Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software detection method and device and electronic equipment

A target software and malware technology, applied in the computer field, can solve the problems of code confusion, huge experiment cost, low accuracy, etc., and achieve the effect of improving accuracy

Pending Publication Date: 2022-06-24
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These malicious software have seriously violated the legitimate rights and interests of the majority of users, and at the same time brought unpredictable obstacles to the further development of the mobile smart terminal industry
[0003] For all kinds of malicious software faced in the current Android system, there are two existing methods for detection: dynamic detection and static detection. Among them, dynamic detection is mainly to collect and analyze various information when the application software is running, but this technology Can bypass the protection technology of Android application software (such as: code obfuscation and reinforcement), the cost of experimentation is huge, and the code cannot be fully covered
Static detection is mainly through static analysis of Android application software, extracting various static features, and then training and testing classification models through various classification algorithms, so as to achieve the ability to distinguish malware; this kind of mainstream static method has low experimental cost and can Obtain static features more comprehensively, such as permissions, signatures, image resources, etc., but all use a single feature to determine whether the software is malware, and the detection accuracy is low
[0004] That is to say, the detection accuracy of the existing detection method to detect whether the software is malicious software is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software detection method and device and electronic equipment
  • Software detection method and device and electronic equipment
  • Software detection method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make those skilled in the art better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only The embodiments are part of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the scope of protection of the present application.

[0066] It should be noted that the terms "first", "second" and the like in the description and claims of the present application and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that data so used may be interchanged...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software detection method and device and electronic equipment. The method comprises the steps of obtaining a current permission set, a current operation code sequence set and a current function pair set of target software; according to the current permission set and the reference permission set, determining a permission feature vector of the target software; determining an operation code sequence feature vector of the target software according to the current operation code sequence set and the reference operation code sequence set; according to the current function pair set and the reference function pair set, determining a function call feature vector of the target software; and determining whether the type of the target software is a malicious software type or not according to the permission feature vector, the operation code sequence feature vector and the function call feature vector. According to the method and the device, the technical problem of relatively low accuracy of software detection in related technologies is solved.

Description

technical field [0001] The present application relates to the field of computers, and in particular, to a software detection method and apparatus, and electronic equipment. Background technique [0002] Due to the open source nature of the Android (Android) system, the number of Android malware is increasing. These malicious software have seriously violated the legitimate rights and interests of the majority of users, and also brought unpredictable obstacles to the further development of the mobile intelligent terminal industry. [0003] For the various types of malware currently faced by the Android system, there are two methods for detection: dynamic detection and static detection. Among them, dynamic detection mainly collects and analyzes various types of information of the application software when it is running, but this technology Protection techniques (such as code obfuscation and hardening) that can bypass Android application software, the cost of experimentation ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F8/53
CPCG06F21/563G06F8/53
Inventor 颜波
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products