CN104598824B - 一种恶意程序检测方法及其装置 - Google Patents
一种恶意程序检测方法及其装置 Download PDFInfo
- Publication number
- CN104598824B CN104598824B CN201510044023.7A CN201510044023A CN104598824B CN 104598824 B CN104598824 B CN 104598824B CN 201510044023 A CN201510044023 A CN 201510044023A CN 104598824 B CN104598824 B CN 104598824B
- Authority
- CN
- China
- Prior art keywords
- indication character
- vestige
- storehouse
- application
- malicious
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510044023.7A CN104598824B (zh) | 2015-01-28 | 2015-01-28 | 一种恶意程序检测方法及其装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510044023.7A CN104598824B (zh) | 2015-01-28 | 2015-01-28 | 一种恶意程序检测方法及其装置 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104598824A CN104598824A (zh) | 2015-05-06 |
CN104598824B true CN104598824B (zh) | 2016-04-06 |
Family
ID=53124601
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510044023.7A Active CN104598824B (zh) | 2015-01-28 | 2015-01-28 | 一种恶意程序检测方法及其装置 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104598824B (zh) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105488412A (zh) * | 2015-06-19 | 2016-04-13 | 哈尔滨安天科技股份有限公司 | 基于android终端日志的恶意代码检测方法及系统 |
CN106295336B (zh) * | 2015-06-26 | 2020-05-22 | 阿里巴巴集团控股有限公司 | 恶意程序检测方法及装置 |
CN106709352B (zh) * | 2015-11-12 | 2019-09-24 | 阿里巴巴集团控股有限公司 | 样本处理方法、装置及系统 |
CN105468977A (zh) * | 2015-12-14 | 2016-04-06 | 厦门安胜网络科技有限公司 | 一种基于朴素贝叶斯的Android恶意软件分类方法和装置 |
CN106570394B (zh) * | 2016-11-10 | 2021-04-16 | 厦门安胜网络科技有限公司 | 一种检测恶意程序的方法 |
CN106778266A (zh) * | 2016-11-24 | 2017-05-31 | 天津大学 | 一种基于机器学习的安卓恶意软件动态检测方法 |
CN107742079B (zh) * | 2017-10-18 | 2020-02-21 | 杭州安恒信息技术股份有限公司 | 恶意软件识别方法及系统 |
CN109711151B (zh) * | 2017-10-25 | 2021-08-20 | 武汉安天信息技术有限责任公司 | 一种应用程序不良行为的预测方法、系统及装置 |
WO2019091028A1 (zh) * | 2017-11-10 | 2019-05-16 | 华为技术有限公司 | 应用软件恶意行为的动态告警方法和终端 |
CN108040052A (zh) * | 2017-12-13 | 2018-05-15 | 北京明朝万达科技股份有限公司 | 一种基于Netflow日志数据的网络安全威胁分析方法及系统 |
CN108200053B (zh) * | 2017-12-30 | 2021-05-14 | 成都亚信网络安全产业技术研究院有限公司 | 记录apt攻击操作的方法及装置 |
CN110619211A (zh) * | 2018-06-20 | 2019-12-27 | 深信服科技股份有限公司 | 一种基于动态特征的恶意软件识别方法、系统及相关装置 |
CN109271758B (zh) * | 2018-08-24 | 2021-04-20 | 阿里巴巴(中国)有限公司 | 防止So文件被盗用的方法、设备、装置及服务器 |
CN109284610B (zh) * | 2018-09-11 | 2023-02-28 | 腾讯科技(深圳)有限公司 | 一种病毒程序检测方法、装置及检测服务器 |
CN109753794A (zh) * | 2018-11-30 | 2019-05-14 | 北京奇虎科技有限公司 | 一种恶意应用的识别方法、系统、训练方法、设备及介质 |
CN109450942B (zh) * | 2018-12-25 | 2019-09-13 | 北京戴纳实验科技有限公司 | 一种实验室物联网管理系统的安全检测方法及其检测设备 |
CN110198300B (zh) * | 2019-03-13 | 2022-01-14 | 腾讯科技(深圳)有限公司 | 一种蜜罐操作系统指纹隐蔽方法及装置 |
CN110162963B (zh) * | 2019-04-26 | 2021-07-06 | 佛山市微风科技有限公司 | 一种识别过权应用程序的方法 |
CN111143843B (zh) * | 2019-12-12 | 2022-04-12 | 绿盟科技集团股份有限公司 | 恶意应用程序的检测方法及装置 |
CN111597515A (zh) * | 2020-04-24 | 2020-08-28 | 维沃移动通信有限公司 | 应用程序签名的获取方法和电子设备 |
CN112084497A (zh) * | 2020-09-11 | 2020-12-15 | 国网山西省电力公司营销服务中心 | 嵌入式Linux系统恶意程序检测方法及装置 |
CN113722714A (zh) * | 2021-11-03 | 2021-11-30 | 北京微步在线科技有限公司 | 一种网络威胁处理方法及装置 |
CN116506222B (zh) * | 2023-06-26 | 2023-09-08 | 北京安天网络安全技术有限公司 | 一种安全防护系统 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761481A (zh) * | 2014-01-23 | 2014-04-30 | 北京奇虎科技有限公司 | 一种恶意代码样本自动处理的方法及装置 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8321941B2 (en) * | 2006-04-06 | 2012-11-27 | Juniper Networks, Inc. | Malware modeling detection system and method for mobile platforms |
-
2015
- 2015-01-28 CN CN201510044023.7A patent/CN104598824B/zh active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761481A (zh) * | 2014-01-23 | 2014-04-30 | 北京奇虎科技有限公司 | 一种恶意代码样本自动处理的方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN104598824A (zh) | 2015-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104598824B (zh) | 一种恶意程序检测方法及其装置 | |
Arshad et al. | SAMADroid: a novel 3-level hybrid malware detection model for android operating system | |
Aljawarneh et al. | Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model | |
Xiong et al. | CONAN: A practical real-time APT detection system with high accuracy and efficiency | |
Lin et al. | Identifying android malicious repackaged applications by thread-grained system call sequences | |
Carmony et al. | Extract Me If You Can: Abusing PDF Parsers in Malware Detectors. | |
US8479276B1 (en) | Malware detection using risk analysis based on file system and network activity | |
US11882134B2 (en) | Stateful rule generation for behavior based threat detection | |
CN103927484B (zh) | 基于Qemu模拟器的恶意程序行为捕获方法 | |
CN104766011A (zh) | 基于主机特征的沙箱检测告警方法和系统 | |
CN114003903B (zh) | 一种网络攻击追踪溯源方法及装置 | |
WO2017071148A1 (zh) | 基于云计算平台的智能防御系统 | |
CN111400707A (zh) | 一种文件宏病毒检测方法、装置、设备及存储介质 | |
Bae et al. | A collaborative approach on host and network level android malware detection | |
CN111049828B (zh) | 网络攻击检测及响应方法及系统 | |
CN116932381A (zh) | 小程序安全风险自动化评估方法及相关设备 | |
CN106845217A (zh) | 一种安卓应用恶意行为的检测方法 | |
Chandrasekaran et al. | Spycon: Emulating user activities to detect evasive spyware | |
CN108959922A (zh) | 一种基于贝叶斯网的恶意文档检测方法及装置 | |
Yuan et al. | Research of intrusion detection system on android | |
Miao et al. | A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier | |
US12079285B2 (en) | Training device, determination device, training method, determination method, training method, and determination program | |
Deepserish et al. | PET-Droid: Android Malware Detection Using Static Analysis | |
Jawhar | A Survey on Malware Attacks Analysis and Detected | |
Lee et al. | Screening smartphone applications using behavioral signatures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information |
Inventor after: Li Ting Inventor after: Xu Xiaoyan Inventor after: Zhao Chen Inventor after: Liu Jing Inventor after: Chen Yang Inventor after: Wang Ying Inventor after: Zhao Hui Inventor after: Li Zhihui Inventor after: Zhang Teng Inventor after: Zhu Yunqian Inventor after: Zhang Shuai Inventor after: Han Cheng Inventor after: Jia Zixiao Inventor after: Li Shicong Inventor after: Xu Yuan Inventor after: Gao Sheng Inventor after: Hu Jun Inventor after: He Shiping Inventor after: Rao Yu Inventor after: Dang Xianglei Inventor before: Li Ting Inventor before: Xu Xiaoyan Inventor before: Zhao Chen Inventor before: Liu Jing Inventor before: Chen Yang Inventor before: Wang Ying Inventor before: Han Cheng Inventor before: Li Shichong Inventor before: Xu Yuan Inventor before: Gao Sheng Inventor before: Hu Jun Inventor before: He Shiping Inventor before: Rao Yu Inventor before: Dang Xianglei |
|
COR | Change of bibliographic data |