Unlock instant, AI-driven research and patent intelligence for your innovation.

Android malicious code detection method based on API enhancement sequence

A technology of malicious code detection and API calling, which is applied in the field of Android malicious code detection based on the order of API enhancement, can solve the problems of performance degradation and insufficient flexibility of API changes, and achieve the effect of improving detection performance

Pending Publication Date: 2022-06-28
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present invention provides a method for detecting Android malicious code based on an API enhanced sequence, which can solve the problem that the existing Android malicious code detection method is insufficient in flexibility to API changes, and performance declines when Android malware adopts encryption, confusion and other measures question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android malicious code detection method based on API enhancement sequence
  • Android malicious code detection method based on API enhancement sequence
  • Android malicious code detection method based on API enhancement sequence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in detail below with reference to the accompanying drawings and embodiments.

[0030] The present invention designs an Android malicious code detection method based on the API enhancement sequence, uses the context information in the API sequence to mine the similarity between APIs, and uses the similarity to enhance the original API calling sequence, so as to realize the same application program. Behavior is sensitive to different implementations. At the same time, the adjacency matrix of the enhanced API sequence is used to replace the API call graph, which can effectively reduce the feature size. The invention mainly includes the use of recursion-based method to complete the extraction of the complete system API calling sequence of the application program, the realization of the API embedding model based on the principle of the CBOW model, and the construction of the detection framework based on the convolutional neural network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Android malicious code detection method based on an API (Application Program Interface) enhancement sequence, which comprises the following steps of: mining similarity among APIs by utilizing context information in an API sequence, and enhancing an original API calling sequence by utilizing the similarity, so as to realize sensitivity to different same behaviors of application programs; meanwhile, the adjacency matrix of the enhanced API sequence is used for replacing an API calling graph, and the feature scale can be effectively reduced; the method mainly comprises the steps of completing the extraction of an API calling sequence of a complete system of an application program by using a recursion-based method, implementing an API embedding model based on a CBOW model principle, and constructing a detection framework based on a convolutional neural network (CNN). The method is mainly used for an Android malicious code detection task, and the problems that an existing detection method is insufficient in API change elasticity, and the performance is reduced when Android malicious software adopts encryption, confusion and other measures are solved.

Description

technical field [0001] The invention belongs to the field of network information security, and in particular relates to an Android malicious code detection method based on an API enhancement sequence. Background technique [0002] The development of mobile smart terminals not only brings convenience to people's lives, but also provides a breeding ground for Android malware. The explosive growth of Android malware poses a serious threat to Android security. There is a steady stream of new work in the field of Android malware detection, with previous researchers pioneering many novel and efficient methods in the game against malware makers. Previous studies have shown that extracting application features based on dynamic-static or hybrid methods and inputting them into machine learning or deep learning models for classification is an effective detection method. Static analysis does not need to run the program. It extracts interesting features by examining the program's manif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06K9/62G06N3/04G06N3/08
CPCG06F21/566G06N3/08G06N3/045G06F18/23213G06F18/24
Inventor 黄露薛静锋王勇陈俊豹孔子潇牛泽群
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More