CN108256326A - A kind of method, storage medium and electronic device that malicious code is prevented to compile - Google Patents
A kind of method, storage medium and electronic device that malicious code is prevented to compile Download PDFInfo
- Publication number
- CN108256326A CN108256326A CN201711360428.7A CN201711360428A CN108256326A CN 108256326 A CN108256326 A CN 108256326A CN 201711360428 A CN201711360428 A CN 201711360428A CN 108256326 A CN108256326 A CN 108256326A
- Authority
- CN
- China
- Prior art keywords
- class name
- compile
- former
- code
- malicious code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
This application discloses a kind of method, storage medium and electronic devices that malicious code is prevented to compile.The method of prevention malicious code compiling includes obtaining the former class name of Compile interface;Former class name is handled, generates new class name;Former class name is revised as new class name, so that malicious code can not quote Compile interface in compiling.By the above-mentioned means, the application can prevent malicious code from quoting Compile interface by fixed class name, the execution of malicious code can be effectively prevented.
Description
Technical field
This application involves computer safety fields, are situated between more particularly to a kind of method that malicious code is prevented to compile, storage
Matter and electronic device.
Background technology
Growing with various operating system mobile-terminal platforms, third party application emerges in multitude, and can not keep away
Exempt to carry malicious code in certain third party applications and the computer malice of such as virus, worm and wooden horse is soft
Part carries malicious code, there is significant security threat to operating system.
Invention content
The application is mainly solving the technical problems that provide a kind of method, storage medium and electricity that malicious code is prevented to compile
Sub-device can prevent malicious code from quoting Compile interface by fixed class name, effectively prevent the execution of malicious code.
In order to solve the above technical problems, the technical solution that the application uses is:A kind of prevention malicious code is provided to compile
The method translated.The method of prevention malicious code compiling includes obtaining the former class name of Compile interface;Former class name is handled, it is raw
Into new class name;Former class name is revised as new class name, so that malicious code can not quote Compile interface in compiling.
In order to solve the above technical problems, another technical solution that the application uses is:A kind of storage medium is provided.This is deposited
Storage media has program stored therein data, and program data can be readable by a computer, and program data is realized above-mentioned when being executed by processor
Method and step.
In order to solve the above technical problems, another technical solution that the application uses is:A kind of electronic device is provided.The electricity
Sub-device includes the processor and memory of connection, and memory is stored with computer program, and processor performs the computer program
When, realize the above method the step of.
The advantageous effect of the application is:The situation of the prior art is different from, this application discloses a kind of prevention malicious codes
Method, storage medium and the electronic device of compiling.The method of prevention malicious code compiling includes the former class for obtaining Compile interface
Name;Former class name is handled, generates new class name;Former class name is revised as new class name, so that malicious code can not in compiling
Quote Compile interface.By the above-mentioned means, the application by the former class name of Compile interface be revised as from new class names different before, with
Make malicious code can not direct cited system primary class name, and then can not quote Compile interface in compiling, it is automatic to collapse, this
Application prevents malicious code to quote the possibility of Compile interface by fixed class name from system source, effectively prevents from disliking
The execution of meaning code.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or it will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application, for those of ordinary skill in the art, without creative efforts, can be with
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram of one embodiment of method that malicious code is prevented to compile that the application provides;
Fig. 2 is the flow diagram of another embodiment of method that malicious code is prevented to compile that the application provides;
Fig. 3 is the flow diagram of the another embodiment of method that malicious code is prevented to compile that the application provides;
Fig. 4 is the structure diagram for one embodiment of storage medium that the application provides;
Fig. 5 is the structure diagram for one embodiment of electronic device that the application provides.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, the technical solution in the embodiment of the present application is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only the part of the embodiment of the application, instead of all the embodiments.It is based on
Embodiment in the application, those of ordinary skill in the art are obtained every other without making creative work
Embodiment shall fall in the protection scope of this application.
Mobile terminal in the embodiment of the present application is regarded including smart mobile phone, tablet computer, intelligent wearable device, digital sound
The electronic equipments such as frequency player, electronic reader, handheld game machine and vehicle electronic device.
Term " first " in the embodiment of the present application, " second ", " third " are only used for description purpose, and it is not intended that referring to
Show or imply relative importance or imply the quantity of the technical characteristic indicated by indicating." first ", " are defined as a result,
Two ", at least one this feature can be expressed or be implicitly included to the feature of " third ".In the description of the present application, " multiples' "
It is meant that at least two, such as two, three etc., unless otherwise specifically defined.In addition, term " comprising " and " having "
And their any deformations, it is intended that cover non-exclusive include.Such as contain the process of series of steps or unit, side
The step of method, system, product or equipment are not limited to list or unit, but optionally further include the step of not listing
Or it unit or optionally further includes for the intrinsic other steps of these processes, method, product or equipment or unit.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments
It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
Refering to Fig. 1, what the application provided prevents the flow diagram of one embodiment of method that malicious code compiles.
S11:Obtain the former class name of Compile interface.
Obtain the former class name of Compile interface.Specifically, whether the former class name for first determining whether Compile interface is to preset specific volume
Translate the former class name of interface;If so, obtain former class name;If it is not, skipping the Compile interface, the former class name of next Compile interface is obtained.
It is to be appreciated that and not all Compile interface all refer to sensitive data, be to being related to sensitive information or can endanger
The Compile interface setting precautionary measures of system safety, other Compile interfaces are not provided with precautionary measures, can reduce system resource not
Necessity waste.Precautionary measures are set to specific Compile interface, the execution of malicious code can be prevented from root, because of malice generation
Code is obtained reaches its purpose using system resource, if malicious code can not obtain the class name of the Compile interface of its needs, also just can not
Operation.
This is preset specific Compile interface and at least meets following conditions, can be in locally applied connection
The Compile interface of ActivityManagerService (active manager service) request privileges can distort local by it
The Compile interface of information.This preset specific Compile interface former class name include at least ActivityThread,
ActivityManagerNative、InstrumentationInfo。
Optionally, the remittance of qualified Compile interface is made into a list in advance, each Compile interface corresponds to one
Former class name obtains corresponding multiple former class names according to the list.Alternatively, the class of a specific Compile interface is set in initial system
List of file names after such list of file names is changed every time, correspondingly updates such list of file names.
S12:Former class name is handled, generates new class name.
Former class name is handled, generates new class name.Specifically, current time stamp is obtained, the time is added in former class name
Stamp, forms new class name.For example, adding timestamp at former class name end, former class name is such as changed
" android.app.ActivityThread " obtains current time stamp 20250831, generates new class name
“android.app.ActivityThread_20250831”.Alternatively, modification time is obtained, and such as 170432, made an addition to original
The middle part of class name or other positions can also be disperseed to make an addition to any position of former class name, to form new class name.
Optionally, other modes can also form new class name.For example, the entitled legal random words of former class are changed completely
Symbol string combination, to form new class name, to generation, the mode of former class name is not restricted the application.
S13:Former class name is revised as new class name.
Former class name is revised as new class name, including changing in the entitled new class name of former class of Compile interface and modification code
The entitled new class name of former class of reference.
After generating new class name, the entitled new class name of former class of corresponding Compile interface is first changed, to avoid malicious code pair
The reference of the primary specific class name of system, then change the entitled new class name of the former class quoted by code, with when other normal use energy
Enough normal operations.
The situation of the prior art is different from, present embodiment discloses a kind of methods that malicious code is prevented to compile to include:It obtains
Take the former class name of Compile interface;Former class name is handled, generates new class name;Former class name is revised as new class name, so that malice
Code can not quote Compile interface in compiling.By the above-mentioned means, the former class name of Compile interface is revised as therewith by the application
Preceding different new class name so that malicious code can not direct cited system primary class name, and then can not quote volume in compiling
Interface is translated, automatic to collapse, the application prevents malicious code to quote Compile interface by fixed class name from system source
Possibility effectively prevents the execution of malicious code.
Next embodiment will focus on introduction, after changing system class name, to the Disposal Measures of malicious code.
Referring to Fig.2, the flow diagram of another embodiment of method that malicious code is prevented to compile that the application provides.
S21:Obtain the former class name of Compile interface.
S22:Former class name is handled, generates new class name.
S23:Former class name is revised as new class name.
S24:Judge whether to detect crash info.
Judge whether to detect crash info, if so, performing step S25;If it is not, terminate operation.Treat that crash info generates
Afterwards or after setting duration, the crash info in detecting system again.
It is to be appreciated that crash info generates, system can detect at once, to perform next step;Or during by setting
After length, automated system operation is detected whether there are crash info, and to avoid the presence because of certain Bug, system cannot be at the first time
It reacts to the generation of crash info.
Malicious code is compiled by the primary class name of system, to perform illegal act.After primary class name is modified, malice
The class name of the Compile interface of code reference is not present, and malicious code can not be compiled, and then runs error, and malicious code collapses
It bursts, generates crash info, which is arrived by system detectio.
For example, the following malicious code of system operation:
Class<>ClzAT=Class.forName (" ActivityThread ");
Final Field f=clzAT.getField (" mAppThread ");
F.setObject (/ * replaces original mAppThread* /);
By more than code, can directly hook up in (Hook) whole system process it is all with Activity is relevant draws
With.
The mAppThread objects of script are substituted for the object of oneself by malicious code, so as to be the system framework of script most
It goes in the code of oneself, can do at will eventually.
The technical solution of the application is in the compiling of source cut-out malicious code.The class name quoted due to malicious code needs
" ActivityThread " is changed, thus attempts execution code " Class.forName (" ActivityThread ") " at it
When just directly return to sky, class name " ActivityThread " is not present, so malicious code can not carry out the volume of next step
It translates, and malicious code is caused to collapse, generate crash info.
S25:Crash info is sent to server.
Crash info is sent to server, the crash info is transmitted to server using the communication network in system.
It is to be appreciated that the operational capability and database information of the terminal device such as smart phone are limited, it is time-consuming and laborious for some
Task, terminal device can transmit it to server, very effective rate task can be completed by the computing capability of server.
S26:Receive the instruction that server response crash info returns.
Server can analyze the producing cause of crash info, judge its whether because to preset specific Compile interface class name into
Row operation, and lead to what code collapse generated, and feedback command.
S27:Response instruction performs corresponding operating to the code for causing crash info.
The instruction is responded, corresponding operating is performed to the code for causing crash info.The instruction includes the first instruction and second
Instruction if server returns to the first instruction, judges the code for malicious code, asks the user whether that the malicious code is forbidden to carry out
Compiling.If server returns to the second instruction, judge that the code for normal code, allows the code to be compiled.
It is to be appreciated that malicious code or normal code are present in application program, if it is determined that the code is malice generation
Code prompts the application program that user contains the malicious code that may be infected, and send whether instruction query user forbids
The application program is run.If user's selection forbids the application program to run, system can forbid all components of the application program
Operation.Otherwise, system does not perform any operation to the application program, and the malicious code still can not be compiled.
Optionally, the malicious code forbidden can be selected to be collected in a database user, according to the number of the database
According to the compiling for forbidding similar malicious code, security threat of the secondary system by similar malicious code is avoided.
In view of dynamically changing the class name of Compile interface, contribute to system that malicious code is further prevented to pass through fixed
Class name quotes Compile interface.Referring to Fig. 3, the flow of the another embodiment of method that malicious code is prevented to compile that the application provides
Schematic diagram.
S31:Judge whether to receive third instruction.
Judge whether to receive third instruction;Wherein, third instruction when system unlatching and system update by generating.If so,
Then perform step S32.If not receiving third instruction, system original state is kept.
It is to be appreciated that for just the former class name for presetting specific Compile interface is protected from the most initial time, in system
When update and system are opened, system generates third instruction, and third instruction is for activation system to presetting specific Compile interface
Former class name is modified, and does not leave any space being compiled using primary code of malicious code for.
Optionally, third instruction only by being generated during system update, after system update, can preset the class name of specific Compile interface
Primary class name is reverted to, can easily be quoted by malicious code, and is compiled, thus specific to systemic presupposition must compile and connect
The class name of mouth is modified immediately.
S32:Obtain the former class name of Compile interface.
S33:Former class name is handled, generates new class name.
S34:Former class name is revised as new class name, after set period of time, performs step S32.
Former class name is revised as new class name, after set period of time, performs step S32.I.e. former class name is revised as new class
After name, step S32, S33, S34 are repeated according to setting sequential, so that the class name of Compile interface becomes according to setting sequential
Change.
In view of nowadays, most terminal devices charge and keep long-time opening in time, thus it is necessary to set
Timing sequence repeats step S32, S33, S34, is compiled with being more effectively prevented from malicious code acquisition class name.For example,
With every three days or week age section update once preset specific Compile interface class name.
Refering to the structure diagram of Fig. 4, the application one embodiment of storage medium provided.
The storage medium 40 has program stored therein data 41, and program data 41 is realized when being executed by processor if Fig. 1 is to scheming
The 3 described methods that malicious code is prevented to compile.
The program data 41 is stored in a storage medium 40, including some instructions for so that a computer equipment
(can be with router, personal computer, server or network equipment etc.) or processor be performed described in each embodiment of the application
The all or part of step of method.Optionally, storage medium 40 can be USB flash disk, it is mobile hard disk, read-only memory (ROM), random
Access the various media that can store program data such as memory (RAM), disk or CD.
Refering to the structure diagram of Fig. 5, the application one embodiment of electronic device provided.
The electronic device 50 includes the processor 52 of connection and memory 51, memory 51 are stored with computer program, locates
When managing the execution computer program of device 52, the method for malicious code being prevented to compile as Fig. 1 to Fig. 3 is described is realized.
The situation of the prior art is different from, this application discloses a kind of method that malicious code is prevented to compile, storage mediums
And electronic device.The method of prevention malicious code compiling includes obtaining the former class name of Compile interface;Former class name is handled,
Generate new class name;Former class name is revised as new class name, so that malicious code can not quote Compile interface in compiling.By above-mentioned
Mode, the application by the former class name of Compile interface be revised as from new class names different before so that malicious code can not directly draw
With the primary class name of system, and then Compile interface can not be quoted in compiling, automatic to collapse, the application is prevented from system source
Malicious code quotes the possibility of Compile interface by fixed class name.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment
Point just to refer each other, and the highlights of each of the examples are difference from other examples.It is situated between especially for storage
For matter embodiment and electronics embodiment, since it is substantially similar to embodiment of the method, so fairly simple, the phase of description
Part is closed referring to the part of embodiment of the method to illustrate.
The application can be used in numerous general or special purpose computing system environments or configuration.Such as:Personal computer, service
Device computer, handheld device or portable device, laptop device, multicomputer system, the system based on microprocessor, top set
Box, programmable consumer-elcetronics devices, network PC, minicomputer, mainframe computer, including any of the above system or equipment
Distributed computing environment etc..
In several embodiments provided herein, it should be understood that disclosed method and equipment, Ke Yitong
Other modes are crossed to realize.For example, equipment embodiment described above is only schematical, for example, the module or
The division of unit, only a kind of division of logic function can have other dividing mode, such as multiple units in actual implementation
Or component may be combined or can be integrated into another system or some features can be ignored or does not perform.
The unit illustrated as separating component may or may not be physically separate, be shown as unit
The component shown may or may not be physical unit, you can be located at a place or can also be distributed to multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize present embodiment scheme
Purpose.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, also may be used
To be that each unit is individually physically present, can also two or more units integrate in a unit.It is above-mentioned integrated
The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
The foregoing is merely embodiments herein, not thereby limit the scope of the claims of the application, every to utilize this Shen
Please the equivalent structure or equivalent flow shift made of specification and accompanying drawing content, be directly or indirectly used in other relevant skills
Art field similarly includes in the scope of patent protection of the application.
Claims (10)
- A kind of 1. method that malicious code is prevented to compile, which is characterized in thatObtain the former class name of Compile interface;The former class name is handled, generates new class name;The former class name is revised as the new class name, so that malicious code can not quote the Compile interface in compiling.
- 2. the according to the method described in claim 1, it is characterized in that, step that the former class name is revised as to the new class name After rapid, further include:Judge whether to detect crash info;If so, the crash info is sent to server;It receives the server and responds the instruction that the crash info returns;Described instruction is responded, corresponding operating is performed to the code for causing the crash info.
- 3. according to the method described in claim 2, it is characterized in that, the response described instruction is to causing the crash info Code performs the step of corresponding operating, including:If the server returns to the first instruction, the code is judged for malicious code, asks the user whether to forbid the malice Code is compiled;If the server returns to the second instruction, judge that the code for normal code, allows the code to be compiled.
- 4. according to the method described in claim 1, it is characterized in that, it is described obtain Compile interface former class name the step of after, Including:Whether the former class name for judging the Compile interface is the former class name for presetting specific Compile interface;If so, obtain the former class name;If it is not, skipping the Compile interface, the former class name of next Compile interface is obtained.
- 5. according to the method described in claim 1, it is characterized in that, described handle the former class name, new class name is generated The step of, including:Obtain current time stamp;The timestamp is added in the former class name, forms the new class name.
- 6. the according to the method described in claim 1, it is characterized in that, step that the former class name is revised as to the new class name Suddenly, including:Change the entitled new class name of former class of the Compile interface;The entitled new class name of the former class quoted in modification code.
- 7. the according to the method described in claim 1, it is characterized in that, step that the former class name is revised as to the new class name After rapid, further include:Repeat the former class name for obtaining Compile interface according to setting sequential, to it is described the former class name is revised as described in The step of new class name, so that the class name of the Compile interface changes according to the setting sequential.
- 8. according to the method described in claim 1, it is characterized in that, it is described obtain Compile interface former class name the step of before, It further includes:Judge whether to receive third instruction;Wherein, the third instruction when system unlatching and system update by generating;If so, the step of performing the former class name of the acquisition Compile interface.
- 9. a kind of storage medium, which is characterized in that have program stored therein data, and described program data can be readable by a computer, described Program data realizes the method as described in claim 1-8 is any when being executed by processor.
- 10. a kind of electronic device, which is characterized in that processor and memory including connection, the memory are stored with calculating Machine program when the processor performs the computer program, is realized such as the step of any one of claim 1-8 the methods.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711360428.7A CN108256326A (en) | 2017-12-14 | 2017-12-14 | A kind of method, storage medium and electronic device that malicious code is prevented to compile |
PCT/CN2018/121085 WO2019114812A1 (en) | 2017-12-14 | 2018-12-14 | Method for preventing malicious code compilation, storage medium and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711360428.7A CN108256326A (en) | 2017-12-14 | 2017-12-14 | A kind of method, storage medium and electronic device that malicious code is prevented to compile |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108256326A true CN108256326A (en) | 2018-07-06 |
Family
ID=62723404
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711360428.7A Pending CN108256326A (en) | 2017-12-14 | 2017-12-14 | A kind of method, storage medium and electronic device that malicious code is prevented to compile |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108256326A (en) |
WO (1) | WO2019114812A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019114812A1 (en) * | 2017-12-14 | 2019-06-20 | 捷开通讯(深圳)有限公司 | Method for preventing malicious code compilation, storage medium and electronic device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103577757A (en) * | 2013-11-15 | 2014-02-12 | 北京奇虎科技有限公司 | Virus defending method and device |
US20140181973A1 (en) * | 2012-12-26 | 2014-06-26 | National Taiwan University Of Science And Technology | Method and system for detecting malicious application |
CN103914656A (en) * | 2014-03-25 | 2014-07-09 | 安一恒通(北京)科技有限公司 | Method and device for preventing monitoring of malware |
CN106650330A (en) * | 2016-12-22 | 2017-05-10 | 合肥国信车联网研究院有限公司 | Android application software reinforcement protection method based on DexClassloader |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108256326A (en) * | 2017-12-14 | 2018-07-06 | 捷开通讯(深圳)有限公司 | A kind of method, storage medium and electronic device that malicious code is prevented to compile |
-
2017
- 2017-12-14 CN CN201711360428.7A patent/CN108256326A/en active Pending
-
2018
- 2018-12-14 WO PCT/CN2018/121085 patent/WO2019114812A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140181973A1 (en) * | 2012-12-26 | 2014-06-26 | National Taiwan University Of Science And Technology | Method and system for detecting malicious application |
CN103577757A (en) * | 2013-11-15 | 2014-02-12 | 北京奇虎科技有限公司 | Virus defending method and device |
CN103914656A (en) * | 2014-03-25 | 2014-07-09 | 安一恒通(北京)科技有限公司 | Method and device for preventing monitoring of malware |
CN106650330A (en) * | 2016-12-22 | 2017-05-10 | 合肥国信车联网研究院有限公司 | Android application software reinforcement protection method based on DexClassloader |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019114812A1 (en) * | 2017-12-14 | 2019-06-20 | 捷开通讯(深圳)有限公司 | Method for preventing malicious code compilation, storage medium and electronic device |
Also Published As
Publication number | Publication date |
---|---|
WO2019114812A1 (en) | 2019-06-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10120775B2 (en) | Mobile development platform in a cloud based architecture | |
US10867050B2 (en) | Method and apparatus for generating dynamic security module | |
CN105844146B (en) | Method and device for protecting driver and electronic equipment | |
CN105718171B (en) | A kind of data processing method and terminal | |
CN104199703A (en) | Unattended setup management method and device | |
CN1869927B (en) | Device controller, method for controlling a device, and program therefor | |
JP2021502648A (en) | FPGA cloud host development method and system | |
CA2897628A1 (en) | Managing parameter types for generic functions | |
AU2005218288A1 (en) | Execution of unverified programs in a wireless device operating environment | |
CN104680075A (en) | Framework for fine-grain access control from high-level application permissions | |
Misra et al. | Android security: attacks and defenses | |
CN104969232A (en) | Managing device driver cross ring accesses | |
CN106605231A (en) | Accounts control | |
CN114936136A (en) | Business process monitoring method and device, computer equipment and storage medium | |
CN108959401B (en) | Information propagation monitoring and analyzing method, system, server and storage medium | |
CN108256326A (en) | A kind of method, storage medium and electronic device that malicious code is prevented to compile | |
EP3188071B1 (en) | Application accessing control method and device | |
CN114253441B (en) | Method and device for enabling target function, storage medium and electronic device | |
CN103702314A (en) | Stolen terminal processing method and equipment | |
CN107783765A (en) | file compiling method and device | |
CN114416396A (en) | Interface version control method and device, electronic equipment and storage medium | |
US20170286074A1 (en) | Electronic Device and Method for Multiple Compiling Platforms | |
Dejon et al. | Automated security analysis of IoT software updates | |
CN105519069A (en) | Data processing system, center apparatus and program | |
Nazar et al. | Rooting Android–Extending the ADB by an auto-connecting WiFi-accessible service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180706 |
|
RJ01 | Rejection of invention patent application after publication |