Method for detecting illegal invasion of application program, storage medium and terminal equipment

An application program and illegal intrusion technology, which is applied in the field of mobile terminals and information security, can solve the problems of application program tampering and low security, and achieve the effect of improving stability and security and avoiding illegal intrusion

Inactive Publication Date: 2019-10-11
北京智游网安科技有限公司
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a method for detecting illegal intrusion of application programs, storage media and terminal equipment in order to solve the problem of low security due to malicious tampering of application programs in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting illegal invasion of application program, storage medium and terminal equipment
  • Method for detecting illegal invasion of application program, storage medium and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention provides a method for detecting illegal intrusion of application programs, storage media and terminal equipment. In order to make the purpose, technical solution and effect of the present invention clearer and clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting illegal invasion of an application program, a storage medium and terminal equipment, and the method comprises the steps: detecting whether an injection operation is executed for the application program or not according to a preset rule when the application program is started; and when the injection operation is executed on the application program, judging that the application program is illegally invaded, and exiting the application program. The injection operation of the application program is monitored, and when the injection operation is monitored, the application program is judged to have illegal invasion, so that the current application program can exit, the application program is prevented from being illegally invaded, and the stabilityand the safety of the application program of the mobile terminal are improved.

Description

technical field [0001] The invention relates to the technical field of mobile terminals and information security, in particular to a method for detecting illegal intrusion of application programs. Background technique [0002] Similar to the dll injection under the Windows system, the Android system is based on the Linux kernel, and the Native layer mainly injects a shared dynamic library in ELF format. Usually, after obtaining the apk of the target application, reverse analysts will do a simple static decompilation check, search for sensitive call interfaces, and then analyze the key implementation logic, because the current Android application client apk will be obfuscated or reinforced For processing, reversers will use dynamic debugging technology to analyze business code logic. After obtaining the logic of the App, the attacker will use calls such as ptrace and dlopen of the Linux system to inject the so file for the purpose of illegal tampering. [0003] If the Andro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/52
CPCG06F21/52G06F21/566
Inventor 李少辉龙柏林杜洋
Owner 北京智游网安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products