CN108256326A - A kind of method, storage medium and electronic device that malicious code is prevented to compile - Google Patents

A kind of method, storage medium and electronic device that malicious code is prevented to compile Download PDF

Info

Publication number
CN108256326A
CN108256326A CN201711360428.7A CN201711360428A CN108256326A CN 108256326 A CN108256326 A CN 108256326A CN 201711360428 A CN201711360428 A CN 201711360428A CN 108256326 A CN108256326 A CN 108256326A
Authority
CN
China
Prior art keywords
class name
compile
former
code
malicious code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711360428.7A
Other languages
Chinese (zh)
Inventor
涂斌健
梁虹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JRD Communication Shenzhen Ltd
Original Assignee
JRD Communication Shenzhen Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JRD Communication Shenzhen Ltd filed Critical JRD Communication Shenzhen Ltd
Priority to CN201711360428.7A priority Critical patent/CN108256326A/en
Publication of CN108256326A publication Critical patent/CN108256326A/en
Priority to PCT/CN2018/121085 priority patent/WO2019114812A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

This application discloses a kind of method, storage medium and electronic devices that malicious code is prevented to compile.The method of prevention malicious code compiling includes obtaining the former class name of Compile interface;Former class name is handled, generates new class name;Former class name is revised as new class name, so that malicious code can not quote Compile interface in compiling.By the above-mentioned means, the application can prevent malicious code from quoting Compile interface by fixed class name, the execution of malicious code can be effectively prevented.

Description

A kind of method, storage medium and electronic device that malicious code is prevented to compile
Technical field
This application involves computer safety fields, are situated between more particularly to a kind of method that malicious code is prevented to compile, storage Matter and electronic device.
Background technology
Growing with various operating system mobile-terminal platforms, third party application emerges in multitude, and can not keep away Exempt to carry malicious code in certain third party applications and the computer malice of such as virus, worm and wooden horse is soft Part carries malicious code, there is significant security threat to operating system.
Invention content
The application is mainly solving the technical problems that provide a kind of method, storage medium and electricity that malicious code is prevented to compile Sub-device can prevent malicious code from quoting Compile interface by fixed class name, effectively prevent the execution of malicious code.
In order to solve the above technical problems, the technical solution that the application uses is:A kind of prevention malicious code is provided to compile The method translated.The method of prevention malicious code compiling includes obtaining the former class name of Compile interface;Former class name is handled, it is raw Into new class name;Former class name is revised as new class name, so that malicious code can not quote Compile interface in compiling.
In order to solve the above technical problems, another technical solution that the application uses is:A kind of storage medium is provided.This is deposited Storage media has program stored therein data, and program data can be readable by a computer, and program data is realized above-mentioned when being executed by processor Method and step.
In order to solve the above technical problems, another technical solution that the application uses is:A kind of electronic device is provided.The electricity Sub-device includes the processor and memory of connection, and memory is stored with computer program, and processor performs the computer program When, realize the above method the step of.
The advantageous effect of the application is:The situation of the prior art is different from, this application discloses a kind of prevention malicious codes Method, storage medium and the electronic device of compiling.The method of prevention malicious code compiling includes the former class for obtaining Compile interface Name;Former class name is handled, generates new class name;Former class name is revised as new class name, so that malicious code can not in compiling Quote Compile interface.By the above-mentioned means, the application by the former class name of Compile interface be revised as from new class names different before, with Make malicious code can not direct cited system primary class name, and then can not quote Compile interface in compiling, it is automatic to collapse, this Application prevents malicious code to quote the possibility of Compile interface by fixed class name from system source, effectively prevents from disliking The execution of meaning code.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or it will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application, for those of ordinary skill in the art, without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram of one embodiment of method that malicious code is prevented to compile that the application provides;
Fig. 2 is the flow diagram of another embodiment of method that malicious code is prevented to compile that the application provides;
Fig. 3 is the flow diagram of the another embodiment of method that malicious code is prevented to compile that the application provides;
Fig. 4 is the structure diagram for one embodiment of storage medium that the application provides;
Fig. 5 is the structure diagram for one embodiment of electronic device that the application provides.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, the technical solution in the embodiment of the present application is carried out clear, complete Site preparation describes, it is clear that described embodiment is only the part of the embodiment of the application, instead of all the embodiments.It is based on Embodiment in the application, those of ordinary skill in the art are obtained every other without making creative work Embodiment shall fall in the protection scope of this application.
Mobile terminal in the embodiment of the present application is regarded including smart mobile phone, tablet computer, intelligent wearable device, digital sound The electronic equipments such as frequency player, electronic reader, handheld game machine and vehicle electronic device.
Term " first " in the embodiment of the present application, " second ", " third " are only used for description purpose, and it is not intended that referring to Show or imply relative importance or imply the quantity of the technical characteristic indicated by indicating." first ", " are defined as a result, Two ", at least one this feature can be expressed or be implicitly included to the feature of " third ".In the description of the present application, " multiples' " It is meant that at least two, such as two, three etc., unless otherwise specifically defined.In addition, term " comprising " and " having " And their any deformations, it is intended that cover non-exclusive include.Such as contain the process of series of steps or unit, side The step of method, system, product or equipment are not limited to list or unit, but optionally further include the step of not listing Or it unit or optionally further includes for the intrinsic other steps of these processes, method, product or equipment or unit.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
Refering to Fig. 1, what the application provided prevents the flow diagram of one embodiment of method that malicious code compiles.
S11:Obtain the former class name of Compile interface.
Obtain the former class name of Compile interface.Specifically, whether the former class name for first determining whether Compile interface is to preset specific volume Translate the former class name of interface;If so, obtain former class name;If it is not, skipping the Compile interface, the former class name of next Compile interface is obtained.
It is to be appreciated that and not all Compile interface all refer to sensitive data, be to being related to sensitive information or can endanger The Compile interface setting precautionary measures of system safety, other Compile interfaces are not provided with precautionary measures, can reduce system resource not Necessity waste.Precautionary measures are set to specific Compile interface, the execution of malicious code can be prevented from root, because of malice generation Code is obtained reaches its purpose using system resource, if malicious code can not obtain the class name of the Compile interface of its needs, also just can not Operation.
This is preset specific Compile interface and at least meets following conditions, can be in locally applied connection The Compile interface of ActivityManagerService (active manager service) request privileges can distort local by it The Compile interface of information.This preset specific Compile interface former class name include at least ActivityThread, ActivityManagerNative、InstrumentationInfo。
Optionally, the remittance of qualified Compile interface is made into a list in advance, each Compile interface corresponds to one Former class name obtains corresponding multiple former class names according to the list.Alternatively, the class of a specific Compile interface is set in initial system List of file names after such list of file names is changed every time, correspondingly updates such list of file names.
S12:Former class name is handled, generates new class name.
Former class name is handled, generates new class name.Specifically, current time stamp is obtained, the time is added in former class name Stamp, forms new class name.For example, adding timestamp at former class name end, former class name is such as changed " android.app.ActivityThread " obtains current time stamp 20250831, generates new class name “android.app.ActivityThread_20250831”.Alternatively, modification time is obtained, and such as 170432, made an addition to original The middle part of class name or other positions can also be disperseed to make an addition to any position of former class name, to form new class name.
Optionally, other modes can also form new class name.For example, the entitled legal random words of former class are changed completely Symbol string combination, to form new class name, to generation, the mode of former class name is not restricted the application.
S13:Former class name is revised as new class name.
Former class name is revised as new class name, including changing in the entitled new class name of former class of Compile interface and modification code The entitled new class name of former class of reference.
After generating new class name, the entitled new class name of former class of corresponding Compile interface is first changed, to avoid malicious code pair The reference of the primary specific class name of system, then change the entitled new class name of the former class quoted by code, with when other normal use energy Enough normal operations.
The situation of the prior art is different from, present embodiment discloses a kind of methods that malicious code is prevented to compile to include:It obtains Take the former class name of Compile interface;Former class name is handled, generates new class name;Former class name is revised as new class name, so that malice Code can not quote Compile interface in compiling.By the above-mentioned means, the former class name of Compile interface is revised as therewith by the application Preceding different new class name so that malicious code can not direct cited system primary class name, and then can not quote volume in compiling Interface is translated, automatic to collapse, the application prevents malicious code to quote Compile interface by fixed class name from system source Possibility effectively prevents the execution of malicious code.
Next embodiment will focus on introduction, after changing system class name, to the Disposal Measures of malicious code.
Referring to Fig.2, the flow diagram of another embodiment of method that malicious code is prevented to compile that the application provides.
S21:Obtain the former class name of Compile interface.
S22:Former class name is handled, generates new class name.
S23:Former class name is revised as new class name.
S24:Judge whether to detect crash info.
Judge whether to detect crash info, if so, performing step S25;If it is not, terminate operation.Treat that crash info generates Afterwards or after setting duration, the crash info in detecting system again.
It is to be appreciated that crash info generates, system can detect at once, to perform next step;Or during by setting After length, automated system operation is detected whether there are crash info, and to avoid the presence because of certain Bug, system cannot be at the first time It reacts to the generation of crash info.
Malicious code is compiled by the primary class name of system, to perform illegal act.After primary class name is modified, malice The class name of the Compile interface of code reference is not present, and malicious code can not be compiled, and then runs error, and malicious code collapses It bursts, generates crash info, which is arrived by system detectio.
For example, the following malicious code of system operation:
Class<>ClzAT=Class.forName (" ActivityThread ");
Final Field f=clzAT.getField (" mAppThread ");
F.setObject (/ * replaces original mAppThread* /);
By more than code, can directly hook up in (Hook) whole system process it is all with Activity is relevant draws With.
The mAppThread objects of script are substituted for the object of oneself by malicious code, so as to be the system framework of script most It goes in the code of oneself, can do at will eventually.
The technical solution of the application is in the compiling of source cut-out malicious code.The class name quoted due to malicious code needs " ActivityThread " is changed, thus attempts execution code " Class.forName (" ActivityThread ") " at it When just directly return to sky, class name " ActivityThread " is not present, so malicious code can not carry out the volume of next step It translates, and malicious code is caused to collapse, generate crash info.
S25:Crash info is sent to server.
Crash info is sent to server, the crash info is transmitted to server using the communication network in system. It is to be appreciated that the operational capability and database information of the terminal device such as smart phone are limited, it is time-consuming and laborious for some Task, terminal device can transmit it to server, very effective rate task can be completed by the computing capability of server.
S26:Receive the instruction that server response crash info returns.
Server can analyze the producing cause of crash info, judge its whether because to preset specific Compile interface class name into Row operation, and lead to what code collapse generated, and feedback command.
S27:Response instruction performs corresponding operating to the code for causing crash info.
The instruction is responded, corresponding operating is performed to the code for causing crash info.The instruction includes the first instruction and second Instruction if server returns to the first instruction, judges the code for malicious code, asks the user whether that the malicious code is forbidden to carry out Compiling.If server returns to the second instruction, judge that the code for normal code, allows the code to be compiled.
It is to be appreciated that malicious code or normal code are present in application program, if it is determined that the code is malice generation Code prompts the application program that user contains the malicious code that may be infected, and send whether instruction query user forbids The application program is run.If user's selection forbids the application program to run, system can forbid all components of the application program Operation.Otherwise, system does not perform any operation to the application program, and the malicious code still can not be compiled.
Optionally, the malicious code forbidden can be selected to be collected in a database user, according to the number of the database According to the compiling for forbidding similar malicious code, security threat of the secondary system by similar malicious code is avoided.
In view of dynamically changing the class name of Compile interface, contribute to system that malicious code is further prevented to pass through fixed Class name quotes Compile interface.Referring to Fig. 3, the flow of the another embodiment of method that malicious code is prevented to compile that the application provides Schematic diagram.
S31:Judge whether to receive third instruction.
Judge whether to receive third instruction;Wherein, third instruction when system unlatching and system update by generating.If so, Then perform step S32.If not receiving third instruction, system original state is kept.
It is to be appreciated that for just the former class name for presetting specific Compile interface is protected from the most initial time, in system When update and system are opened, system generates third instruction, and third instruction is for activation system to presetting specific Compile interface Former class name is modified, and does not leave any space being compiled using primary code of malicious code for.
Optionally, third instruction only by being generated during system update, after system update, can preset the class name of specific Compile interface Primary class name is reverted to, can easily be quoted by malicious code, and is compiled, thus specific to systemic presupposition must compile and connect The class name of mouth is modified immediately.
S32:Obtain the former class name of Compile interface.
S33:Former class name is handled, generates new class name.
S34:Former class name is revised as new class name, after set period of time, performs step S32.
Former class name is revised as new class name, after set period of time, performs step S32.I.e. former class name is revised as new class After name, step S32, S33, S34 are repeated according to setting sequential, so that the class name of Compile interface becomes according to setting sequential Change.
In view of nowadays, most terminal devices charge and keep long-time opening in time, thus it is necessary to set Timing sequence repeats step S32, S33, S34, is compiled with being more effectively prevented from malicious code acquisition class name.For example, With every three days or week age section update once preset specific Compile interface class name.
Refering to the structure diagram of Fig. 4, the application one embodiment of storage medium provided.
The storage medium 40 has program stored therein data 41, and program data 41 is realized when being executed by processor if Fig. 1 is to scheming The 3 described methods that malicious code is prevented to compile.
The program data 41 is stored in a storage medium 40, including some instructions for so that a computer equipment (can be with router, personal computer, server or network equipment etc.) or processor be performed described in each embodiment of the application The all or part of step of method.Optionally, storage medium 40 can be USB flash disk, it is mobile hard disk, read-only memory (ROM), random Access the various media that can store program data such as memory (RAM), disk or CD.
Refering to the structure diagram of Fig. 5, the application one embodiment of electronic device provided.
The electronic device 50 includes the processor 52 of connection and memory 51, memory 51 are stored with computer program, locates When managing the execution computer program of device 52, the method for malicious code being prevented to compile as Fig. 1 to Fig. 3 is described is realized.
The situation of the prior art is different from, this application discloses a kind of method that malicious code is prevented to compile, storage mediums And electronic device.The method of prevention malicious code compiling includes obtaining the former class name of Compile interface;Former class name is handled, Generate new class name;Former class name is revised as new class name, so that malicious code can not quote Compile interface in compiling.By above-mentioned Mode, the application by the former class name of Compile interface be revised as from new class names different before so that malicious code can not directly draw With the primary class name of system, and then Compile interface can not be quoted in compiling, automatic to collapse, the application is prevented from system source Malicious code quotes the possibility of Compile interface by fixed class name.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Point just to refer each other, and the highlights of each of the examples are difference from other examples.It is situated between especially for storage For matter embodiment and electronics embodiment, since it is substantially similar to embodiment of the method, so fairly simple, the phase of description Part is closed referring to the part of embodiment of the method to illustrate.
The application can be used in numerous general or special purpose computing system environments or configuration.Such as:Personal computer, service Device computer, handheld device or portable device, laptop device, multicomputer system, the system based on microprocessor, top set Box, programmable consumer-elcetronics devices, network PC, minicomputer, mainframe computer, including any of the above system or equipment Distributed computing environment etc..
In several embodiments provided herein, it should be understood that disclosed method and equipment, Ke Yitong Other modes are crossed to realize.For example, equipment embodiment described above is only schematical, for example, the module or The division of unit, only a kind of division of logic function can have other dividing mode, such as multiple units in actual implementation Or component may be combined or can be integrated into another system or some features can be ignored or does not perform.
The unit illustrated as separating component may or may not be physically separate, be shown as unit The component shown may or may not be physical unit, you can be located at a place or can also be distributed to multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize present embodiment scheme Purpose.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, also may be used To be that each unit is individually physically present, can also two or more units integrate in a unit.It is above-mentioned integrated The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
The foregoing is merely embodiments herein, not thereby limit the scope of the claims of the application, every to utilize this Shen Please the equivalent structure or equivalent flow shift made of specification and accompanying drawing content, be directly or indirectly used in other relevant skills Art field similarly includes in the scope of patent protection of the application.

Claims (10)

  1. A kind of 1. method that malicious code is prevented to compile, which is characterized in that
    Obtain the former class name of Compile interface;
    The former class name is handled, generates new class name;
    The former class name is revised as the new class name, so that malicious code can not quote the Compile interface in compiling.
  2. 2. the according to the method described in claim 1, it is characterized in that, step that the former class name is revised as to the new class name After rapid, further include:
    Judge whether to detect crash info;
    If so, the crash info is sent to server;
    It receives the server and responds the instruction that the crash info returns;
    Described instruction is responded, corresponding operating is performed to the code for causing the crash info.
  3. 3. according to the method described in claim 2, it is characterized in that, the response described instruction is to causing the crash info Code performs the step of corresponding operating, including:
    If the server returns to the first instruction, the code is judged for malicious code, asks the user whether to forbid the malice Code is compiled;
    If the server returns to the second instruction, judge that the code for normal code, allows the code to be compiled.
  4. 4. according to the method described in claim 1, it is characterized in that, it is described obtain Compile interface former class name the step of after, Including:
    Whether the former class name for judging the Compile interface is the former class name for presetting specific Compile interface;
    If so, obtain the former class name;
    If it is not, skipping the Compile interface, the former class name of next Compile interface is obtained.
  5. 5. according to the method described in claim 1, it is characterized in that, described handle the former class name, new class name is generated The step of, including:
    Obtain current time stamp;
    The timestamp is added in the former class name, forms the new class name.
  6. 6. the according to the method described in claim 1, it is characterized in that, step that the former class name is revised as to the new class name Suddenly, including:
    Change the entitled new class name of former class of the Compile interface;
    The entitled new class name of the former class quoted in modification code.
  7. 7. the according to the method described in claim 1, it is characterized in that, step that the former class name is revised as to the new class name After rapid, further include:
    Repeat the former class name for obtaining Compile interface according to setting sequential, to it is described the former class name is revised as described in The step of new class name, so that the class name of the Compile interface changes according to the setting sequential.
  8. 8. according to the method described in claim 1, it is characterized in that, it is described obtain Compile interface former class name the step of before, It further includes:
    Judge whether to receive third instruction;Wherein, the third instruction when system unlatching and system update by generating;
    If so, the step of performing the former class name of the acquisition Compile interface.
  9. 9. a kind of storage medium, which is characterized in that have program stored therein data, and described program data can be readable by a computer, described Program data realizes the method as described in claim 1-8 is any when being executed by processor.
  10. 10. a kind of electronic device, which is characterized in that processor and memory including connection, the memory are stored with calculating Machine program when the processor performs the computer program, is realized such as the step of any one of claim 1-8 the methods.
CN201711360428.7A 2017-12-14 2017-12-14 A kind of method, storage medium and electronic device that malicious code is prevented to compile Pending CN108256326A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201711360428.7A CN108256326A (en) 2017-12-14 2017-12-14 A kind of method, storage medium and electronic device that malicious code is prevented to compile
PCT/CN2018/121085 WO2019114812A1 (en) 2017-12-14 2018-12-14 Method for preventing malicious code compilation, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711360428.7A CN108256326A (en) 2017-12-14 2017-12-14 A kind of method, storage medium and electronic device that malicious code is prevented to compile

Publications (1)

Publication Number Publication Date
CN108256326A true CN108256326A (en) 2018-07-06

Family

ID=62723404

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711360428.7A Pending CN108256326A (en) 2017-12-14 2017-12-14 A kind of method, storage medium and electronic device that malicious code is prevented to compile

Country Status (2)

Country Link
CN (1) CN108256326A (en)
WO (1) WO2019114812A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019114812A1 (en) * 2017-12-14 2019-06-20 捷开通讯(深圳)有限公司 Method for preventing malicious code compilation, storage medium and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577757A (en) * 2013-11-15 2014-02-12 北京奇虎科技有限公司 Virus defending method and device
US20140181973A1 (en) * 2012-12-26 2014-06-26 National Taiwan University Of Science And Technology Method and system for detecting malicious application
CN103914656A (en) * 2014-03-25 2014-07-09 安一恒通(北京)科技有限公司 Method and device for preventing monitoring of malware
CN106650330A (en) * 2016-12-22 2017-05-10 合肥国信车联网研究院有限公司 Android application software reinforcement protection method based on DexClassloader

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256326A (en) * 2017-12-14 2018-07-06 捷开通讯(深圳)有限公司 A kind of method, storage medium and electronic device that malicious code is prevented to compile

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140181973A1 (en) * 2012-12-26 2014-06-26 National Taiwan University Of Science And Technology Method and system for detecting malicious application
CN103577757A (en) * 2013-11-15 2014-02-12 北京奇虎科技有限公司 Virus defending method and device
CN103914656A (en) * 2014-03-25 2014-07-09 安一恒通(北京)科技有限公司 Method and device for preventing monitoring of malware
CN106650330A (en) * 2016-12-22 2017-05-10 合肥国信车联网研究院有限公司 Android application software reinforcement protection method based on DexClassloader

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019114812A1 (en) * 2017-12-14 2019-06-20 捷开通讯(深圳)有限公司 Method for preventing malicious code compilation, storage medium and electronic device

Also Published As

Publication number Publication date
WO2019114812A1 (en) 2019-06-20

Similar Documents

Publication Publication Date Title
US10120775B2 (en) Mobile development platform in a cloud based architecture
US10867050B2 (en) Method and apparatus for generating dynamic security module
CN105844146B (en) Method and device for protecting driver and electronic equipment
CN105718171B (en) A kind of data processing method and terminal
CN104199703A (en) Unattended setup management method and device
CN1869927B (en) Device controller, method for controlling a device, and program therefor
JP2021502648A (en) FPGA cloud host development method and system
CA2897628A1 (en) Managing parameter types for generic functions
AU2005218288A1 (en) Execution of unverified programs in a wireless device operating environment
CN104680075A (en) Framework for fine-grain access control from high-level application permissions
Misra et al. Android security: attacks and defenses
CN104969232A (en) Managing device driver cross ring accesses
CN106605231A (en) Accounts control
CN114936136A (en) Business process monitoring method and device, computer equipment and storage medium
CN108959401B (en) Information propagation monitoring and analyzing method, system, server and storage medium
CN108256326A (en) A kind of method, storage medium and electronic device that malicious code is prevented to compile
EP3188071B1 (en) Application accessing control method and device
CN114253441B (en) Method and device for enabling target function, storage medium and electronic device
CN103702314A (en) Stolen terminal processing method and equipment
CN107783765A (en) file compiling method and device
CN114416396A (en) Interface version control method and device, electronic equipment and storage medium
US20170286074A1 (en) Electronic Device and Method for Multiple Compiling Platforms
Dejon et al. Automated security analysis of IoT software updates
CN105519069A (en) Data processing system, center apparatus and program
Nazar et al. Rooting Android–Extending the ADB by an auto-connecting WiFi-accessible service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180706

RJ01 Rejection of invention patent application after publication