kind of hardening method often causes program expansion, wastes system resources, and cannot accurately monitor the attack on the application program; moreover, the existing program hardening method is completed by the compiler installed in the developer terminal during the compilation process , so that the batch maintenance of the program hardening method cannot be realized, and the maintenance cost is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program attack detection method and device
  • Application program attack detection method and device
  • Application program attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0026] figure 1 A schematic flowchart of a method for detecting an application program attack according to an embodiment of the present invention is shown. Wherein, the program hardening method based on the application installation package provided in this embodiment can be applied to IOS and / or MachOS systems. Such as figure 1 As shown, the method includes:

[0027] Step S110, extract binary files from the application installat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for detecting an application program attack, which is characterized in that it comprises: extracting a binary file from an application program installation package; generating a verification value according to information corresponding to a specific position in the binary file; when the application program is running , to obtain the information corresponding to the specific position in the current application program, and compare the information corresponding to the specific position in the current application program with the check value; according to the comparison result, determine whether the application program is under attack. This solution uses the information corresponding to a specific location in the binary file as the check value, and monitors the application program attack according to the check value, so as to quickly and accurately determine whether the application program is under attack, prevent the application program from being dynamically attacked, and significantly Improve the reverse difficulty of the application, ensure the security of the application, and not easily cause the code expansion of the application; moreover, the implementation process of this solution is simple and flexible, easy to maintain in batches, and the maintenance cost is low.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an application program attack detection method and device. Background technique [0002] With the continuous development of science and technology and society, the number of various applications is also increasing rapidly. However, program reverse developers or program reverse products can easily crack and attack the application program by decompiling and debugging the application program, thereby threatening the security of the application program. [0003] At present, in order to prevent reverse cracking and attacks on application programs, there are many products and methods for strengthening application programs in the prior art. However, the inventor found in the process of implementing the present invention that the above-mentioned methods in the prior art have at least the following defects: the program reinforcement method provided in the prior art is usually a code ob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/14
CPCG06F21/14G06F21/55
Inventor 汪德嘉华保健邵根波钱潇龄孟啸龙郑小敏
Owner JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products