Repackaged application detection method, rule base construction method and related device
A detection method and detection device technology, which are applied in computer security devices, instruments, computing and other directions, can solve problems such as inability to detect directly, and achieve the effects of efficient detection, high accuracy and high inspiration
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0057] figure 2 It is a flow chart of the repackaged application detection method according to the method embodiment 1 of the present invention. see figure 2 , in this embodiment, the method includes:
[0058] Step S202, when there is *-Digest-Manifest-Main-Attributes digest data in the *.SF digest file under the META-INF signature folder in the apk compressed package information of the current repackaged application, it is judged that the current repackaged application is Repackaged apps generated by third-party packaging tools.
[0059] It can be seen from the above technical solutions that the current repackaged application detection method of the present embodiment determines whether there is *-Digest-Manifest- Main-Attributes summary data can successfully detect whether the current repackaged application is generated by a third-party packaging tool. This detection method is simple to implement, efficient in detection, high in inspiration, high in accuracy, and has al...
Embodiment 2
[0068] image 3 It is a flow chart of the method for constructing a repackaged application rule base according to the method embodiment 2 of the present invention. see image 3 , in this embodiment, the method includes:
[0069] Step S302, in a plurality of known repackaged applications, the repackaged applications with the same number of malicious classes, the same signature algorithm, the same malicious behavior, the same malicious class attribute, and the same signature file attribute are classified into one category;
[0070] Among multiple known repackaged applications, repackaged applications with the same number of malicious classes, the same signature algorithm, the same malicious behavior, the same malicious class attributes, and the same signature file attributes are classified into the same class, and repackaged applications of the same type are created by the same Generated by a third-party packaging tool with the same *-Digest-Manifest-Main-Attributes summary da...
Embodiment 3
[0082] Figure 4 It is a flow chart of the repackaged application detection method according to the third embodiment of the method of the present invention. see Figure 4 , in this embodiment, the method includes:
[0083] Step S402, when *-Digest-Manifest-Main-Attributes digest data exists in the *.SF digest file under the META-INF signature folder in the apk compressed package information of the application to be detected, extract the *-Digest of the application to be detected -Manifest-Main-Attributes summary data;
[0084] Step S404, when the *-Digest-Manifest-Main-Attributes summary data of the application to be detected matches the repackaged application rule base constructed by the repackaged application rule base construction method in the above method embodiment 2, it is judged that the application to be detected is It is a repackaged application generated by a third-party packaging tool.
[0085] It can be seen from the above technical solutions that the repackag...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


