CN108229161A - Using monitoring method, device and terminal - Google Patents

Using monitoring method, device and terminal Download PDF

Info

Publication number
CN108229161A
CN108229161A CN201611156638.XA CN201611156638A CN108229161A CN 108229161 A CN108229161 A CN 108229161A CN 201611156638 A CN201611156638 A CN 201611156638A CN 108229161 A CN108229161 A CN 108229161A
Authority
CN
China
Prior art keywords
daily record
record data
pitching pile
nuclear layer
inner nuclear
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611156638.XA
Other languages
Chinese (zh)
Inventor
舒园园
魏渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201611156638.XA priority Critical patent/CN108229161A/en
Publication of CN108229161A publication Critical patent/CN108229161A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

The present invention proposes a kind of application monitoring method, device and terminal, is related to security technology area.Wherein, a kind of application monitoring method of the invention includes:Daily record data is obtained by inner nuclear layer pitching pile;Abnormal problem is obtained by analyzing daily record data.By such method, it is capable of the calling of direct monitoring and analysis Android bottom key modules, it is monitored in real time so as to fulfill all behaviors on upper strata are applied to Android, it can effectively find the problems such as malice performs code injection and alters program the bytecode of execution certainly, improve the safety of terminal.

Description

Using monitoring method, device and terminal
Technical field
The present invention relates to security technology area, particularly a kind of application monitoring method, device and terminal.
Background technology
With terminal, the development of application, more and more users in terminal, adopt important application and personal information storage The operations such as done shopping, paid with mobile terminal are also more and more, prevent terminal by the importance of malware threat also drastically It improves.
In the terminal, the usage amount of Android system terminal is very huge.Existing Android software sensitive behavior is monitored and is blocked The mode of cutting is Binder based on android system (adhesive) inter-process communication mechanisms, and process is hooked by Hook (hook) function Between the Binder information that communicates analyze the sensitive behavior of Android software.
But such method carrys out detection and analysis simply by detection Android inter-process communication mechanisms Binder Android behaviors, and emerging Android malicious application can perform code by injecting malice in local ccf layer, usurp certainly Change the bytecode of program execution come around Binder monitorings in ccf layer are opened in, for such rogue program, the prior art is incompetent For power, it be easy to cause user's loss.
Invention content
It is an object of the present invention to improve the safety of user terminal.
According to an aspect of the present invention, proposition is a kind of applies monitoring method, including:Daily record is obtained by inner nuclear layer pitching pile Data;Abnormal problem is obtained by analyzing daily record data.
Optionally, daily record data is obtained by inner nuclear layer pitching pile to include:Pass through memory management Key Functions in inner nuclear layer Pitching pile obtains memory management daily record data, and memory management daily record data, which includes memory loading, memory modification and/or memory, to be replicated.
Optionally, daily record data is obtained by inner nuclear layer pitching pile to include:Pass through file management Key Functions in inner nuclear layer Pitching pile obtains file management daily record data, and file management daily record data includes file addition, file deletion and/or file modification.
Optionally, daily record data is obtained by inner nuclear layer pitching pile to include:By the pitching pile that Key Functions are driven in inner nuclear layer Driving daily record data is obtained, driving daily record data includes NFC (Near Field Communication, wireless near field communication Technology), the daily record data of camera and/or USB (Universal Serial Bus, universal serial bus).
Optionally, abnormal problem includes injection malice execution code and/or alters program the bytecode of execution.
Optionally, it further includes:When determining to be abnormal problem, warning information is sent out.
Optionally, it further includes:Based on Process Tracking ptrace frames system inner nuclear layer pitching pile.
By such method, it is capable of the calling of direct monitoring and analysis Android bottom key modules, so as to fulfill to peace All behaviors of the Zhuo Yingyong on upper strata are monitored in real time, can effectively find that malice performs code injection and alters program certainly The problems such as bytecode of execution, improves the safety of terminal.
According to another aspect of the present invention, proposition is a kind of applies monitoring device, including:Pitching pile module, in passing through Stratum nucleare pitching pile obtains daily record data;Pitching pile log analysis module analyzes daily record data acquisition abnormal problem for passing through.
Optionally, pitching pile module includes:Memory management pitching pile unit, for passing through memory management Key Functions in inner nuclear layer Pitching pile obtain memory management daily record data, memory management daily record data include memory loading, memory modification and/or memory answer System.
Optionally, pitching pile module includes:File management pitching pile unit, for passing through file management Key Functions in inner nuclear layer Pitching pile obtain file management daily record data, file management daily record data include file addition, file delete and/or file repair Change.
Optionally, pitching pile module includes:Pitching pile unit is driven, the pitching pile of Key Functions is driven to obtain for passing through in inner nuclear layer Driving daily record data is taken, driving daily record data includes the daily record data of NFC, camera and/or USB.
Optionally, abnormal problem includes injection malice execution code and/or alters program the bytecode of execution.
Optionally, it further includes:Alarm module, for when pitching pile log analysis module determines to be abnormal problem, sending out Warning information.
Optionally, it further includes:Pitching pile configuration module, for being inserted based on inner nuclear layer of the Process Tracking ptrace frames in system Stake.
Such device is capable of the calling of direct monitoring and analysis Android bottom key modules, so as to fulfill to Android application All behaviors on upper strata are monitored in real time, can effectively find that malice performs code injection and alters program execution certainly The problems such as bytecode, improves the safety of terminal.
According to a further aspect of the invention, a kind of terminal is proposed, including any one the application monitoring being mentioned above Device.
Such terminal can utilize using monitoring device direct monitoring and analyze the calling of Android bottom key modules, from And realize all behaviors on upper strata is applied to monitor in real time to Android, can effectively find malice perform code injection and From the bytecode for alterring program execution the problems such as, improve the safety of terminal.
Description of the drawings
Attached drawing described herein is used to provide further understanding of the present invention, and forms the part of the application, this hair Bright illustrative embodiments and their description do not constitute improper limitations of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of one embodiment using monitoring method of the present invention.
Fig. 2 is the flow chart of another embodiment using monitoring method of the present invention.
Fig. 3 is the schematic diagram of one embodiment using monitoring device of the present invention.
Fig. 4 is the schematic diagram of another embodiment using monitoring device of the present invention.
Fig. 5 is the schematic diagram of one embodiment of the terminal of the present invention.
Specific embodiment
Below by drawings and examples, technical scheme of the present invention is described in further detail.
The flow chart of one embodiment using monitoring method of the present invention is as shown in Figure 1.
In a step 101, daily record data is obtained by inner nuclear layer pitching pile.In one embodiment, ptrace can be based on Frame carries out pitching pile for the important module of kernel.
In a step 102, abnormal problem is obtained by analyzing daily record data.In one embodiment, daily record can be analyzed Data can also be associated analysis to the daily record data of modules, search whether exist malice perform code injection and From the bytecode for alterring program execution the problems such as.
By such method, it is capable of the calling of direct monitoring and analysis Android bottom key modules, so as to fulfill to peace All behaviors of the Zhuo Yingyong on upper strata are monitored in real time, can effectively find that malice performs code injection and alters program certainly The problems such as bytecode of execution, improves safety detection ability, improves the safety of terminal.
The flow chart of another embodiment using monitoring method of the present invention is as shown in Figure 2.
In step 201, memory management daily record data is obtained by the pitching pile of memory management Key Functions in inner nuclear layer, it is interior Memory loading, memory modification, memory duplication etc. can be included by depositing management daily record data.
In step 202, file management daily record data, text are obtained by the pitching pile of file management Key Functions in inner nuclear layer Part management daily record data can include file addition, file deletion, file modification etc..
In step 203, by the way that the pitching pile of Key Functions is driven to obtain driving daily record data in inner nuclear layer, daily record number is driven According to including NFC, camera, USB daily record data etc..
In step 204, abnormal problem is obtained by analyzing daily record data.In one embodiment, memory can be passed through Daily record data, file management daily record data and the independent analysis and comprehensive analysis that drive daily record data are managed, is obtained abnormal Daily record data, and then determine whether to be abnormal problem.In one embodiment, abnormal problem includes injection malice execution generation Code, the bytecode for alterring program execution etc..
By such method, it can be inserted in the key position of inner nuclear layer, such as memory management, file management and driving Stake and log collection are realized and carry out comprehensively monitoring and log recording to the bytecode that program performs, so as to obtain memory in time Management, the exception of file management and driving, convenient for it is timely, comprehensively note abnormalities problem, improve safety.
In one embodiment, the test using monitoring method that prototype carries out the present invention may be used.Start first Application to be analyzed is installed in the performing environment of prototype after hook customizations, loading.And then it is supervised using the hook pitching piles in kernel Control obtains log information, and analyzes log information.By such method, prototype can be used to carry out measure of merit, optimization should With monitoring effect, safety is improved.
The schematic diagram of one embodiment using monitoring device of the present invention is as shown in Figure 3.Wherein, 301 energy of pitching pile module Daily record data is enough obtained by inner nuclear layer pitching pile.It in one embodiment, can be based on ptrace frames for the important of kernel Module carries out pitching pile.Pitching pile log analysis module 302 can obtain abnormal problem by analyzing daily record data.In one embodiment In, daily record data can be analyzed, analysis can also be associated to the daily record data of modules, searches whether that there is malice holds The problems such as line code injects and alters program the bytecode of execution certainly.
Such device is capable of the calling of direct monitoring and analysis Android bottom key modules, so as to fulfill to Android application All behaviors on upper strata are monitored in real time, can effectively find that malice performs code injection and alters program execution certainly The problems such as bytecode, improves safety detection ability, improves the safety of terminal.
The schematic diagram of another embodiment using monitoring device of the present invention is as shown in Figure 4.Wherein, memory management pitching pile Unit 401 can obtain memory management daily record data, memory management day by the pitching pile of memory management Key Functions in inner nuclear layer Will data can include memory loading, memory modification, memory duplication etc..File management pitching pile unit 402 can pass through inner nuclear layer The pitching pile of middle file management Key Functions obtains file management daily record data, and file management daily record data can add including file Add, file deletion, file modification etc..Drive pitching pile unit 403 can be by the way that the pitching pile of Key Functions is driven to obtain in inner nuclear layer Daily record data is driven, driving daily record data includes daily record data of NFC, camera, USB etc..42 energy of pitching pile log analysis module It is enough to obtain abnormal problem by analyzing daily record data.In one embodiment, memory management daily record data, file pipe can be passed through Manage daily record data and drive daily record data independent analysis and comprehensive analysis, obtain abnormal daily record data, so determine be It is no to be abnormal problem.In one embodiment, abnormal problem includes injection malice execution code, the byte for alterring program execution Code etc..
Such device can in the key position of inner nuclear layer, such as memory management, file management and driving carry out pitching pile and Log collection so as to obtain the exception of memory management, file management and driving in time, is asked convenient for timely, comprehensive note abnormalities Topic improves safety.
The schematic diagram of one embodiment of the terminal of the present invention is as shown in Figure 5.The framework of terminal system include application layer 51, Ccf layer 52 and inner nuclear layer 53, wherein, inner nuclear layer 53 includes multiple crucial functional units, such as memory management unit 531, file Administrative unit 532 and driving unit 533 etc..It is located in the inner nuclear layer 53 of terminal using the pitching pile module 54 of monitoring device, it can be with Including, memory management pitching pile unit 541, file management pitching pile unit 542 and driving pitching pile unit 543, respectively positioned at memory pipe It manages in unit 531, file management unit 532 and driving unit 533, memory management daily record data, file pipe can be obtained respectively Manage daily record data and driving daily record data.Pitching pile log analysis module 55 is according to memory management daily record data, file management daily record Data and driving daily record data carry out independent analysis and comprehensive analysis, obtain abnormal daily record data, and then determine whether to occur Abnormal problem.
Such terminal can utilize using monitoring device direct monitoring and analyze the calling of Android bottom key modules, from And realize and all behaviors on upper strata applied to be monitored in real time for Android, can effectively find malice execution code injection with And the problems such as alterring program the bytecode of execution certainly, safety detection ability is improved, improves the safety of terminal.
Finally it should be noted that:The above embodiments are merely illustrative of the technical scheme of the present invention and are not intended to be limiting thereof;To the greatest extent The present invention is described in detail with reference to preferred embodiments for pipe, those of ordinary skills in the art should understand that:Still It can modify to the specific embodiment of the present invention or equivalent replacement is carried out to some technical characteristics;Without departing from this hair The spirit of bright technical solution should all cover in the claimed technical solution range of the present invention.

Claims (11)

1. a kind of apply monitoring method, which is characterized in that including:
Daily record data is obtained by inner nuclear layer pitching pile;
Abnormal problem is obtained by analyzing the daily record data.
2. according to the method described in claim 1, it is characterized in that,
It is described to be included by inner nuclear layer pitching pile acquisition daily record data:
Memory management daily record data, the memory management day are obtained by the pitching pile of memory management Key Functions in the inner nuclear layer Will data include memory loading, memory modification and/or memory and replicate;
File management daily record data, the file management day are obtained by the pitching pile of file management Key Functions in the inner nuclear layer Will data include file addition, file deletion and/or file modification;
And/or
Driving daily record data is obtained by the pitching pile that Key Functions are driven in the inner nuclear layer, the driving daily record data includes near The daily record data of range wireless communication technologies NFC, camera and/or general-purpose serial bus USB.
3. according to the method described in claim 1, it is characterized in that, the abnormal problem include injection malice perform code and/ Or alter program the bytecode of execution.
4. it according to the method described in claim 1, it is characterized in that, further includes:
When determining to occur the abnormal problem, warning information is sent out.
5. it according to the method described in claim 1, it is characterized in that, further includes:
Based on Process Tracking ptrace frames system inner nuclear layer pitching pile.
6. a kind of apply monitoring device, which is characterized in that including:
Pitching pile module obtains daily record data for passing through inner nuclear layer pitching pile;
Pitching pile log analysis module analyzes the daily record data acquisition abnormal problem for passing through.
7. device according to claim 6, which is characterized in that the pitching pile module includes:
Memory management pitching pile unit, for obtaining memory management day by the pitching pile of memory management Key Functions in the inner nuclear layer Will data, the memory management daily record data, which includes memory loading, memory modification and/or memory, to be replicated;
File management pitching pile unit, for obtaining file management day by the pitching pile of file management Key Functions in the inner nuclear layer Will data, the file management daily record data include file addition, file deletion and/or file modification;
And/or
Pitching pile unit is driven, the pitching pile of Key Functions is driven to obtain driving daily record data in the inner nuclear layer for passing through, it is described Driving daily record data includes the daily record data of the short distance wireless communication technology NFC, camera and/or general-purpose serial bus USB.
8. device according to claim 6, which is characterized in that the abnormal problem include injection malice perform code and/ Or alter program the bytecode of execution.
9. device according to claim 6, which is characterized in that further include:
Alarm module, for when the pitching pile log analysis module determines to occur the abnormal problem, sending out warning information.
10. device according to claim 6, which is characterized in that further include:
Pitching pile configuration module, for based on Process Tracking ptrace frames system inner nuclear layer pitching pile.
11. a kind of terminal, which is characterized in that including applying monitoring device described in claim 6~10 any one.
CN201611156638.XA 2016-12-15 2016-12-15 Using monitoring method, device and terminal Pending CN108229161A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611156638.XA CN108229161A (en) 2016-12-15 2016-12-15 Using monitoring method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611156638.XA CN108229161A (en) 2016-12-15 2016-12-15 Using monitoring method, device and terminal

Publications (1)

Publication Number Publication Date
CN108229161A true CN108229161A (en) 2018-06-29

Family

ID=62651128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611156638.XA Pending CN108229161A (en) 2016-12-15 2016-12-15 Using monitoring method, device and terminal

Country Status (1)

Country Link
CN (1) CN108229161A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109388538A (en) * 2018-09-13 2019-02-26 西安交通大学 A kind of file operation behavior monitoring method and device based on kernel
CN109697163A (en) * 2018-12-14 2019-04-30 西安四叶草信息技术有限公司 Program testing method and equipment
CN110413497A (en) * 2019-07-30 2019-11-05 Oppo广东移动通信有限公司 Abnormality monitoring method, device, terminal device and computer readable storage medium
CN110866226A (en) * 2019-11-15 2020-03-06 中博信息技术研究院有限公司 JAVA application software copyright protection method based on encryption technology
CN111382424A (en) * 2018-12-27 2020-07-07 全球能源互联网研究院有限公司 Mobile application sensitive behavior detection method and system based on controlled environment
CN111931166A (en) * 2020-09-24 2020-11-13 中国人民解放军国防科技大学 Application program anti-attack method and system based on code injection and behavior analysis

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739647A (en) * 2012-05-23 2012-10-17 国家计算机网络与信息安全管理中心 High-interaction honeypot based network security system and implementation method thereof
US20140245386A1 (en) * 2012-07-10 2014-08-28 Barak ROSENBERG System and method for access control management
CN105074671A (en) * 2013-03-27 2015-11-18 英特尔公司 Method and system for detecting concurrency programming errors in kernel modules and device drivers
CN105184166A (en) * 2015-10-21 2015-12-23 南京大学 Kernel-based Android application real-time behavior analysis method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739647A (en) * 2012-05-23 2012-10-17 国家计算机网络与信息安全管理中心 High-interaction honeypot based network security system and implementation method thereof
US20140245386A1 (en) * 2012-07-10 2014-08-28 Barak ROSENBERG System and method for access control management
CN105074671A (en) * 2013-03-27 2015-11-18 英特尔公司 Method and system for detecting concurrency programming errors in kernel modules and device drivers
CN105184166A (en) * 2015-10-21 2015-12-23 南京大学 Kernel-based Android application real-time behavior analysis method and system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109388538A (en) * 2018-09-13 2019-02-26 西安交通大学 A kind of file operation behavior monitoring method and device based on kernel
CN109697163A (en) * 2018-12-14 2019-04-30 西安四叶草信息技术有限公司 Program testing method and equipment
CN109697163B (en) * 2018-12-14 2022-03-04 西安四叶草信息技术有限公司 Program testing method and device
CN111382424A (en) * 2018-12-27 2020-07-07 全球能源互联网研究院有限公司 Mobile application sensitive behavior detection method and system based on controlled environment
CN110413497A (en) * 2019-07-30 2019-11-05 Oppo广东移动通信有限公司 Abnormality monitoring method, device, terminal device and computer readable storage medium
CN110413497B (en) * 2019-07-30 2024-02-13 Oppo广东移动通信有限公司 Abnormality monitoring method, abnormality monitoring device, terminal device and computer-readable storage medium
CN110866226A (en) * 2019-11-15 2020-03-06 中博信息技术研究院有限公司 JAVA application software copyright protection method based on encryption technology
CN110866226B (en) * 2019-11-15 2022-05-24 中博信息技术研究院有限公司 JAVA application software copyright protection method based on encryption technology
CN111931166A (en) * 2020-09-24 2020-11-13 中国人民解放军国防科技大学 Application program anti-attack method and system based on code injection and behavior analysis
CN111931166B (en) * 2020-09-24 2021-06-22 中国人民解放军国防科技大学 Application program anti-attack method and system based on code injection and behavior analysis

Similar Documents

Publication Publication Date Title
CN108229161A (en) Using monitoring method, device and terminal
CN102752730B (en) Method and device for message handling
CN103368904B (en) The detection of mobile terminal, questionable conduct and decision-making system and method
CN103473844B (en) Public affairs are rented a house intelligent control method and system
CN107766728A (en) Mobile application security managing device, method and mobile operation safety protection system
CN105493054B (en) It is protected using the rapid data of double file system
CN105956474B (en) Android platform software unusual checking system
US9916442B2 (en) Real-time recording and monitoring of mobile applications
CN111931166B (en) Application program anti-attack method and system based on code injection and behavior analysis
WO2009097610A1 (en) A vmm-based intrusion detection system
CN109388538A (en) A kind of file operation behavior monitoring method and device based on kernel
CN101582176A (en) Fire fighting apparatus safety-check management method
CN105868097B (en) System detection method and its device
CN107092830A (en) The early warning of IOS Malwares and detecting system and its method based on flow analysis
CN107358103A (en) The Android sensitive behavior monitoring method and system of pitching pile are called based on sensitivity function
CN106383768A (en) Mobile device operation behavior-based supervision analysis system and method
CN107302586A (en) A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing
CN103679025B (en) A kind of malicious code detecting method based on dendritic cell algorithm
CN104091119A (en) Mobile terminal as well as protection method and protection system of data in mobile terminal
CN110460583A (en) A kind of sensitive information recording method and device, electronic equipment
CN109388949B (en) Data security centralized management and control method and system
CN108965251A (en) A kind of safe mobile phone guard system that cloud combines
CN112351021A (en) Asset risk detection method and device, readable storage medium and computer equipment
Xu et al. PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints
CN103678985A (en) Automatic operator tag generating system and automatic operator tag generating method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180629

RJ01 Rejection of invention patent application after publication