CN104978517B - The illegal root detection methods and system of a kind of android system - Google Patents
The illegal root detection methods and system of a kind of android system Download PDFInfo
- Publication number
- CN104978517B CN104978517B CN201410523623.7A CN201410523623A CN104978517B CN 104978517 B CN104978517 B CN 104978517B CN 201410523623 A CN201410523623 A CN 201410523623A CN 104978517 B CN104978517 B CN 104978517B
- Authority
- CN
- China
- Prior art keywords
- root
- android system
- detection
- illegal
- detection module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Stored Programmes (AREA)
- Debugging And Monitoring (AREA)
- Telephone Function (AREA)
Abstract
The invention provides the illegal root detection methods and system of a kind of android system, by carrying out routine root detections to system and whether being locked using high in the clouds information detecting system, whether illegally unlocked, and with the presence or absence of carry power leak, brush into third party's recovery patterns, judge system whether by illegal root, and there is the application program of illegal root behaviors in detecting system, point out user.The present invention gives corresponding system, pass through present invention, can in many ways surface detection system whether by root, with the presence or absence of illegal root risks, and detected by actively checking with the passive various ways such as acquisition from system, accuracy rate is improved, it can be found that the control unknown risks hidden in system.
Description
Technical field
The present invention relates to mobile terminal safety field, the illegal root detection methods of more particularly to a kind of android system
And system.
Background technology
In android system, power user is generally designated as root, and it has all permissions in system, such as starts
Or stop a process, increase or delete user etc., existing android system does not provide the user root authority typically, to protect
Card system safety, but which limit some user functions, therefore existing provide that substantial amounts of " a key root " instruments, are that user carries
For root functions, user is obtained more functions and authority, but existing root methods, be generally to utilize system vulnerability,
System detectio is bypassed by illegal means, root authority is illegally obtained, or by third party's means compulsory commutation system lock, or change
Change system genuine is set, purpose to reach acquisition root etc..Several root methods to sum up, are obtained by illegal means
The highest authority of android system, destroys the self-protective mechanism of system, once and root authority obtained by Malware,
The problems such as then privacy leakage being brought.After system root, once user misoperation, then may cause rogue program to acquire root
Authority.If obtaining root authority by third party software, once third party's fail-safe software has security breaches, also lead to
Root authority is utilized by rogue program.Therefore user should understand in time used in android system it is whether illegal
root。
The content of the invention
The invention provides the illegal root detection methods and system of a kind of android system, by multi-direction detection, really
System is determined with the presence or absence of illegal root risks, and by indicating risk user.
A kind of illegal root detection methods of android system, including:
Step a, is detected to android system using conventional method, whether judges android system by root for the first time,
If it is, decision-making system is dangerous, step f is performed;Otherwise step b is performed;
Whether step b, detection android system has locked, if it is, performing step c;Otherwise step e is performed;
Whether step c, detection android system is illegally unlocked, if it is, performing step e;Otherwise step d is performed;
Step d, detection android system is with the presence or absence of power leak is carried, if it is, performing step f;Otherwise step is performed
e;
Whether step e, detection android system enters third party's recovery patterns by brush, if it is, performing step f;
Otherwise illegal root risks are not present in decision-making system;Third party recovery refers to substituted for the recovery programs that system is carried
Third party's program, although the recovery programs that third party recovery is functionally carried with system are similar, but are due to
It has the authority of modification system, if by malicious exploitation, serious harm can be caused to system;
All application programs in step f, detection android system, judge whether illegal request root authority
Behavior, if it is present prompting custom system has illegal root risks, and points out the application of illegal request root authority behavior
Program;Otherwise, there is illegal root risks in prompting custom system.
In described method, whether the step b, detection android system has locked specially:Obtain user equipment
Information, recognizes current user equipment android system locking state;
In described method, the step c, whether detection android system, which is illegally unlocked, is specially:According to acquisition
User equipment information, obtains the locking state that dispatches from the factory of the relative user equipment found by high in the clouds, and and current user equipment
Android system locking state is compared, if unanimously, android system is not unlocked illegally, otherwise, android system quilt
Illegal unblock.
In described method, the step d detects that android system is specially with the presence or absence of power leak is carried:Pass through high in the clouds
Download flaw detection script, carries out putting forward power Hole Detection to android system.
In described method, the step f detects all application programs in android system, judged whether non-
Method request root authority behavior be specially:Judge whether application program is run with root authority, or comprising file needed for root,
If it is, there is the behavior of illegal request root authority, otherwise it is not present.
Present invention also offers a kind of illegal root detecting systems of android system, including:
Conventional detection module, for being detected using conventional method to android system, judges that android system is for the first time
It is no by root, if it is, decision-making system is dangerous, be transferred to root behavioral value modules;Otherwise enter and lock detection module;
Detection module is locked, for detecting whether android system has locked, if it is, entering illegal unblock detection mould
Block;Otherwise it is transferred to engineering mode detection module;
Illegal unblock detection module, for detecting whether android system is illegally unlocked, if it is, being transferred to engineering
Mode detection module;Otherwise Hole Detection module is entered;
Hole Detection module, detection android system is with the presence or absence of power leak is carried, if it is, being transferred to root behaviors inspection
Survey module;Otherwise engineering mode detection module is entered;
Whether engineering mode detection module, detection android system enters third party's recovery patterns by brush, if it is,
Then enter root behavioral value modules;Otherwise illegal root risks are not present in decision-making system;
All application programs in root behavioral value modules, detection android system, judge whether illegal request
The behavior of root authority, if it is present prompting custom system has illegal root risks, and points out illegal request root authority
The application program of behavior;Otherwise, there is illegal root risks in prompting custom system.
In described system, whether the locking detection module, detection android system has locked specially:Obtain and use
The information of family equipment, recognizes current user equipment android system locking state;
In described system, whether the illegal unblock detection module, detection android system is specific by illegal unblock
For:The locking state that dispatches from the factory of the relative user equipment found according to the user equipment information of acquisition, acquisition by high in the clouds, and with
Current user equipment android system locking state is compared, if unanimously, android system is not unlocked illegally, otherwise,
Android system is illegally unlocked.
In described system, the Hole Detection module, detecting and alarm detection android system in high in the clouds, which whether there is, puies forward power
Leak is specially:By high in the clouds download flaw detection script, android system is carried out to put forward power Hole Detection.
In described system, the root behavioral values module detects all application programs in android system, sentenced
The disconnected behavior with the presence or absence of illegal request root authority is specially:Judge whether application program is run with root authority, or comprising
File needed for root, if it is, there is the behavior of illegal request root authority, is otherwise not present.
Advantage of the invention is that:System is detected by multi-direction, it can be ensured that accurately whether detect system
By root, detection range is wider;Checked by active and the passive information two ways that obtained from system is verified, greatly
Improve the accuracy rate of detection;By method of the invention, it is possible to still undiscovered risk in system is detected and carried
Show user, find control unknown risks;And multiple technologies are called etc. by detecting system kernel and bottom api, root risks are entered
Row deeply detection.This invention ensures that user is not before causing damage, current android system is most understood soon with the presence or absence of weight
Big potential safety hazard.
It is normal by being carried out to system the invention provides the illegal root detection methods and system of a kind of android system
Rule root detection and whether locked using high in the clouds information detecting system, if illegally unlocked, and with the presence or absence of carry power leak,
Brush into third party's recovery patterns, judge whether system has illegal root behaviors by illegal root, and in detecting system
Application program, points out user.The present invention gives corresponding system, by present invention, can surface detection system be in many ways
It is no by root, if there is illegal root risks, and checked by active and the passive various ways such as obtained from system are carried out
Detection, improves accuracy rate, it can be found that the control unknown risks hidden in system.
Brief description of the drawings
, below will be to embodiment or prior art in order to illustrate more clearly of technical scheme of the invention or of the prior art
The accompanying drawing that uses required in description is briefly described, it should be apparent that, during drawings in the following description are only the present invention
Some embodiments recorded, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of illegal root detection methods flow chart of android system of the invention;
Fig. 2 is a kind of illegal root detecting systems structural representation of android system of the invention.
Embodiment
In order that those skilled in the art more fully understand the technical scheme in the embodiment of the present invention, and make the present invention's
Above-mentioned purpose, feature and advantage can be more obvious understandable, make further detailed to technical scheme in the present invention below in conjunction with the accompanying drawings
Thin explanation.
The invention provides the illegal root detection methods and system of a kind of android system, by multi-direction detection, really
System is determined with the presence or absence of illegal root risks, and by indicating risk user.
A kind of illegal root detection methods of android system, as shown in figure 1, including:
S101, is detected using conventional method to android system, first whether to judge android system by root, such as
Fruit is that then decision-making system is dangerous, performs S106;Otherwise S102 is performed;
Common detection methods have:
(1) perform Runtime.getRuntime () .exec (" su "), check returning result, it is possible to determine that whether root;
(2) detection catalogue "/system/bin/ ", "/system/xbin/ ", "/system/sbin/ ", "/sbin/ ", "/
Whether vendor/bin/ " is lower whether there is su files, and there is executable authority can decide whether root;
(3) execRootCmdSilent () method is called, root can decide whether according to return value.
Whether S102, detection android system has locked, if it is, performing S103;Otherwise S105 is performed;
Whether S103, detection android system is illegally unlocked, if it is, performing S105;Otherwise S104 is performed;
S104, detection android system is with the presence or absence of power leak is carried, if it is, performing S106;Otherwise S105 is performed;
Whether S105, detection android system enters third party's recovery patterns by brush, if it is, performing S106;It is no
Then illegal root risks are not present in decision-making system;Third party recovery refers to substituted for the recovery programs that system is carried
Third party's program, although the recovery programs that third party recovery is functionally carried with system are similar, but are due to it
Authority with modification system, if by malicious exploitation, serious harm can be caused to system;
All application programs in S106, detection android system, judge whether the row of illegal request root authority
If it is present prompting custom system has illegal root risks, and to point out the application journey of illegal request root authority behavior
Sequence;Otherwise, there is illegal root risks in prompting custom system.
In described method, whether the S102, detection android system has locked specially:Obtain user equipment
Information, recognizes current user equipment android system locking state;As S-ON represent be in locking state, S-OFF represent by
Unblock, it is specific to need the difference according to manufacturer, dynamic access reading manner;
In described method, the S103, whether detection android system, which is illegally unlocked, is specially:According to acquisition
User equipment information, obtains the locking state that dispatches from the factory of the relative user equipment found by high in the clouds, and and current user equipment
Android system locking state is compared, if unanimously, android system is not unlocked illegally, otherwise, android system quilt
Illegal unblock.
In described method, the S104 detects that android system is specially with the presence or absence of power leak is carried:Pass through high in the clouds
Download flaw detection script, carries out putting forward power Hole Detection to android system.
High in the clouds storage device and the information such as locking state and detection script of correspondingly dispatching from the factory are for inquiry.
In described method, the S106 detects all application programs in android system, judged whether non-
Method request root authority behavior be specially:Judge whether application program is run with root authority, or comprising file needed for root,
If it is, there is the behavior of illegal request root authority, otherwise it is not present.Such as:Detection procedure is entitled/system/bin/
Whether sh UID belongs to mounted application program, and EUID is root, you can judge that the application runs as with root authority,
There is the behavior of illegal request root authority;Or decompiling dex files, check that code obtains root authority with the presence or absence of trial
Method, such as Runtime.getRuntime () .exec (" su "), wait carry power relevant interface call;Or be in detection apk bags
It is no to include superuser.apk, su, file used in the root such as operation.pem etc..
Present invention also offers a kind of illegal root detecting systems of android system, as shown in Fig. 2 including:
Conventional detection module 201, for being detected using conventional method to android system, judges android system for the first time
Whether by root, if it is, decision-making system is dangerous, root behavioral values module 206 is transferred to;Otherwise enter and lock detection mould
Block 202;
Detection module 202 is locked, for detecting whether android system has locked, if it is, entering illegal unblock detection
Module 203;Otherwise it is transferred to engineering mode detection module 205;
Illegal unblock detection module 203, for detecting whether android system is illegally unlocked, if it is, being transferred to work
Journey mode detection module 205;Otherwise Hole Detection module 204 is entered;
Hole Detection module 204, detection android system is with the presence or absence of power leak is carried, if it is, being transferred to root behaviors
Detection module 206;Otherwise engineering mode detection module 205 is entered;
Whether engineering mode detection module 205, detection android system enters third party's recovery patterns by brush, if
It is, then into root behavioral values module 206;Otherwise illegal root risks are not present in decision-making system;
All application programs in root behavioral values module 206, detection android system, are judged whether illegal
The behavior of root authority is asked, if it is present prompting custom system has illegal root risks, and illegal request root is pointed out
The application program of authority behavior;Otherwise, there is illegal root risks in prompting custom system.
In described system, whether the locking detection module, detection android system has locked specially:Obtain and use
The information of family equipment, recognizes current user equipment android system locking state;
In described system, whether the illegal unblock detection module, detection android system is specific by illegal unblock
For:The locking state that dispatches from the factory of the relative user equipment found according to the user equipment information of acquisition, acquisition by high in the clouds, and with
Current user equipment android system locking state is compared, if unanimously, android system is not unlocked illegally, otherwise,
Android system is illegally unlocked.
In described system, the Hole Detection module, detecting and alarm detection android system in high in the clouds, which whether there is, puies forward power
Leak is specially:By high in the clouds download flaw detection script, android system is carried out to put forward power Hole Detection.
In described system, the root behavioral values module detects all application programs in android system, sentenced
The disconnected behavior with the presence or absence of illegal request root authority is specially:Judge whether application program is run with root authority, or comprising
File needed for root, if it is, there is the behavior of illegal request root authority, is otherwise not present.
Advantage of the invention is that:System is detected by multi-direction, it can be ensured that accurately whether detect system
By root, detection range is wider;Checked by active and the passive information two ways that obtained from system is verified, greatly
Improve the accuracy rate of detection;By method of the invention, it is possible to still undiscovered risk in system is detected and carried
Show user, find control unknown risks;And multiple technologies are called etc. by detecting system kernel and bottom api, root risks are entered
Row deeply detection.
It is normal by being carried out to system the invention provides the illegal root detection methods and system of a kind of android system
Rule root detection and whether locked using high in the clouds information detecting system, if illegally unlocked, and with the presence or absence of carry power leak,
Brush into third party's recovery patterns, judge whether system has illegal root behaviors by illegal root, and in detecting system
Application program, points out user.The present invention gives corresponding system, by present invention, can surface detection system be in many ways
It is no by root, if there is illegal root risks, and checked by active and the passive various ways such as obtained from system are carried out
Detection, improves accuracy rate, it can be found that the control unknown risks hidden in system.
Although depicting the present invention by embodiment, it will be appreciated by the skilled addressee that the present invention have it is many deformation and
The spirit changed without departing from the present invention, it is desirable to which appended claim includes these deformations and changed without departing from the present invention's
Spirit.
Claims (10)
1. a kind of illegal root detection methods of android system, it is characterised in that including:
Step a, is detected to android system using conventional method, whether judges android system by root for the first time, if
It is that then decision-making system is dangerous, performs step f;Otherwise step b is performed;
Whether step b, detection android system has locked, if it is, performing step c;Otherwise step e is performed;
Whether step c, detection android system is illegally unlocked, if it is, performing step e;Otherwise step d is performed;
Step d, detection android system is with the presence or absence of power leak is carried, if it is, performing step f;Otherwise step e is performed;
Whether step e, detection android system enters third party's recovery patterns by brush, if it is, performing step f;Otherwise
Illegal root risks are not present in decision-making system;
All application programs in step f, detection android system, judge whether the behavior of illegal request root authority,
If it is present prompting custom system has illegal root risks, and point out the application program of illegal request root authority behavior;
Otherwise, there is illegal root risks in prompting custom system.
2. whether the method as described in claim 1, it is characterised in that the step b, detection android system has locked tool
Body is:The information of user equipment is obtained, current user equipment android system locking state is recognized.
3. whether method as claimed in claim 2, it is characterised in that the step c, detection android system is illegally solved
Lock is specially:According to the user equipment information of acquisition, the locking shape that dispatches from the factory of the relative user equipment found by high in the clouds is obtained
State, and compared with current user equipment android system locking state, if unanimously, android system is not solved illegally
Lock, otherwise, android system is illegally unlocked.
4. the method as described in claim 1, it is characterised in that the step d, detection android system, which whether there is, puies forward power
Leak is specially:By high in the clouds download flaw detection script, android system is carried out to put forward power Hole Detection.
5. all applications in the method as described in claim 1, it is characterised in that the step f, detection android system
Program, the behavior for judging whether illegal request root authority is specially:Judge whether application program is run with root authority,
Or comprising file needed for root, if it is, there is the behavior of illegal request root authority, be otherwise not present.
6. a kind of illegal root detecting systems of android system, it is characterised in that including:
Whether conventional detection module, for being detected using conventional method to android system, judge android system for the first time
By root, if it is, decision-making system is dangerous, root behavioral value modules are transferred to;Otherwise enter and lock detection module;
Detection module is locked, for detecting whether android system has locked, if it is, entering illegal unblock detection module;It is no
Then it is transferred to engineering mode detection module;
Illegal unblock detection module, for detecting whether android system is illegally unlocked, if it is, being transferred to engineering mode
Detection module;Otherwise Hole Detection module is entered;
Hole Detection module, detection android system is with the presence or absence of power leak is carried, if it is, being transferred to root behavioral value moulds
Block;Otherwise engineering mode detection module is entered;
Whether engineering mode detection module, detection android system enters third party's recovery patterns by brush, if it is, entering
Enter root behavioral value modules;Otherwise illegal root risks are not present in decision-making system;
All application programs in root behavioral value modules, detection android system, judge whether illegal request root
The behavior of authority, if it is present prompting custom system has illegal root risks, and points out illegal request root authority behavior
Application program;Otherwise, there is illegal root risks in prompting custom system.
7. system as claimed in claim 6, it is characterised in that the locking detection module, whether detection android system
Locking is specially:The information of user equipment is obtained, current user equipment android system locking state is recognized.
8. system as claimed in claim 7, it is characterised in that the illegal unblock detection module, detects that android system is
It is no to be specially by illegal unblock:The relative user equipment found according to the user equipment information of acquisition, acquisition by high in the clouds
Dispatch from the factory locking state, and is compared with current user equipment android system locking state, if unanimously, android system is not
Illegally unlocked, otherwise, android system is illegally unlocked.
9. system as claimed in claim 6, it is characterised in that the Hole Detection module, the detection of high in the clouds detecting and alarm
Android system with the presence or absence of carry power leak be specially:By high in the clouds download flaw detection script, android system is carried out
Put forward power Hole Detection.
10. system as claimed in claim 6, it is characterised in that the root behavioral values module, detects android system
In all application programs, the behavior for judging whether illegal request root authority is specially:Judge application program whether with
Root authority is run, or comprising file needed for root, if it is, there is the behavior of illegal request root authority, is not otherwise deposited
.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410523623.7A CN104978517B (en) | 2014-10-08 | 2014-10-08 | The illegal root detection methods and system of a kind of android system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410523623.7A CN104978517B (en) | 2014-10-08 | 2014-10-08 | The illegal root detection methods and system of a kind of android system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104978517A CN104978517A (en) | 2015-10-14 |
CN104978517B true CN104978517B (en) | 2017-09-29 |
Family
ID=54275011
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410523623.7A Active CN104978517B (en) | 2014-10-08 | 2014-10-08 | The illegal root detection methods and system of a kind of android system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104978517B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105243329B (en) * | 2015-10-26 | 2017-12-08 | 北京奇虎科技有限公司 | The method and device of android system bug excavation |
CN106650438A (en) * | 2015-11-04 | 2017-05-10 | 阿里巴巴集团控股有限公司 | Method and device for detecting baleful programs |
CN106203125A (en) * | 2016-07-11 | 2016-12-07 | 北京小米移动软件有限公司 | Operating system and safety detection method, safety detection device and terminal |
CN106529290B (en) * | 2016-10-11 | 2020-02-18 | 北京金山安全软件有限公司 | Malicious software protection method and device and electronic equipment |
CN111385791B (en) * | 2018-12-28 | 2021-09-14 | 华为技术有限公司 | Security threat detection method and terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930190A (en) * | 2012-10-25 | 2013-02-13 | 中科方德软件有限公司 | Method for preventing user from acquiring super user permission in Android system |
CN103559440A (en) * | 2013-11-11 | 2014-02-05 | 北京国双科技有限公司 | Detection method, device and system of ios (iphone operation system) device user permission |
CN103559431A (en) * | 2013-11-11 | 2014-02-05 | 北京国双科技有限公司 | Detection method, device and system of Android system user permission |
CN104036199A (en) * | 2014-06-12 | 2014-09-10 | 上海交通大学 | Residual private-disk-data loophole detection method used for Android system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8448218B2 (en) * | 2008-01-17 | 2013-05-21 | Josep Bori | Method and apparatus for a cryptographically assisted computer system designed to deter viruses and malware via enforced accountability |
-
2014
- 2014-10-08 CN CN201410523623.7A patent/CN104978517B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930190A (en) * | 2012-10-25 | 2013-02-13 | 中科方德软件有限公司 | Method for preventing user from acquiring super user permission in Android system |
CN103559440A (en) * | 2013-11-11 | 2014-02-05 | 北京国双科技有限公司 | Detection method, device and system of ios (iphone operation system) device user permission |
CN103559431A (en) * | 2013-11-11 | 2014-02-05 | 北京国双科技有限公司 | Detection method, device and system of Android system user permission |
CN104036199A (en) * | 2014-06-12 | 2014-09-10 | 上海交通大学 | Residual private-disk-data loophole detection method used for Android system |
Also Published As
Publication number | Publication date |
---|---|
CN104978517A (en) | 2015-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104978517B (en) | The illegal root detection methods and system of a kind of android system | |
CN108804912B (en) | Application program override detection method based on permission set difference | |
CN103559446B (en) | Dynamic virus detection method and device for equipment based on Android system | |
KR101265173B1 (en) | Apparatus and method for inspecting non-portable executable files | |
CN108763951B (en) | Data protection method and device | |
WO2016015680A1 (en) | Security detection method and security detection apparatus for mobile terminal input window | |
CN106845223B (en) | Method and apparatus for detecting malicious code | |
CN106650441A (en) | Screen recording method and device | |
US9659173B2 (en) | Method for detecting a malware | |
KR20180032409A (en) | Apparatus and method for blocking ransome ware using access control to the contents file | |
CN108197476B (en) | Vulnerability detection method and device for intelligent terminal equipment | |
CN113946825B (en) | Memory horse processing method and system | |
CN101866407A (en) | Method and device for realizing security of operating system platform | |
CN104123499B (en) | Method and device for recognizing software for resisting uninstallation by using Android device manager | |
CN107145781A (en) | A kind of method and device that safety detection is carried out to application program | |
Suarez-Tangil et al. | Thwarting obfuscated malware via differential fault analysis | |
CN103034810B (en) | A kind of detection method, device and electronic equipment | |
KR101388053B1 (en) | Method of enhancing security based on permission detection for android applications, and computer-readable recording medium with android security program based on permission detection for the same | |
CN107122664B (en) | Safety protection method and device | |
CN106529299A (en) | Method for detecting and repairing malicious software Rootkit in linux system | |
CN105912934B (en) | A kind of data-oriented property right protection it is anti-in climb and visit prosecutor method | |
CN105447387A (en) | Trusted application detection method and apparatus based on hardware isolation environment | |
US10853492B2 (en) | Systems and methods for protecting a computing device against malicious code | |
CN106295336B (en) | Malicious program detection method and device | |
KR101311367B1 (en) | Method and apparatus for diagnosing attack that bypass the memory protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 430000, Hubei province East Lake Wuhan New Technology Development Zone Software Park East Road 1 software industry phase 4-1, B4, building 12, room 01 Applicant after: Wuhan Antian Information Technology Co., Ltd. Address before: 430000 Hubei Development Zone, East Lake, Optics Valley Venture Street, building 6, building 2, building Applicant before: Wuhan Antian Information Technology Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |