CN108229165A - A kind of Malicious Code Detection environmental simulation method and system - Google Patents

A kind of Malicious Code Detection environmental simulation method and system Download PDF

Info

Publication number
CN108229165A
CN108229165A CN201611193315.8A CN201611193315A CN108229165A CN 108229165 A CN108229165 A CN 108229165A CN 201611193315 A CN201611193315 A CN 201611193315A CN 108229165 A CN108229165 A CN 108229165A
Authority
CN
China
Prior art keywords
correlation
sim card
data
stain
short message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611193315.8A
Other languages
Chinese (zh)
Inventor
田凯
乔伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Antian Information Technology Co Ltd
Original Assignee
Wuhan Antian Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Antian Information Technology Co Ltd filed Critical Wuhan Antian Information Technology Co Ltd
Priority to CN201611193315.8A priority Critical patent/CN108229165A/en
Publication of CN108229165A publication Critical patent/CN108229165A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of Malicious Code Detection environmental simulation method and system, including:SIM card correlation API is monitored, if sample has the behavior for obtaining SIM card related data, SIM card correlation stain data is forged and returns to sample and then simulate SIM card environment;Real user correlation stain data are forged, and based on the real user correlation stain digital simulation real user behavior;Wherein, the real user correlation stain data, including:Phone correlation stain data, short message correlation stain data.Technical solution of the present invention as detection environment and then is improved recall rate and promotes detection efficiency by the use of prototype, and using no SIM card scheme so that protect the privacy information of user conscientiously.

Description

A kind of Malicious Code Detection environmental simulation method and system
Technical field
The present invention relates to field of information security technology more particularly to a kind of Malicious Code Detection environmental simulation method and it is System.
Background technology
With the extensive use of Android platform and the characteristic of increasing income of android system, for the evil of android system Security threat caused by code of anticipating is also increasingly severe.
Have many advantages, such as that financial cost is low due to detecting simulator, highly may customize, be easy to exploitation, easily deployment, simulation Device detection technique is widely used in secure enterprise.But simulator can not simulate real handset completely, and anti-simulator technology is being applied In it is also very universal, this will directly affect behavior of the application program when being run on simulator, while malicious code can be hidden Malicious act is hidden, malicious act recall rate is caused to decline.
Furthermore simulator occupies a large amount of CPU, memory, and then the speed of service is slow, the detection effect of malicious code is directly affected Rate, therefore prototype is considered as to carry out Malicious Code Detection.
But in the existing Malicious Code Detection scheme using prototype, it is directed to the behaviors such as short message, phone, cellphone information Detection need to be inserted into SIM card, and handling for SIM card needs system of real name, this not only adds the cost of malicious code test, and And the relevant information of SIM card may be obtained in malicious code operational process, this can cause the leakage of private information of user.
Invention content
For above-mentioned technical problem, the present invention can simulate SIM card environment under the premise of SIM card is not needed to, to transmitting-receiving Short message takes the real users behavior such as phone and is simulated, so one malicious code None- identified of full simulation and misidentification Environment is detected for the prototype comprising true SIM card, not only can effectively trigger malicious act and then promotes recall rate, and can Reduce Malicious Code Detection cost and conscientiously protection privacy of user safety.
The present invention realizes with the following method:A kind of Malicious Code Detection environmental simulation method, applied to the true of no SIM card In machine, including:
SIM card correlation API is monitored, if sample has the behavior for obtaining SIM card related data, forges SIM card correlation Stain data return to sample and then simulate SIM card environment;
Real user correlation stain data are forged, and based on the real user correlation stain digital simulation real user behavior;
Wherein, the real user correlation stain data, including:Phone correlation stain data, short message correlation stain data.
Further, it further includes:It obtains SIM card correlation stain data stain data related to real user and stores In stain database.
Further, if sample has the behavior for obtaining SIM card related data, SIM card correlation stain data is forged and are returned Back to sample and then SIM card environment is simulated, specially:
SIM card correlation API is monitored using Runtime Hook technologies, if finding that sample exists obtains SIM card dependency number According to behavior when, then forge SIM card correlation stain data and return to sample.
Further, it is described to be based on the real user correlation stain digital simulation real user behavior, including:
The phone number and short message content of sender is chosen from real user correlation stain data, builds the pdus data of short message Packet, is sent out in the form of broadcast, the broadcast that system is sent when simulation short message receives, and is inserted into one into short message correlation stain data Note data, simulation short message reception behavior features;
The phone number and short message content of recipient is chosen from real user correlation stain data, and to the cell-phone number of recipient Code sends the short message content, and simulation short message sends behavior;
From real user correlation stain data choose caller phone number and future electricity condition be set to wait for, answer, It hangs up, corelation behaviour when analog phone arrives;
The phone number of called party is chosen from real user correlation stain data, and is made a phone call to the phone number, mould Plan makes a phone call behavior.
In the above method, the SIM card correlation stain data include:Phone number, imsi, imei, network operator or Person's SIM card sequence number.
Following system may be used to realize in the present invention:A kind of Malicious Code Detection environmental simulation system, is configured at no SIM In the prototype of card, including:
SIM card environmental simulation module, for being monitored to SIM card correlation API, if sample, which exists, obtains SIM card related data Behavior, then forge SIM card correlation stain data return to sample so that simulate SIM card environment;
Behavior modeling module, for forging real user correlation stain data, and based on the real user correlation stain data Simulate real user behavior;
Wherein, the real user correlation stain data, including:Phone correlation stain data, short message correlation stain data.
Further, it further includes:Stain database, for obtaining the SIM card correlation stain data and real user phase It closes stain data and stores.
Further, the SIM card environmental simulation module, is specifically used for:
SIM card correlation API is monitored using Runtime Hook technologies, if finding that sample exists obtains SIM card dependency number According to behavior when, then forge SIM card correlation stain data and return to sample.
Further, the Behavior modeling module, is specifically used for:
The phone number and short message content of sender is chosen from real user correlation stain data, builds the pdus data of short message Packet, is sent out in the form of broadcast, the broadcast that system is sent when simulation short message receives, and is inserted into one into short message correlation stain data Note data, simulation short message reception behavior features;
The phone number and short message content of recipient is chosen from real user correlation stain data, and to the cell-phone number of recipient Code sends the short message content, and simulation short message sends behavior;
From real user correlation stain data choose caller phone number and future electricity condition be set to wait for, answer, It hangs up, corelation behaviour when analog phone arrives;
The phone number of called party is chosen from real user correlation stain data, and is made a phone call to the phone number, mould Plan makes a phone call behavior.
In above system, the SIM card correlation stain data include:Phone number, imsi, imei, network operator or Person's SIM card sequence number.
It has the beneficial effect that:The present invention provides a kind of technical solution of Malicious Code Detection environmental simulation method and system, with Unlike conventional method, the technical program selects carrier of the prototype as detection environment, but there is no be configured inside prototype True SIM card.The present invention, if it has the behavior for obtaining SIM card related data, forges SIM by monitoring sample behavior The related stain data of card simultaneously return to sample, and then simulate SIM card environment, allow malicious code with for there are SIM cards;Secondly, base In the prototype correlation stain digital simulation real user behavior of forgery, including transmitting-receiving short message or the behaviors such as phone are taken, and then Triggering malicious act comprehensively.Simultaneously as the present invention is used as detection environment using prototype, and then effectively prevent malice generation The anti-simulator behavior of code, recall rate higher;Prototype is more superior relative to the performance of simulator, improves detection efficiency;Due to It does not need to using true SIM card, and then avoids the problem of user privacy information that may be brought due to system of real name is revealed.
Description of the drawings
In order to illustrate more clearly of technical scheme of the present invention, letter will be made to attached drawing needed in the embodiment below Singly introduce, it should be apparent that, the accompanying drawings in the following description is only some embodiments described in the present invention, for this field For those of ordinary skill, without creative efforts, other attached drawings are can also be obtained according to these attached drawings.
Fig. 1 is a kind of Malicious Code Detection environmental simulation embodiment of the method flow chart provided by the invention;
Fig. 2 is a kind of Malicious Code Detection environmental simulation system example structure figure provided by the invention.
Specific embodiment
The present invention gives a kind of Malicious Code Detection environmental simulation method and system embodiment, in order to make the art Personnel more fully understand technical solution in the embodiment of the present invention, and enable the above objects, features and advantages of the present invention It is more obvious understandable, technical solution in the present invention is described in further detail below in conjunction with the accompanying drawings:
As shown in Figure 1, the present invention provides a kind of Malicious Code Detection environmental simulation embodiment of the method, applied to no SIM card In prototype, including:
S101:SIM card correlation API is monitored, if sample has the behavior for obtaining SIM card related data, forges SIM card Related stain data return to sample and then simulate SIM card environment.
Specially:SIM card correlation API is monitored using Runtime Hook technologies, if sample, which exists, obtains SIM card During the behavior of related data, then forge SIM card correlation stain data and return to sample.
Wherein, the SIM card correlation API is monitored, including but not limited to:Phone information getLine1Number, Imsi id getSubscriberId, imei/MEID getDeviceId, cell phone carrier businessman GetNetworkOperatorName etc..It is that there are SIM cards that purpose, which allows malicious code to think under current environment,.
S102:Real user correlation stain data are forged, and true based on the real user correlation stain digital simulation User behavior.
Specifically include the combination of following one or two kinds of above simulation real user behavior:
The phone number and short message content of sender is chosen from real user correlation stain data, builds the pdus data of short message Packet, is sent out in the form of broadcast, the broadcast that system is sent when simulation short message receives, and is inserted into one into short message correlation stain data Note data, simulation short message reception behavior features;
Such as:The phone number of sender and short message content are forged into pdus data, create Intent, with " Android.provider.Telephony.SMS_RECEIVED's " broadcasts to sample;Simultaneously to short message correlation stain number According to the inbox in library, i.e. " content:A note data is inserted into //sms/inbox ", that is, completes the mould of short message reception behavior features Intend;
The phone number and short message content of recipient is chosen from real user correlation stain data, and to the cell-phone number of recipient Code sends the short message content, and simulation short message sends behavior;
Such as:Using adb the stain short message that a short message content is " hello " is sent to the phone number of recipient in prototype It is as follows to perform method for data:
$ adb shell am start -a android.intent.action.SENDTO -d sms:10000 --es sms_body "hello";
From real user correlation stain data choose caller phone number and future electricity condition be set to wait for, answer, It hangs up, corelation behaviour when analog phone arrives;
Such as:Using Runtime Hook technologies to android.telephony.TelephonyManager.listen methods It is monitored, when sample calls this method, incoming_number parameters is set as the i.e. caller of stain incoming number OnCallStateChanged parameters are set as coming electricity condition and wait for, answer or hang up by phone number.
The phone number of called party is chosen from real user correlation stain data, and electricity is dialed to the phone number Behavior is made a phone call in words, simulation.
Such as:It is dialed in prototype to stain number 10000 using adb, method is as follows:
$ adb shell am start -a android.intent.action.CALL -d tel:10000.It although can not It must very realize the behavior made a phone call, but be enough to trigger malicious act.
Wherein forge stain data method be:Official's API parameters are inquired, obtain SIM card related data, phone dependency number According to the data format with short message related data, and it is related dirty based on respective data format structure SIM card correlation stain data, phone Point data stain data related to short message.
Wherein, the SIM card correlation stain data include but not limited to:Phone number, imsi, imei, network operator, Network operator's number, SIM card sequence number, SIM card operator, SIM card operator number etc..
For example, the SIM card correlation stain data of structure can be:phone_num = str 13423178926(Mobile phone Number);imei = str 355136050214165(imei);imsi = str 310260000000000(imsi); network_operator_name = str cmcc (Network operator);network_operator = str 46002(Net Network operator numbers);sim_serial = str 89014103211118510720(Sim card sequence numbers);sim_ operator_name = str cmcc(Sim cards operator);sim_operator = str 46002(Sim cards operator compiles Number).
Wherein, the phone correlation stain data include but not limited to:Incoming information goes power information, missed call, has connect Incoming call etc..For example, the phone correlation stain data of structure can be:Incoming number:13418471943;Phone, which has, have been fetched Electricity, missed call etc..
Wherein, the short message correlation stain data include but not limited to:Short message content, reading short message, have been sent out unread short messages Short message, draft etc..For example, the short message correlation stain data of structure can be:Addressee's number:13833333333;Data Stream packet:pdus;Data packet format:format;Short message content:nihao,nide-shouji-yijing-qianfei;Short message is also There is rough draft, sent, received etc.;Further, can also include:content://sms/inbox(Inbox); content://sms/outbox(Send case);content://sms/draft(Draft).
As shown in Fig. 2, the present invention provides a kind of Malicious Code Detection environmental simulation system embodiment, it is configured at no SIM In the prototype of card, including:
SIM card environmental simulation module 201, for being monitored to SIM card correlation API, if sample, which exists, obtains SIM card dependency number According to behavior, then SIM card environmental simulation module 201 also forge SIM card correlation stain data return to sample so that simulate SIM card Environment;
Behavior modeling module 202, for forging real user correlation stain data, and based on the real user correlation stain number According to simulation real user behavior;
Wherein, the real user correlation stain data, including:Phone correlation stain data, short message correlation stain data.
Preferably, it further includes:Stain database is related to real user for obtaining the SIM card correlation stain data Stain data simultaneously store.
Wherein forge stain data method be:Official's API parameters are inquired, obtain SIM card related data, phone dependency number According to the data format with short message related data, and it is related dirty based on respective data format structure SIM card correlation stain data, phone Point data stain data related to short message.
Preferably, the SIM card environmental simulation module, is specifically used for:
SIM card correlation API is monitored using Runtime Hook technologies, if finding that sample exists obtains SIM card dependency number According to behavior when, then forge SIM card correlation stain data and return to sample.
Preferably, the Behavior modeling module, is specifically used for:
The phone number and short message content of sender is chosen from real user correlation stain data, builds the pdus data of short message Packet, is sent out in the form of broadcast, the broadcast that system is sent when simulation short message receives, and is inserted into one into short message correlation stain data Note data, simulation short message reception behavior features;
The phone number and short message content of recipient is chosen from real user correlation stain data, and to the cell-phone number of recipient Code sends the short message content, and simulation short message sends behavior;
From real user correlation stain data choose caller phone number and future electricity condition be set to wait for, answer, It hangs up, corelation behaviour when analog phone arrives;
The phone number of called party is chosen from real user correlation stain data, and is made a phone call to the phone number, mould Plan makes a phone call behavior.
In above system embodiment, the SIM card correlation stain data include:Phone number, imsi, imei, network fortune Seek quotient or SIM card sequence number.
Each embodiment in this specification is described by the way of progressive, the same or similar between each embodiment Just to refer each other for part, and the highlights of each of the examples are difference from other examples.Especially for system For embodiment, since it is substantially similar to embodiment of the method, so description is fairly simple, related part is implemented referring to method The part explanation of example.
Above-described embodiment gives Malicious Code Detection environmental simulation method and system, first, using prototype as malice The basic environment of code detection, and then avoid and simulator is identified as by malicious code, and then influence its malicious act and effectively touch The problem of hair;Secondly, the SIM card of real-name authentication is configured without in the embodiment of the present invention, but by monitoring SIM card correlation API, if malicious code exist call SIM card related data behavior, by forge SIM card correlation stain data feedback to Sample so that malicious code is mistakenly considered in the prototype environment that there are SIM cards, not only reduces the cost of Malicious Code Detection, and And it is capable of the individual privacy information of effective protection user;Finally, the real user correlation stain digital simulation based on forgery is true User behavior including transmitting-receiving short message or takes the real scenes such as phone, fully triggers malicious act, improve the inspection of malicious code Extracting rate.
Above example is to illustrative and not limiting technical scheme of the present invention.Appointing for spirit and scope of the invention is not departed from What modification or part are replaced, and are intended to be within the scope of the claims of the invention.

Claims (10)

1. a kind of Malicious Code Detection environmental simulation method, in the prototype applied to no SIM card, which is characterized in that including:
SIM card correlation API is monitored, if sample has the behavior for obtaining SIM card related data, forges SIM card correlation Stain data return to sample and then simulate SIM card environment;
Real user correlation stain data are forged, and based on the real user correlation stain digital simulation real user behavior;
Wherein, the real user correlation stain data, including:Phone correlation stain data, short message correlation stain data.
2. the method as described in claim 1, which is characterized in that further include:Obtain SIM card correlation stain data and true User's correlation stain data are simultaneously stored in stain database.
3. the method as described in claim 1, which is characterized in that pseudo- if sample has the behavior for obtaining SIM card related data It makes SIM card correlation stain data to return to sample and then simulate SIM card environment, specially:
SIM card correlation API is monitored using Runtime Hook technologies, if finding that sample exists obtains SIM card dependency number According to behavior when, then forge SIM card correlation stain data and return to sample.
4. the method as described in claim 1, which is characterized in that really used based on the real user correlation stain digital simulation Family behavior, including:
The phone number and short message content of sender is chosen from real user correlation stain data, builds the pdus data of short message Packet, is sent out in the form of broadcast, the broadcast that system is sent when simulation short message receives, and is inserted into one into short message correlation stain data Note data, simulation short message reception behavior features;
The phone number and short message content of recipient is chosen from real user correlation stain data, and to the cell-phone number of recipient Code sends the short message content, and simulation short message sends behavior;
From real user correlation stain data choose caller phone number and future electricity condition be set to wait for, answer, It hangs up, corelation behaviour when analog phone arrives;
The phone number of called party is chosen from real user correlation stain data, and is made a phone call to the phone number, mould Plan makes a phone call behavior.
5. the method as described in claim 1-4 is any, which is characterized in that the SIM card correlation stain data include:Cell-phone number Code, imsi, imei, network operator or SIM card sequence number.
6. a kind of Malicious Code Detection environmental simulation system, which is characterized in that it is configured in the prototype of no SIM card, including:
SIM card environmental simulation module, for being monitored to SIM card correlation API, if sample, which exists, obtains SIM card related data Behavior, then the SIM card environmental simulation module be additionally operable to forge SIM card correlation stain data return to sample and then simulation SIM card environment;
Behavior modeling module, for forging real user correlation stain data, and based on the real user correlation stain data Simulate real user behavior;
Wherein, the real user correlation stain data, including:Phone correlation stain data, short message correlation stain data.
7. system as claimed in claim 6, which is characterized in that further include:Stain database, for obtaining the SIM card phase It closes stain data stain data related to real user and stores.
8. system as claimed in claim 6, which is characterized in that the SIM card environmental simulation module is specifically used for:
SIM card correlation API is monitored using Runtime Hook technologies, if finding that sample exists obtains SIM card dependency number According to behavior when, then forge SIM card correlation stain data and return to sample.
9. system as claimed in claim 6, which is characterized in that the Behavior modeling module is specifically used for:
The phone number and short message content of sender is chosen from real user correlation stain data, builds the pdus data of short message Packet, is sent out in the form of broadcast, the broadcast that system is sent when simulation short message receives, and is inserted into one into short message correlation stain data Note data, simulation short message reception behavior features;
The phone number and short message content of recipient is chosen from real user correlation stain data, and to the cell-phone number of recipient Code sends the short message content, and simulation short message sends behavior;
From real user correlation stain data choose caller phone number and future electricity condition be set to wait for, answer, It hangs up, corelation behaviour when analog phone arrives;
The phone number of called party is chosen from real user correlation stain data, and is made a phone call to the phone number, mould Plan makes a phone call behavior.
10. the system as described in claim 6-9 is any, which is characterized in that the SIM card correlation stain data include:Mobile phone Number, imsi, imei, network operator or SIM card sequence number.
CN201611193315.8A 2016-12-21 2016-12-21 A kind of Malicious Code Detection environmental simulation method and system Pending CN108229165A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611193315.8A CN108229165A (en) 2016-12-21 2016-12-21 A kind of Malicious Code Detection environmental simulation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611193315.8A CN108229165A (en) 2016-12-21 2016-12-21 A kind of Malicious Code Detection environmental simulation method and system

Publications (1)

Publication Number Publication Date
CN108229165A true CN108229165A (en) 2018-06-29

Family

ID=62655912

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611193315.8A Pending CN108229165A (en) 2016-12-21 2016-12-21 A kind of Malicious Code Detection environmental simulation method and system

Country Status (1)

Country Link
CN (1) CN108229165A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050187740A1 (en) * 2004-02-20 2005-08-25 Marinescu Adrian M. System and method for proactive computer virus protection
CN101917688A (en) * 2010-08-16 2010-12-15 候万春 Mobile phone, system and method supporting transmission of hang-up short message from called party to calling party
CN101930514A (en) * 2010-08-12 2010-12-29 北京安天电子设备有限公司 Method and device for capturing malicious code of mobile terminal
CN102591696A (en) * 2011-01-14 2012-07-18 中国科学院软件研究所 Method and system for extracting behavioral data of mobile phone software
CN103186740A (en) * 2011-12-27 2013-07-03 北京大学 Automatic detection method for Android malicious software
CN103207969A (en) * 2013-04-12 2013-07-17 百度在线网络技术(北京)有限公司 Device and method for detecting Android malware
CN103729595A (en) * 2014-01-02 2014-04-16 东南大学 Method for offline detecting private data leakage of Android application program
CN105069354A (en) * 2015-07-31 2015-11-18 天津大学 Attack tree model based Android software hybrid detection method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050187740A1 (en) * 2004-02-20 2005-08-25 Marinescu Adrian M. System and method for proactive computer virus protection
CN101930514A (en) * 2010-08-12 2010-12-29 北京安天电子设备有限公司 Method and device for capturing malicious code of mobile terminal
CN101917688A (en) * 2010-08-16 2010-12-15 候万春 Mobile phone, system and method supporting transmission of hang-up short message from called party to calling party
CN102591696A (en) * 2011-01-14 2012-07-18 中国科学院软件研究所 Method and system for extracting behavioral data of mobile phone software
CN103186740A (en) * 2011-12-27 2013-07-03 北京大学 Automatic detection method for Android malicious software
CN103207969A (en) * 2013-04-12 2013-07-17 百度在线网络技术(北京)有限公司 Device and method for detecting Android malware
CN103729595A (en) * 2014-01-02 2014-04-16 东南大学 Method for offline detecting private data leakage of Android application program
CN105069354A (en) * 2015-07-31 2015-11-18 天津大学 Attack tree model based Android software hybrid detection method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
渠项栋: ""Android数据保护研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
蔡昌: ""Android平台恶意软件动态检测系统的设计与实现"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Similar Documents

Publication Publication Date Title
US9064112B2 (en) Malware detection for SMS/MMS based attacks
CN103747132B (en) The method of display message and terminal
CN103095895B (en) A kind of method and client sending mobile phone electronic business card
CN103763690A (en) Method and device for sending short messages to mobile terminal from detection fake base station
CN105335354A (en) Cheat information recognition method and device
Hamandi et al. Android SMS malware: Vulnerability and mitigation
CN104244206B (en) A kind of SMS processing method, device and terminal unit
CN105898001A (en) Method and device for processing communication information and server
CN104010068A (en) Text message processing method and device for mobile terminal
US8090393B1 (en) System and method for collecting and analyzing malicious code sent to mobile devices
CN104010064A (en) Networking number search method and device
CN105187605A (en) Telephone verification method and system
CN101984683A (en) Telephone number storage method and mobile terminal
CN109660984A (en) The number of taking turns network method, equipment and computer readable storage medium
CN113727352A (en) Managing spoofed calls to mobile devices
CN105721659B (en) Incoming call processing method and device
CN109858250A (en) A kind of Android Malicious Code Detection model method based on cascade classifier
CN102098640B (en) Method, device and system for distinguishing and stopping equipment from sending SMS (short messaging service) spam
KR101246624B1 (en) Method and appratus for detecting malicious communications
CN111901790A (en) Method, device, electronic device and storage medium for identifying telecommunication fraud
CN104506743B (en) A kind of method and device of dynamic interception phone
CN106102029A (en) The processing method of a kind of international roaming service and processing system
CN104683212B (en) Message treatment method and system
CN103369474B (en) Crosstalk reminding method and device
CN101222718B (en) Mobile communication terminal and method for catching rubbish short messages

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180629

WD01 Invention patent application deemed withdrawn after publication