Mobile application security evaluation method based on comment data

A mobile application and security technology, applied in special data processing applications, electronic digital data processing, text database query, etc., can solve the problems of difficult to obtain program code, difficult to analyze and evaluate results, and difficult for users to understand, so as to reduce the burden on users. , the effect of improving work efficiency

Active Publication Date: 2019-10-15
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the deficiencies of the above-mentioned prior art, the purpose of the present invention is to provide a mobile application security evaluation method based on comment data, so as to overcome the difficulties in obtaining and analyzing program codes and difficult evaluation results for users in traditional application program security evaluation methods. The problem of understandin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile application security evaluation method based on comment data
  • Mobile application security evaluation method based on comment data
  • Mobile application security evaluation method based on comment data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to facilitate the understanding of those skilled in the art, the present invention will be further described below with reference to the embodiments and the accompanying drawings, and the contents mentioned in the embodiments are not intended to limit the present invention.

[0033] refer to figure 1 As shown, a method for evaluating mobile application security based on review data of the present invention includes the following steps:

[0034] Step 1) Acquisition of security review data: collect review data of mobile applications, perform preprocessing and keyword extraction on review data, and filter keywords to construct a security keyword database; build security-related comments according to the security keyword database dataset; where,

[0035] 11) Use crawler to crawl the review data of 200 mobile applications from the Google Play application store, including the content of the review and the time of submission of the review. The content of each commen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile application security evaluation method based on comment data. According to the mobile application security evaluation method, multiple text representation models are fused; multi-dimensional features are extracted from comment data to construct a unified vector representation form; a machine learning algorithm is used to construct a security evaluation model of a mobile application, and the evaluation model is used to provide a security risk value for a to-be-detected application; and meanwhile, explanation and explanation are provided for the user according tothe security evaluation result. The mobile application security evaluation method overcomes the problems that in a traditional application program security evaluation method, program codes are difficult to obtain and analyze, and evaluation results are difficult to understand by users. According to the mobile application security evaluation method, a mobile application security evaluation model based on comment data is constructed, and explanation of an evaluation result is provided for a user, so that the efficiency of security evaluation work is effectively improved, and meanwhile, the difficulty of the evaluation work is also reduced.

Description

technical field [0001] The invention belongs to the technical field of mobile application security assessment, in particular to a mobile application security assessment method based on comment data. Background technique [0002] With the development of the mobile Internet, mobile applications (Apps) develop rapidly, and users' concerns about the security issues of mobile applications also follow. In traditional mobile application security analysis, through dynamic detection of mobile applications and static code analysis techniques, bad behaviors hidden in the program code can be discovered. The premise of these analysis techniques is to obtain the program code in advance, decompile and other means The code structure of the application is parsed, and the security detection of the mobile application is carried out from the code level. However, it is difficult for users to obtain the source code of mobile applications, and it is also difficult to reverse crack some applicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/33G06F16/335G06F16/35G06F17/27G06F21/50
CPCG06F16/3334G06F16/35G06F16/335G06F21/50G06F40/279
Inventor 陶传奇郭虹静黄志球
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products