Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious application detection method and device and storage medium

A malicious application and detection method technology, applied in the computer field, can solve problems such as low detection efficiency, large resource consumption, and large consumption of computing and storage resources, and achieve the effects of improving accuracy, improving detection efficiency, and saving computing and storage resources

Pending Publication Date: 2021-04-20
HUAWEI TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current application detection method is to detect the source code of the App, but it requires a lot of computing and storage resources, and the detection efficiency is low; and when the malicious App code changes or uses code obfuscation, packing and other technologies, it can be easily detected. Bypass detection of
Therefore, the current detection method for malicious App consumes a lot of resources, and the accuracy of the detection result is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious application detection method and device and storage medium
  • Malicious application detection method and device and storage medium
  • Malicious application detection method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] In order to make the purpose, technical solution and advantages of the present application clearer, the following will describe the embodiments of the present application in conjunction with the accompanying drawings in the embodiments of the present application.

[0076] The terms "first" and "second" in the specification, claims and drawings of the present application are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product, or device that includes a series of steps or units is not limited to the listed steps or units, but optionally also includes steps or units that are not listed, or optionally It also includes other steps or units inherent to these processes, methods, products, or devices.

[0077] Reference herein to "an embodiment" means that a particular ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious application detection method and device and a storage medium. The application detection method comprises the steps of obtaining the initial information of an operating system; acquiring the running information of the operating system; comparing the legal application information with the to-be-detected application information, or comparing the configuration information in the initial state with the configuration information in the running state to obtain a comparison result; and under the condition that the comparison results are different, determining that the to-be-detected application on the operating system is a malicious application. According to the method, the configuration information of the operating system in the initial state and the configuration information of the operating system in the running state are compared, and the legal application information of the operating system is compared with the to-be-detected application information, so that the security of the to-be-detected application is detected, the malicious level of the to-be-detected application is evaluated, a large amount of computing and storage resources can be saved, and the detection efficiency is improved. Malicious application detection is still effective when codes are changed or technologies such as code obfuscation and encasing are adopted, and the accuracy of a detection result is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a detection method, device and storage medium for malicious applications. Background technique [0002] Application (Application, App) is a computer program for completing one or more specific tasks. An operating system based on the Linux kernel, such as an Android (Android) system, is mainly used in mobile terminal devices. Due to the open source and rich scalability of the operating system code based on the Linux kernel, the functions of the App developed based on the Linux kernel operating system are becoming more and more diverse, which greatly meets the various needs of people in daily life. [0003] However, the black industry, which is attached to the terminal system with a huge number of users and conducts fraud, fee deduction, and mining through malicious apps, is also developing rapidly. The black industry has a major impact on the data security of users. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/56
Inventor 那键
Owner HUAWEI TECH CO LTD