Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-malicious-software hybrid detection method, system and device with privacy protection

A technology of malicious software and detection methods, applied in the direction of security devices, transmission systems, digital data protection, etc., can solve problems such as lack of applications, no consideration of priority, and no consideration of user privacy protection

Active Publication Date: 2020-07-14
XIDIAN UNIV
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) There is a lack of solutions in the prior art that can effectively detect whether an application is malicious before installation and in real-time operation
[0009] (2) The existing technology does not consider the priority of detection. For popular and widely used software, in order to prevent damage caused by malicious behavior, it should be detected first whether it is malicious
[0010] (3) The existing technology does not consider the user's privacy protection in the cloud server malware detection process
[0012] The difficulty of the above-mentioned technical problems lies in determining an effective detection scheme before the application is installed and used and in real-time operation, how to determine the detection priority to reduce the damage caused by malicious applications, and how to protect the user's privacy during the entire detection process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-malicious-software hybrid detection method, system and device with privacy protection
  • Multi-malicious-software hybrid detection method, system and device with privacy protection
  • Multi-malicious-software hybrid detection method, system and device with privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0114] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0115] In view of the problems existing in the prior art, the present invention provides a privacy-protected multi-malware hybrid detection method, system, and device, which has a privacy-enhanced multi-malware hybrid detection system with priority evaluation. The following describes the present invention in conjunction with the accompanying drawings Make a detailed description.

[0116] Such as figure 1 As shown, the multi-malware mixed detection method provided by the embodiment of the present invention includes the following steps:

[0117] S101: The third party generates a public-private key pair according to the homo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of malicious software detection, and discloses a multi-malicious-software hybrid detection method, system and device with privacy protection. The third party generates a public and private key pair according to a homomorphic encryption algorithm, and publishes a public key; the client collects behavior data of software used by the user group, carries out preliminary calculation, encrypts the behavior data by using a third-party public key, adds the behavior data to the generated random number and then uploads a result to the server; the server usesa reputation evaluation algorithm to complete calculation of different software reputation values by using homomorphic properties and interacting decryption with a third party according to the uploaded user group encryption data, and determines a software detection sequence according to the software reputation values; during detection, the server sequentially calls API use frequency data acquiredby decompilation software APK from the client according to a sequence; static detection is performed on the software according to the static learning model; if the detection result is non-malicious,related encrypted data and a public key thereof are called according to the system collected by the client, and real-time detection is performed by utilizing homomorphic properties and the dynamic learning model.

Description

technical field [0001] The invention belongs to the technical field of malicious software detection, and in particular relates to a privacy-protected multi-malware mixed detection method, system and device. Background technique [0002] At present, the closest existing technology: mobile malware refers to the existence of eavesdropping on user calls, stealing user information, destroying user data, unauthorized use of paid services, sending Spam information, push advertisements or fraudulent information, affect the operation of mobile terminals, endanger Internet network security and other malicious acts of application software. With the popularization of smartphones and the vigorous development of the mobile application industry, mobile malware has flooded into the application market in large numbers. Mobile malware often introduces security vulnerabilities into mobile devices, causing financial losses to users, and causing privacy leaks and other issues. Therefore, estab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04L9/00H04W12/02H04W12/04G06F21/62G06F21/56G06F21/60
CPCH04L9/008H04W12/02G06F21/602G06F21/6245G06F21/562G06F21/566G06F2221/033H04W12/041H04W12/128
Inventor 王静雯闫峥于熙洵彭立魏文涛
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products