CN108734007A - A kind of processing method and processing device of monitoring application program - Google Patents

A kind of processing method and processing device of monitoring application program Download PDF

Info

Publication number
CN108734007A
CN108734007A CN201710240393.7A CN201710240393A CN108734007A CN 108734007 A CN108734007 A CN 108734007A CN 201710240393 A CN201710240393 A CN 201710240393A CN 108734007 A CN108734007 A CN 108734007A
Authority
CN
China
Prior art keywords
application program
behavior
sensitive behavior
function parameter
sensitive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710240393.7A
Other languages
Chinese (zh)
Inventor
罗汉斌
阿曼太
傅强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heng Jia Jia (beijing) Technology Co Ltd
China Mobile Group Shanghai Co Ltd
Eversec Beijing Technology Co Ltd
Original Assignee
Heng Jia Jia (beijing) Technology Co Ltd
China Mobile Group Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Heng Jia Jia (beijing) Technology Co Ltd, China Mobile Group Shanghai Co Ltd filed Critical Heng Jia Jia (beijing) Technology Co Ltd
Priority to CN201710240393.7A priority Critical patent/CN108734007A/en
Publication of CN108734007A publication Critical patent/CN108734007A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the present invention provides a kind of processing method and processing device of monitoring application program, the method includes:During the virtual machine after being loaded with modification system source code runs the application program, the function parameter of the application program is called in extraction;According to pre-stored strategy matching file and the function parameter, the operational process of the application program is monitored, to obtain the sensitive behavior when application program is run.Described device executes the above method.The processing method of monitoring application program provided in an embodiment of the present invention, can monitor the operation overall process of application program, and comprehensively obtain the running sensitive operation behavior of application program.

Description

A kind of processing method and processing device of monitoring application program
Technical field
The present embodiments relate to virtual machine technique fields, and in particular to a kind of processing method and dress of monitoring application program It sets.
Background technology
With the development of mobile communication technology, more and more application programs operate in mobile terminal, some virus, wooden horses Deng the privacy by application program snooping people, the normal life of people is seriously affected, therefore, application program has been supervised Control, to identify whether mobile terminal has the application program of operation exception, it appears particularly important.
The method of existing monitoring application program has (by taking Android system as an example):To application program (Android Package, Hereinafter referred to as APK) after decompiling, then for sensitive applications interface (Application Program Interface, with Lower abbreviation api) calling station increase logcat inputs, then beat again packet, be installed in mobile terminal or virtual machine and run, it is logical The logcat outputs in monitoring application program operational process are crossed, identify the application program of operation exception.But this method can only For the application program of early stage, current application program mostly uses greatly shell adding and reinforces or add anti-decompiling, bob-weight baling press System, causes this method to fail.Existing method also has:By hook (hook, actually one processing message program segment, Called by system, it be linked into system) mode hook system java interfaces obtain in real time application program operation behavior, but The operation that hook acts later application program can only be monitored, and ndk (Native Development Kit) layer can not be monitored Sensitive operation.
Therefore, the operation overall process of application program how is monitored, and comprehensively obtains the running sensitive behaviour of application program Make behavior, becoming need solve the problems, such as.
Invention content
In view of the problems of the existing technology, the embodiment of the present invention provides a kind of processing method and dress of monitoring application program It sets.
On the one hand, the embodiment of the present invention provides a kind of processing method of monitoring application program, the method includes:
During the virtual machine after being loaded with modification system source code runs the application program, answered described in extraction calling With the function parameter of program;
According to pre-stored strategy matching file and the function parameter, to the operational process of the application program It is monitored, to obtain the sensitive behavior when application program is run.
On the other hand, the embodiment of the present invention provides a kind of processing unit of monitoring application program, and described device includes:
Extraction unit, for after being loaded with modification system source code virtual machine run the application program during, The function parameter of the application program is called in extraction;
Monitoring unit, for according to pre-stored strategy matching file and the function parameter, journey to be applied to described The operational process of sequence is monitored, to obtain the sensitive behavior when application program is run.
The processing method of monitoring application program provided in an embodiment of the present invention, can monitor the full mistake of operation of application program Journey, and comprehensively obtain the running sensitive operation behavior of application program.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Some bright embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram for the processing method that the embodiment of the present invention monitors application program;
Fig. 2 is the structural schematic diagram for the processing unit that the embodiment of the present invention monitors application program;
Fig. 3 is device entity structural schematic diagram provided in an embodiment of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art The every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Fig. 1 is the flow diagram for the processing method that the embodiment of the present invention monitors application program, as shown in Figure 1, of the invention The processing method for the monitoring application program that embodiment provides, includes the following steps:
S1:During the virtual machine after being loaded with modification system source code runs the application program, institute is called in extraction State the function parameter of application program.
Specifically, device carries during the virtual machine after being loaded with modification system source code runs the application program Take the function parameter for calling the application program.It should be noted that:The virtual machine of unmodified system source code, can not extract tune With the function parameter of application program (Android Package, hereinafter referred to as APK).The function parameter may include the function Input value and return value, different APK are corresponding with different function parameters.In framework layer (including application layer, the frame of original system Layer, running environment layer and inner nuclear layer), by the corresponding location determination of framework layer it is APK that needs are monitored, monitoring point, and write Enter modified system source code, since above-mentioned framework layer is relevant with ndk layers, so as to monitor ndk layers of sensitive row For the application program in the embodiment of the present invention is the application program of above-mentioned needs monitoring unless otherwise instructed.It is answered with obtaining mobile phone Illustrate being amended as follows for system source code with concrete example for the application program of table:
Landroid/app/ApplicationPackageManager;
List<PackageInfo>getInstalledPackages(int flags);Obtain mobile phone application table
\android\frameworks\base\core\java\android\app\ ApplicationPackageManager.java
Wherein:The first row be really need the corresponding monitoring point of application program, the second row that monitor be execute the needs monitoring Application program transfer function, the third line be written modification system source code path and file, it can be seen that:In path " frameworks " correspond to framework layer in ccf layer, different monitoring points is required for different roads in original system source code Different monitor codes is written in diameter, the corresponding monitoring point of application program that other needs monitor, the application for executing needs monitoring The path of program transferred function, modification system source code is written and file are as follows, and specific description repeats no more.
Create new process application program:Ljava/lang/ProcessBuilder;
Start creates new process
\libcore\luni\src\main\java\java\lang;
Initialize application program:
Landroid/content/Intent;
Intent is initialized
Intent\android\frameworks\base\core\java\android\content\Intent.java;
Call the application program of Intent:
Landroid/content/Intent;
SetAction calls Intent's
setAction\android\frameworks\base\core\java\android\content\ Intent.java;
Add suspension windows application program:
Landroid/view/WindowManager;
LayoutParams adds suspension windows
\android\frameworks\base\core\java\android\view\WindowManager.java;
Wake up screen locking application program:
Landroid/os/PowerManager;
WakeUp () wakes up screen locking
\android\frameworks\base\core\java\android\os\PowerManager.java;
Detect mobile phone whether standby mode application program:
Landroid/app/KeyguardManager
InKeyguardRestrictedInputMode () detect mobile phone whether standby mode
\android\frameworks\base\core\java\android\app\KeyguardManager.java;
Use ssl safety communication application programs:
Ljavax/net/ssl/SSLContext;
getInstance("TLS");Use ssl safety communications
\android\libcore\luni\src\main\java\javax\net\ssl\SSLContext.java;
Obtain encrypted instance application program:
Ljavax/crypto/Cipher;
getInstance("DES");Obtain encrypted instance
\android\libcore\luni\src\main\java\javax\crypto\Cipher.java;
Call hash algorithm application program:
Ljava/security/MessageDigest;
GetInstance (" MD5 ") calls hash algorithm
\android\libcore\luni\src\main\java\java\security\MessageDigest.java;
Search alternative document application program:
Ljava/io/file;
File.list () searches alternative document
libcore/luni/src/main/java/java/io/File.java;
Dynamic registration receiver application program:
Landroid/content/ContextWrapper;
registerReceiver(myReceiver,filter);Dynamic registration receiver
\android\frameworks\base\core\java\android\content\ ContextWrapper.java;
Obtain FirstHeader, LastHeader, Headers application program:
Lorg/apache/http/message/AbstractHttpMessage
"getFirstHeader(""Set-Cookie"");
getLastHeader(""Set-Cookie"");
getHeaders(""Set-Cookie"");It " obtains
cookies\external\apache-http\src\org\apache\http\message\ AbstractHttpMessage.java;
Activate application program:
Landroid/app/Activity
StartActivity (Intent intent) is activated
Activity\android\frameworks\base\core\java\android\app\Activity.java;
Interface covering detection application program:
Landroid/widget/Toast;
The covering detection of the interfaces makeText
\android\frameworks\base\core\java\android\wigget\Toast.java;
Before the step of carrying out S1, in order to ensure the normal startup of the virtual machine after modification system source code, it is also necessary into The following commissioning test test of row:
(1) the new system source code after the completion of modification is compiled, it can be in/out/target/ after compiling successfully System image file userdata.img, system.img and ramdisk.img are generated under product/generi catalogues, then are compiled Android system kernel source code is translated, kernel-qemu kernel mirror image files can be generated after compiling successfully.
(2) corresponding in covering Android Software Development Kit (Software Development Kit, hereinafter referred to as SDK) Original system mirror image catalogue in file of the same name, if modification source code system version be 4.4.2 then its corresponding API level For Android-19, it is therefore desirable to by android-sdk-linux/system-images/android-19/default/ Userdata.img, system.img and ramdisk.img and kernel-qemu under armeabi-v7a catalogues are covered as Compiled good image file.
(3) virtual machine AVD Manager tools are run, the operation of AVD simulators is created, if virtual machine startup is normal, depending on It is implanted into modified system source code success for virtual machine, after otherwise needing investigation problem, and remodifies system source code, then execute Above-mentioned steps, until virtual machine starts normally.
S2:According to pre-stored strategy matching file and the function parameter, the operation to the application program Journey is monitored, to obtain the sensitive behavior when application program is run.
Specifically, device is according to pre-stored strategy matching file and the function parameter, to the application program Operational process be monitored, to obtain the sensitive behavior when application program is run.It should be noted that:Strategy matching text Part may include the sample characteristics for having sensitive behavior, and sample characteristics can pass through sample learning training and obtain, and reflect sensitive row For inherent feature.Sensitive behavior may include the sensitive behavior, the sensitive behavior of network behavior, file of virtual machine testing shielding The sensitive behavior of operation, the sensitive behavior of privacy behavior, the sensitive behavior of network application, sensitive behavior of system process etc., more Add specific description as shown in table 1:
Table 1
Sensitive behavior monitoring function is the calling to system API and records corresponding recalls information, according to known sensitivity The analysis of behavior is it is found that these sensitive behaviors are concentrated mainly on backstage networking, operating database, backstage transmission message, steal use The realization of family privacy etc., these behaviors has corresponding API in systems, therefore shows APK when APK calls this system API Trigger such sensitive behavior.It is illustrated below:
Network behavior monitors:
Networking mode in android system is more, and including socket, URL etc., API has HttpGet, HttpPost Deng when APK triggers networking behavior, the networking information such as URL can be obtained.
Send message monitoring:
The API of short message is sent in android system mainly including sendText, sendDataMessage etc., when APK is tactile When hair sends short message behavior, the content etc. of the destination address, short message that send short message can be got.
The monitoring of operating database:
Some application datas in android system are generally held in local data base, such as contact person, call note Record etc. preserves all in the form of database.Operating database is mainly by ContentResover classes in Android The API such as query, insert, delete, update operate database;When APK operating databases, it can be obtained Operation behavior and the database name of operation.
Steal privacy of user monitoring:
The privacy of user that malice APK is obtained includes mainly the information such as subscriber phone number, IMEI, position, android system In its corresponding API include getLine1Number, get DeviceId etc.;Phase is carried out when APK carries out these sensitive behaviors The record answered.
The processing method of monitoring application program provided in an embodiment of the present invention, can monitor the full mistake of operation of application program Journey, and comprehensively obtain the running sensitive operation behavior of application program.
It is on the basis of the above embodiments, described according to pre-stored strategy matching file and the function parameter, The operational process of the application program is monitored, to obtain the sensitive behavior when application program is run, including:
The function parameter is sent to journal output module, the journal output module is previously stored with the strategy With file, the strategy matching file includes sensitive behavior sample characteristics.
Specifically, the function parameter is sent to journal output module by device, the journal output module prestores It includes sensitive behavior sample characteristics to have the strategy matching file, the strategy matching file.It should be noted that:Daily record is defeated The function parameter of acquisition can be stored by going out module, and sample characteristics can be carried out in journal output module and are joined with the function after parsing Several aspect ratios pair.
Parse the function parameter in the journal output module, and by the analysis result of the function parameter with it is described Sensitive behavior sample characteristics are compared.
Specifically, device parses the function parameter in the journal output module, and by the solution of the function parameter Analysis result is compared with the sensitive behavior sample characteristics.Parsing is illustrated below:Record all sensitivities that APK is called API and its function parameter, while the process UID belonging to the secondary behavior is recorded, for determining the behavior is sent out by which APK , then all log information is obtained by logcat and shell and is parsed.
According to the comparison as a result, to obtain the sensitive behavior when application program is run.
Specifically, device according to the comparison as a result, to obtain the sensitive behavior when application program is run.It will solution The result of analysis is compared with sensitive behavior sample characteristics, if sensitive behavior sample characteristics and the result of parsing match, recognizes Sensitive behavior is produced when being run for APK, for example contains transmission short message, acquisition user mobile phone number etc..If sensitive behavior sample is special Sign and the result of parsing mismatch, then it is assumed that APK does not generate sensitive behavior when running.
The processing method of monitoring application program provided in an embodiment of the present invention, by carrying out feature in journal output module It compares, more automatically realizes the operation overall process of monitoring application program, and it is running quick comprehensively to obtain application program Feel operation behavior.
On the basis of the above embodiments, it is described according to the comparison as a result, when being run with obtaining the application program Sensitive behavior after, the method further includes:
By the sensitive behavior got and the strategy matching file generated in the same report.
Specifically, device by the sensitive behavior got and the strategy matching file generated in the same report In.It can be by checking or download offline this report online, facilitating inquiry and managing the sensitive behavior.
The processing method of monitoring application program provided in an embodiment of the present invention, generation includes sensitive behavior and strategy matching The same report of file, convenient for being inquired sensitive behavior and being managed.
On the basis of the above embodiments, the function parameter includes:The input value and return value of the function.
Specifically, the function parameter in device includes:The input value and return value of the function.It can refer to above-mentioned reality Example is applied, is repeated no more.
It is provided in an embodiment of the present invention monitoring application program processing method, by extract function parameter in input value and The monitoring to application program can be realized in return value.
On the basis of the above embodiments, the sensitive behavior includes the sensitive row for the virtual machine testing shielding For, the sensitive behavior of network behavior, the sensitive behavior of file operation, the sensitive behavior of privacy behavior, network application sensitive row For the sensitive behavior of, system process.
Specifically, the sensitive behavior in device includes the sensitive behavior for being directed to the virtual machine testing shielding, network The sensitive behavior of behavior, the sensitive behavior of file operation, the sensitive behavior of privacy behavior, the sensitive behavior of network application, system The sensitive behavior of process.Above-described embodiment is can refer to, is repeated no more.
The processing method of monitoring application program provided in an embodiment of the present invention, it may be determined that more specifical sensitive behavior.
Fig. 2 is the structural schematic diagram for the processing unit that the embodiment of the present invention monitors application program, as shown in Fig. 2, of the invention Embodiment provides a kind of processing unit of monitoring application program, including extraction unit 1 and monitoring unit 2, wherein:
Extraction unit 1 is used for during the virtual machine after being loaded with modification system source code runs the application program, Extraction calls the function parameter of the application program, monitoring unit 2 to be used for according to pre-stored strategy matching file, Yi Jisuo Function parameter is stated, the operational process of the application program is monitored, to obtain the sensitive row when application program is run For.
Specifically, virtual machine of the extraction unit 1 for after being loaded with modification system source code runs the application program In the process, extraction calls the function parameter of the application program, extraction unit 1 that function parameter is sent to monitoring unit 2, monitors Unit 2 is used for according to pre-stored strategy matching file and the function parameter, to the operational process of the application program It is monitored, to obtain the sensitive behavior when application program is run.
The processing unit of monitoring application program provided in an embodiment of the present invention, can monitor the full mistake of operation of application program Journey, and comprehensively obtain the running sensitive operation behavior of application program.
On the basis of the above embodiments, the monitoring unit 2 is specifically used for:
The function parameter is sent to journal output module, the journal output module is previously stored with the strategy With file, the strategy matching file includes sensitive behavior sample characteristics;The letter is parsed in the journal output module Number parameter, and the analysis result of the function parameter is compared with the sensitive behavior sample characteristics;According to the comparison As a result, to obtain the sensitive behavior when application program is run.
Specifically, the monitoring unit 2 is specifically used for:The function parameter is sent to journal output module, the day Will output module is previously stored with the strategy matching file, and the strategy matching file includes sensitive behavior sample characteristics; Parse the function parameter in the journal output module, and by the analysis result of the function parameter and the sensitive behavior Sample characteristics are compared;According to the comparison as a result, to obtain the sensitive behavior when application program is run.
The processing unit of monitoring application program provided in an embodiment of the present invention, by carrying out feature in journal output module It compares, more automatically realizes the operation overall process of monitoring application program, and it is running quick comprehensively to obtain application program Feel operation behavior.
On the basis of the above embodiments, the monitoring unit 2 also particularly useful for:
By the sensitive behavior got and the strategy matching file generated in the same report.
Specifically, the monitoring unit 2 is also particularly useful for by the sensitive behavior got and strategy matching text Part generates in the same report.
The processing unit of monitoring application program provided in an embodiment of the present invention, generation includes sensitive behavior and strategy matching The same report of file, convenient for being inquired sensitive behavior and being managed.
On the basis of the above embodiments, the function parameter includes:The input value and return value of the function.
Specifically, the function parameter in monitoring unit 2 includes:The input value and return value of the function.
It is provided in an embodiment of the present invention monitoring application program processing method, by extract function parameter in input value and The monitoring to application program can be realized in return value.
On the basis of the above embodiments, the sensitive behavior includes the sensitive row for the virtual machine testing shielding For, the sensitive behavior of network behavior, the sensitive behavior of file operation, the sensitive behavior of privacy behavior, network application sensitive row For the sensitive behavior of, system process.
Specifically, the sensitive behavior in monitoring unit 2 include for the virtual machine testing shielding sensitive behavior, The sensitive behavior of network behavior, the sensitive behavior of file operation, the sensitive behavior of privacy behavior, the sensitive behavior of network application, The sensitive behavior of system process.
The processing method of monitoring application program provided in an embodiment of the present invention, it may be determined that more specifical sensitive behavior.
It is real that the processing unit of monitoring application program provided in an embodiment of the present invention specifically can be used for executing above-mentioned each method The process flow of example is applied, details are not described herein for function, is referred to the detailed description of above method embodiment.
Fig. 3 is device entity structural schematic diagram provided in an embodiment of the present invention, as shown in figure 3, described device includes:Processing Device (processor) 301, memory (memory) 302 and bus 303;
Wherein, the processor 301, memory 302 complete mutual communication by bus 303;
The processor 301 is used to call the program instruction in the memory 302, to execute above-mentioned each method embodiment The method provided, such as including:During the virtual machine after being loaded with modification system source code runs the application program, The function parameter of the application program is called in extraction;It is right according to pre-stored strategy matching file and the function parameter The operational process of the application program is monitored, to obtain the sensitive behavior when application program is run.
The present embodiment discloses a kind of computer program product, and the computer program product includes being stored in non-transient calculating Computer program on machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is calculated When machine executes, computer is able to carry out the method that above-mentioned each method embodiment is provided, such as including:It is being loaded with modification system During virtual machine after source code runs the application program, the function parameter of the application program is called in extraction;According to pre- The strategy matching file and the function parameter first stored, is monitored the operational process of the application program, to obtain Sensitive behavior when the application program operation.
The present embodiment provides a kind of non-transient computer readable storage medium, the non-transient computer readable storage medium Computer instruction is stored, the computer instruction makes the computer execute the method that above-mentioned each method embodiment is provided, example Such as include:During the virtual machine after being loaded with modification system source code runs the application program, answered described in extraction calling With the function parameter of program;According to pre-stored strategy matching file and the function parameter, to the application program Operational process is monitored, to obtain the sensitive behavior when application program is run.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer read/write memory medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or light The various media that can store program code such as disk.
The embodiments such as device described above are only schematical, wherein the unit illustrated as separating component It may or may not be physically separated, the component shown as unit may or may not be physics list Member, you can be located at a place, or may be distributed over multiple network units.It can be selected according to the actual needs In some or all of module achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness Labour in the case of, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It is realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be expressed in the form of software products in other words, should Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation Method described in certain parts of example or embodiment.
Finally it should be noted that:The above various embodiments is only to illustrate the technical solution of the embodiment of the present invention rather than right It is limited;Although the embodiment of the present invention is described in detail with reference to foregoing embodiments, the ordinary skill of this field Personnel should understand that:It still can be with technical scheme described in the above embodiments is modified, or to which part Or all technical features carries out equivalent replacement;And these modifications or replacements, it does not separate the essence of the corresponding technical solution The range of each embodiment technical solution of the embodiment of the present invention.

Claims (10)

1. a kind of processing method of monitoring application program, which is characterized in that including:
During the virtual machine after being loaded with modification system source code runs the application program, extraction is called described using journey The function parameter of sequence;
According to pre-stored strategy matching file and the function parameter, the operational process of the application program is carried out Monitoring, to obtain the sensitive behavior when application program is run.
2. according to the method described in claim 1, it is characterized in that, it is described according to pre-stored strategy matching file and The function parameter is monitored the operational process of the application program, to obtain the sensitivity when application program is run Behavior, including:
The function parameter is sent to journal output module, the journal output module is previously stored with the strategy matching text Part, the strategy matching file include sensitive behavior sample characteristics;
Parse the function parameter in the journal output module, and by the analysis result of the function parameter and the sensitivity Behavior sample feature is compared;
According to the comparison as a result, to obtain the sensitive behavior when application program is run.
3. according to the method described in claim 2, it is characterized in that, it is described according to the comparison as a result, to be answered described in acquisition After sensitive behavior when being run with program, the method further includes:
By the sensitive behavior got and the strategy matching file generated in the same report.
4. according to the method described in claim 1, it is characterized in that, the function parameter includes:The input value of the function and Return value.
5. according to the method described in claim 1, it is characterized in that, the sensitive behavior includes being directed to the virtual machine testing screen The sensitive behavior of the sensitive behavior, network behavior covered, the sensitive behavior of file operation, the sensitive behavior of privacy behavior, network are answered Sensitive behavior, the sensitive behavior of system process.
6. a kind of processing unit of monitoring application program, which is characterized in that including:
Extraction unit, for during the virtual machine after being loaded with modification system source code runs the application program, extracting Call the function parameter of the application program;
Monitoring unit is used for according to pre-stored strategy matching file and the function parameter, to the application program Operational process is monitored, to obtain the sensitive behavior when application program is run.
7. device according to claim 6, which is characterized in that the monitoring unit is specifically used for:
The function parameter is sent to journal output module, the journal output module is previously stored with the strategy matching text Part, the strategy matching file include sensitive behavior sample characteristics;
Parse the function parameter in the journal output module, and by the analysis result of the function parameter and the sensitivity Behavior sample feature is compared;
According to the comparison as a result, to obtain the sensitive behavior when application program is run.
8. device according to claim 7, which is characterized in that the monitoring unit also particularly useful for:
By the sensitive behavior got and the strategy matching file generated in the same report.
9. device according to claim 6, which is characterized in that the function parameter includes:The input value of the function and Return value.
10. device according to claim 6, which is characterized in that the sensitive behavior includes being directed to the virtual machine testing The sensitive behavior of shielding, the sensitive behavior of network behavior, the sensitive behavior of file operation, the sensitive behavior of privacy behavior, network The sensitive behavior of application, the sensitive behavior of system process.
CN201710240393.7A 2017-04-13 2017-04-13 A kind of processing method and processing device of monitoring application program Pending CN108734007A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710240393.7A CN108734007A (en) 2017-04-13 2017-04-13 A kind of processing method and processing device of monitoring application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710240393.7A CN108734007A (en) 2017-04-13 2017-04-13 A kind of processing method and processing device of monitoring application program

Publications (1)

Publication Number Publication Date
CN108734007A true CN108734007A (en) 2018-11-02

Family

ID=63924467

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710240393.7A Pending CN108734007A (en) 2017-04-13 2017-04-13 A kind of processing method and processing device of monitoring application program

Country Status (1)

Country Link
CN (1) CN108734007A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109992489A (en) * 2018-12-29 2019-07-09 上海连尚网络科技有限公司 It is a kind of for monitoring the method and apparatus for the process performing applied in user equipment
CN110430177A (en) * 2019-07-26 2019-11-08 北京智游网安科技有限公司 A kind of monitoring method, intelligent terminal and the storage medium of APP network behavior
CN112784272A (en) * 2021-01-26 2021-05-11 京东数字科技控股股份有限公司 Application program processing method and device, electronic equipment, system and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182688A (en) * 2014-08-26 2014-12-03 北京软安科技有限公司 Android malicious code detection device and method based on dynamic activation and behavior monitoring
US20150227746A1 (en) * 2014-02-07 2015-08-13 Northwestern University System and Method for Privacy Leakage Detection and Prevention System without Operating System Modification
CN105488388A (en) * 2015-12-22 2016-04-13 中软信息系统工程有限公司 Method for implementing application software behavior monitoring system based on CPU temporal-spatial isolation mechanism
CN105550585A (en) * 2016-03-02 2016-05-04 腾讯科技(深圳)有限公司 Application security testing method, device and system
CN105975858A (en) * 2015-12-08 2016-09-28 武汉安天信息技术有限责任公司 Method and system for malicious code detection based on virtual technology in Android system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150227746A1 (en) * 2014-02-07 2015-08-13 Northwestern University System and Method for Privacy Leakage Detection and Prevention System without Operating System Modification
CN104182688A (en) * 2014-08-26 2014-12-03 北京软安科技有限公司 Android malicious code detection device and method based on dynamic activation and behavior monitoring
CN105975858A (en) * 2015-12-08 2016-09-28 武汉安天信息技术有限责任公司 Method and system for malicious code detection based on virtual technology in Android system
CN105488388A (en) * 2015-12-22 2016-04-13 中软信息系统工程有限公司 Method for implementing application software behavior monitoring system based on CPU temporal-spatial isolation mechanism
CN105550585A (en) * 2016-03-02 2016-05-04 腾讯科技(深圳)有限公司 Application security testing method, device and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109992489A (en) * 2018-12-29 2019-07-09 上海连尚网络科技有限公司 It is a kind of for monitoring the method and apparatus for the process performing applied in user equipment
CN110430177A (en) * 2019-07-26 2019-11-08 北京智游网安科技有限公司 A kind of monitoring method, intelligent terminal and the storage medium of APP network behavior
CN112784272A (en) * 2021-01-26 2021-05-11 京东数字科技控股股份有限公司 Application program processing method and device, electronic equipment, system and storage medium

Similar Documents

Publication Publication Date Title
CN110855676B (en) Network attack processing method and device and storage medium
US10289837B2 (en) Log information generation apparatus and recording medium, and log information extraction apparatus and recording medium
CN104885092B (en) Security system and method for operating system
CN104239786B (en) Exempt from ROOT Initiative Defenses collocation method and device
Eder et al. Ananas-a framework for analyzing android applications
US9229758B2 (en) Passive monitoring of virtual systems using extensible indexing
CN105074718A (en) On-line behavioral analysis engine in mobile device with multiple analyzer model providers
Huang et al. Ontology-based intelligent system for malware behavioral analysis
CN104994104A (en) Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway
CN104239797B (en) Active defense method and device
CN106815524B (en) Malicious script file detection method and device
CN109614203B (en) Android application cloud data evidence obtaining and analyzing system and method based on application data simulation
CN108734007A (en) A kind of processing method and processing device of monitoring application program
Faruki et al. Droidanalyst: Synergic app framework for static and dynamic app analysis
Sun et al. Real-time behavior analysis and identification for Android application
Kandukuru et al. Android malicious application detection using permission vector and network traffic analysis
JP2011233081A (en) Application determination system and program
KR101431192B1 (en) Method for Rooting Attack Events Detection on Mobile Device
Stirparo et al. In-memory credentials robbery on android phones
CN112528296B (en) Vulnerability detection method and device, storage medium and electronic equipment
CN112333171B (en) Service data processing method and device and computer equipment
CN106953874B (en) Website falsification-proof method and device
US20240054210A1 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
CN104158812B (en) The method of controlling security and system of a kind of terminal applies
CN110837612B (en) Uniform Resource Identifier (URI) data acquisition method and device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181102