CN104978517B - The illegal root detection methods and system of a kind of android system - Google Patents

The illegal root detection methods and system of a kind of android system Download PDF

Info

Publication number
CN104978517B
CN104978517B CN201410523623.7A CN201410523623A CN104978517B CN 104978517 B CN104978517 B CN 104978517B CN 201410523623 A CN201410523623 A CN 201410523623A CN 104978517 B CN104978517 B CN 104978517B
Authority
CN
China
Prior art keywords
root
android system
detection
illegal
detection module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410523623.7A
Other languages
Chinese (zh)
Other versions
CN104978517A (en
Inventor
曹洪铭
潘宣辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Antian Information Technology Co Ltd
Original Assignee
Wuhan Antian Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Antian Information Technology Co Ltd filed Critical Wuhan Antian Information Technology Co Ltd
Priority to CN201410523623.7A priority Critical patent/CN104978517B/en
Publication of CN104978517A publication Critical patent/CN104978517A/en
Application granted granted Critical
Publication of CN104978517B publication Critical patent/CN104978517B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Stored Programmes (AREA)
  • Debugging And Monitoring (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides the illegal root detection methods and system of a kind of android system, by carrying out routine root detections to system and whether being locked using high in the clouds information detecting system, whether illegally unlocked, and with the presence or absence of carry power leak, brush into third party's recovery patterns, judge system whether by illegal root, and there is the application program of illegal root behaviors in detecting system, point out user.The present invention gives corresponding system, pass through present invention, can in many ways surface detection system whether by root, with the presence or absence of illegal root risks, and detected by actively checking with the passive various ways such as acquisition from system, accuracy rate is improved, it can be found that the control unknown risks hidden in system.

Description

The illegal root detection methods and system of a kind of android system
Technical field
The present invention relates to mobile terminal safety field, the illegal root detection methods of more particularly to a kind of android system And system.
Background technology
In android system, power user is generally designated as root, and it has all permissions in system, such as starts Or stop a process, increase or delete user etc., existing android system does not provide the user root authority typically, to protect Card system safety, but which limit some user functions, therefore existing provide that substantial amounts of " a key root " instruments, are that user carries For root functions, user is obtained more functions and authority, but existing root methods, be generally to utilize system vulnerability, System detectio is bypassed by illegal means, root authority is illegally obtained, or by third party's means compulsory commutation system lock, or change Change system genuine is set, purpose to reach acquisition root etc..Several root methods to sum up, are obtained by illegal means The highest authority of android system, destroys the self-protective mechanism of system, once and root authority obtained by Malware, The problems such as then privacy leakage being brought.After system root, once user misoperation, then may cause rogue program to acquire root Authority.If obtaining root authority by third party software, once third party's fail-safe software has security breaches, also lead to Root authority is utilized by rogue program.Therefore user should understand in time used in android system it is whether illegal root。
The content of the invention
The invention provides the illegal root detection methods and system of a kind of android system, by multi-direction detection, really System is determined with the presence or absence of illegal root risks, and by indicating risk user.
A kind of illegal root detection methods of android system, including:
Step a, is detected to android system using conventional method, whether judges android system by root for the first time, If it is, decision-making system is dangerous, step f is performed;Otherwise step b is performed;
Whether step b, detection android system has locked, if it is, performing step c;Otherwise step e is performed;
Whether step c, detection android system is illegally unlocked, if it is, performing step e;Otherwise step d is performed;
Step d, detection android system is with the presence or absence of power leak is carried, if it is, performing step f;Otherwise step is performed e;
Whether step e, detection android system enters third party's recovery patterns by brush, if it is, performing step f; Otherwise illegal root risks are not present in decision-making system;Third party recovery refers to substituted for the recovery programs that system is carried Third party's program, although the recovery programs that third party recovery is functionally carried with system are similar, but are due to It has the authority of modification system, if by malicious exploitation, serious harm can be caused to system;
All application programs in step f, detection android system, judge whether illegal request root authority Behavior, if it is present prompting custom system has illegal root risks, and points out the application of illegal request root authority behavior Program;Otherwise, there is illegal root risks in prompting custom system.
In described method, whether the step b, detection android system has locked specially:Obtain user equipment Information, recognizes current user equipment android system locking state;
In described method, the step c, whether detection android system, which is illegally unlocked, is specially:According to acquisition User equipment information, obtains the locking state that dispatches from the factory of the relative user equipment found by high in the clouds, and and current user equipment Android system locking state is compared, if unanimously, android system is not unlocked illegally, otherwise, android system quilt Illegal unblock.
In described method, the step d detects that android system is specially with the presence or absence of power leak is carried:Pass through high in the clouds Download flaw detection script, carries out putting forward power Hole Detection to android system.
In described method, the step f detects all application programs in android system, judged whether non- Method request root authority behavior be specially:Judge whether application program is run with root authority, or comprising file needed for root, If it is, there is the behavior of illegal request root authority, otherwise it is not present.
Present invention also offers a kind of illegal root detecting systems of android system, including:
Conventional detection module, for being detected using conventional method to android system, judges that android system is for the first time It is no by root, if it is, decision-making system is dangerous, be transferred to root behavioral value modules;Otherwise enter and lock detection module;
Detection module is locked, for detecting whether android system has locked, if it is, entering illegal unblock detection mould Block;Otherwise it is transferred to engineering mode detection module;
Illegal unblock detection module, for detecting whether android system is illegally unlocked, if it is, being transferred to engineering Mode detection module;Otherwise Hole Detection module is entered;
Hole Detection module, detection android system is with the presence or absence of power leak is carried, if it is, being transferred to root behaviors inspection Survey module;Otherwise engineering mode detection module is entered;
Whether engineering mode detection module, detection android system enters third party's recovery patterns by brush, if it is, Then enter root behavioral value modules;Otherwise illegal root risks are not present in decision-making system;
All application programs in root behavioral value modules, detection android system, judge whether illegal request The behavior of root authority, if it is present prompting custom system has illegal root risks, and points out illegal request root authority The application program of behavior;Otherwise, there is illegal root risks in prompting custom system.
In described system, whether the locking detection module, detection android system has locked specially:Obtain and use The information of family equipment, recognizes current user equipment android system locking state;
In described system, whether the illegal unblock detection module, detection android system is specific by illegal unblock For:The locking state that dispatches from the factory of the relative user equipment found according to the user equipment information of acquisition, acquisition by high in the clouds, and with Current user equipment android system locking state is compared, if unanimously, android system is not unlocked illegally, otherwise, Android system is illegally unlocked.
In described system, the Hole Detection module, detecting and alarm detection android system in high in the clouds, which whether there is, puies forward power Leak is specially:By high in the clouds download flaw detection script, android system is carried out to put forward power Hole Detection.
In described system, the root behavioral values module detects all application programs in android system, sentenced The disconnected behavior with the presence or absence of illegal request root authority is specially:Judge whether application program is run with root authority, or comprising File needed for root, if it is, there is the behavior of illegal request root authority, is otherwise not present.
Advantage of the invention is that:System is detected by multi-direction, it can be ensured that accurately whether detect system By root, detection range is wider;Checked by active and the passive information two ways that obtained from system is verified, greatly Improve the accuracy rate of detection;By method of the invention, it is possible to still undiscovered risk in system is detected and carried Show user, find control unknown risks;And multiple technologies are called etc. by detecting system kernel and bottom api, root risks are entered Row deeply detection.This invention ensures that user is not before causing damage, current android system is most understood soon with the presence or absence of weight Big potential safety hazard.
It is normal by being carried out to system the invention provides the illegal root detection methods and system of a kind of android system Rule root detection and whether locked using high in the clouds information detecting system, if illegally unlocked, and with the presence or absence of carry power leak, Brush into third party's recovery patterns, judge whether system has illegal root behaviors by illegal root, and in detecting system Application program, points out user.The present invention gives corresponding system, by present invention, can surface detection system be in many ways It is no by root, if there is illegal root risks, and checked by active and the passive various ways such as obtained from system are carried out Detection, improves accuracy rate, it can be found that the control unknown risks hidden in system.
Brief description of the drawings
, below will be to embodiment or prior art in order to illustrate more clearly of technical scheme of the invention or of the prior art The accompanying drawing that uses required in description is briefly described, it should be apparent that, during drawings in the following description are only the present invention Some embodiments recorded, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of illegal root detection methods flow chart of android system of the invention;
Fig. 2 is a kind of illegal root detecting systems structural representation of android system of the invention.
Embodiment
In order that those skilled in the art more fully understand the technical scheme in the embodiment of the present invention, and make the present invention's Above-mentioned purpose, feature and advantage can be more obvious understandable, make further detailed to technical scheme in the present invention below in conjunction with the accompanying drawings Thin explanation.
The invention provides the illegal root detection methods and system of a kind of android system, by multi-direction detection, really System is determined with the presence or absence of illegal root risks, and by indicating risk user.
A kind of illegal root detection methods of android system, as shown in figure 1, including:
S101, is detected using conventional method to android system, first whether to judge android system by root, such as Fruit is that then decision-making system is dangerous, performs S106;Otherwise S102 is performed;
Common detection methods have:
(1) perform Runtime.getRuntime () .exec (" su "), check returning result, it is possible to determine that whether root;
(2) detection catalogue "/system/bin/ ", "/system/xbin/ ", "/system/sbin/ ", "/sbin/ ", "/ Whether vendor/bin/ " is lower whether there is su files, and there is executable authority can decide whether root;
(3) execRootCmdSilent () method is called, root can decide whether according to return value.
Whether S102, detection android system has locked, if it is, performing S103;Otherwise S105 is performed;
Whether S103, detection android system is illegally unlocked, if it is, performing S105;Otherwise S104 is performed;
S104, detection android system is with the presence or absence of power leak is carried, if it is, performing S106;Otherwise S105 is performed;
Whether S105, detection android system enters third party's recovery patterns by brush, if it is, performing S106;It is no Then illegal root risks are not present in decision-making system;Third party recovery refers to substituted for the recovery programs that system is carried Third party's program, although the recovery programs that third party recovery is functionally carried with system are similar, but are due to it Authority with modification system, if by malicious exploitation, serious harm can be caused to system;
All application programs in S106, detection android system, judge whether the row of illegal request root authority If it is present prompting custom system has illegal root risks, and to point out the application journey of illegal request root authority behavior Sequence;Otherwise, there is illegal root risks in prompting custom system.
In described method, whether the S102, detection android system has locked specially:Obtain user equipment Information, recognizes current user equipment android system locking state;As S-ON represent be in locking state, S-OFF represent by Unblock, it is specific to need the difference according to manufacturer, dynamic access reading manner;
In described method, the S103, whether detection android system, which is illegally unlocked, is specially:According to acquisition User equipment information, obtains the locking state that dispatches from the factory of the relative user equipment found by high in the clouds, and and current user equipment Android system locking state is compared, if unanimously, android system is not unlocked illegally, otherwise, android system quilt Illegal unblock.
In described method, the S104 detects that android system is specially with the presence or absence of power leak is carried:Pass through high in the clouds Download flaw detection script, carries out putting forward power Hole Detection to android system.
High in the clouds storage device and the information such as locking state and detection script of correspondingly dispatching from the factory are for inquiry.
In described method, the S106 detects all application programs in android system, judged whether non- Method request root authority behavior be specially:Judge whether application program is run with root authority, or comprising file needed for root, If it is, there is the behavior of illegal request root authority, otherwise it is not present.Such as:Detection procedure is entitled/system/bin/ Whether sh UID belongs to mounted application program, and EUID is root, you can judge that the application runs as with root authority, There is the behavior of illegal request root authority;Or decompiling dex files, check that code obtains root authority with the presence or absence of trial Method, such as Runtime.getRuntime () .exec (" su "), wait carry power relevant interface call;Or be in detection apk bags It is no to include superuser.apk, su, file used in the root such as operation.pem etc..
Present invention also offers a kind of illegal root detecting systems of android system, as shown in Fig. 2 including:
Conventional detection module 201, for being detected using conventional method to android system, judges android system for the first time Whether by root, if it is, decision-making system is dangerous, root behavioral values module 206 is transferred to;Otherwise enter and lock detection mould Block 202;
Detection module 202 is locked, for detecting whether android system has locked, if it is, entering illegal unblock detection Module 203;Otherwise it is transferred to engineering mode detection module 205;
Illegal unblock detection module 203, for detecting whether android system is illegally unlocked, if it is, being transferred to work Journey mode detection module 205;Otherwise Hole Detection module 204 is entered;
Hole Detection module 204, detection android system is with the presence or absence of power leak is carried, if it is, being transferred to root behaviors Detection module 206;Otherwise engineering mode detection module 205 is entered;
Whether engineering mode detection module 205, detection android system enters third party's recovery patterns by brush, if It is, then into root behavioral values module 206;Otherwise illegal root risks are not present in decision-making system;
All application programs in root behavioral values module 206, detection android system, are judged whether illegal The behavior of root authority is asked, if it is present prompting custom system has illegal root risks, and illegal request root is pointed out The application program of authority behavior;Otherwise, there is illegal root risks in prompting custom system.
In described system, whether the locking detection module, detection android system has locked specially:Obtain and use The information of family equipment, recognizes current user equipment android system locking state;
In described system, whether the illegal unblock detection module, detection android system is specific by illegal unblock For:The locking state that dispatches from the factory of the relative user equipment found according to the user equipment information of acquisition, acquisition by high in the clouds, and with Current user equipment android system locking state is compared, if unanimously, android system is not unlocked illegally, otherwise, Android system is illegally unlocked.
In described system, the Hole Detection module, detecting and alarm detection android system in high in the clouds, which whether there is, puies forward power Leak is specially:By high in the clouds download flaw detection script, android system is carried out to put forward power Hole Detection.
In described system, the root behavioral values module detects all application programs in android system, sentenced The disconnected behavior with the presence or absence of illegal request root authority is specially:Judge whether application program is run with root authority, or comprising File needed for root, if it is, there is the behavior of illegal request root authority, is otherwise not present.
Advantage of the invention is that:System is detected by multi-direction, it can be ensured that accurately whether detect system By root, detection range is wider;Checked by active and the passive information two ways that obtained from system is verified, greatly Improve the accuracy rate of detection;By method of the invention, it is possible to still undiscovered risk in system is detected and carried Show user, find control unknown risks;And multiple technologies are called etc. by detecting system kernel and bottom api, root risks are entered Row deeply detection.
It is normal by being carried out to system the invention provides the illegal root detection methods and system of a kind of android system Rule root detection and whether locked using high in the clouds information detecting system, if illegally unlocked, and with the presence or absence of carry power leak, Brush into third party's recovery patterns, judge whether system has illegal root behaviors by illegal root, and in detecting system Application program, points out user.The present invention gives corresponding system, by present invention, can surface detection system be in many ways It is no by root, if there is illegal root risks, and checked by active and the passive various ways such as obtained from system are carried out Detection, improves accuracy rate, it can be found that the control unknown risks hidden in system.
Although depicting the present invention by embodiment, it will be appreciated by the skilled addressee that the present invention have it is many deformation and The spirit changed without departing from the present invention, it is desirable to which appended claim includes these deformations and changed without departing from the present invention's Spirit.

Claims (10)

1. a kind of illegal root detection methods of android system, it is characterised in that including:
Step a, is detected to android system using conventional method, whether judges android system by root for the first time, if It is that then decision-making system is dangerous, performs step f;Otherwise step b is performed;
Whether step b, detection android system has locked, if it is, performing step c;Otherwise step e is performed;
Whether step c, detection android system is illegally unlocked, if it is, performing step e;Otherwise step d is performed;
Step d, detection android system is with the presence or absence of power leak is carried, if it is, performing step f;Otherwise step e is performed;
Whether step e, detection android system enters third party's recovery patterns by brush, if it is, performing step f;Otherwise Illegal root risks are not present in decision-making system;
All application programs in step f, detection android system, judge whether the behavior of illegal request root authority, If it is present prompting custom system has illegal root risks, and point out the application program of illegal request root authority behavior; Otherwise, there is illegal root risks in prompting custom system.
2. whether the method as described in claim 1, it is characterised in that the step b, detection android system has locked tool Body is:The information of user equipment is obtained, current user equipment android system locking state is recognized.
3. whether method as claimed in claim 2, it is characterised in that the step c, detection android system is illegally solved Lock is specially:According to the user equipment information of acquisition, the locking shape that dispatches from the factory of the relative user equipment found by high in the clouds is obtained State, and compared with current user equipment android system locking state, if unanimously, android system is not solved illegally Lock, otherwise, android system is illegally unlocked.
4. the method as described in claim 1, it is characterised in that the step d, detection android system, which whether there is, puies forward power Leak is specially:By high in the clouds download flaw detection script, android system is carried out to put forward power Hole Detection.
5. all applications in the method as described in claim 1, it is characterised in that the step f, detection android system Program, the behavior for judging whether illegal request root authority is specially:Judge whether application program is run with root authority, Or comprising file needed for root, if it is, there is the behavior of illegal request root authority, be otherwise not present.
6. a kind of illegal root detecting systems of android system, it is characterised in that including:
Whether conventional detection module, for being detected using conventional method to android system, judge android system for the first time By root, if it is, decision-making system is dangerous, root behavioral value modules are transferred to;Otherwise enter and lock detection module;
Detection module is locked, for detecting whether android system has locked, if it is, entering illegal unblock detection module;It is no Then it is transferred to engineering mode detection module;
Illegal unblock detection module, for detecting whether android system is illegally unlocked, if it is, being transferred to engineering mode Detection module;Otherwise Hole Detection module is entered;
Hole Detection module, detection android system is with the presence or absence of power leak is carried, if it is, being transferred to root behavioral value moulds Block;Otherwise engineering mode detection module is entered;
Whether engineering mode detection module, detection android system enters third party's recovery patterns by brush, if it is, entering Enter root behavioral value modules;Otherwise illegal root risks are not present in decision-making system;
All application programs in root behavioral value modules, detection android system, judge whether illegal request root The behavior of authority, if it is present prompting custom system has illegal root risks, and points out illegal request root authority behavior Application program;Otherwise, there is illegal root risks in prompting custom system.
7. system as claimed in claim 6, it is characterised in that the locking detection module, whether detection android system Locking is specially:The information of user equipment is obtained, current user equipment android system locking state is recognized.
8. system as claimed in claim 7, it is characterised in that the illegal unblock detection module, detects that android system is It is no to be specially by illegal unblock:The relative user equipment found according to the user equipment information of acquisition, acquisition by high in the clouds Dispatch from the factory locking state, and is compared with current user equipment android system locking state, if unanimously, android system is not Illegally unlocked, otherwise, android system is illegally unlocked.
9. system as claimed in claim 6, it is characterised in that the Hole Detection module, the detection of high in the clouds detecting and alarm Android system with the presence or absence of carry power leak be specially:By high in the clouds download flaw detection script, android system is carried out Put forward power Hole Detection.
10. system as claimed in claim 6, it is characterised in that the root behavioral values module, detects android system In all application programs, the behavior for judging whether illegal request root authority is specially:Judge application program whether with Root authority is run, or comprising file needed for root, if it is, there is the behavior of illegal request root authority, is not otherwise deposited .
CN201410523623.7A 2014-10-08 2014-10-08 The illegal root detection methods and system of a kind of android system Active CN104978517B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410523623.7A CN104978517B (en) 2014-10-08 2014-10-08 The illegal root detection methods and system of a kind of android system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410523623.7A CN104978517B (en) 2014-10-08 2014-10-08 The illegal root detection methods and system of a kind of android system

Publications (2)

Publication Number Publication Date
CN104978517A CN104978517A (en) 2015-10-14
CN104978517B true CN104978517B (en) 2017-09-29

Family

ID=54275011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410523623.7A Active CN104978517B (en) 2014-10-08 2014-10-08 The illegal root detection methods and system of a kind of android system

Country Status (1)

Country Link
CN (1) CN104978517B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105243329B (en) * 2015-10-26 2017-12-08 北京奇虎科技有限公司 The method and device of android system bug excavation
CN106650438A (en) * 2015-11-04 2017-05-10 阿里巴巴集团控股有限公司 Method and device for detecting baleful programs
CN106203125A (en) * 2016-07-11 2016-12-07 北京小米移动软件有限公司 Operating system and safety detection method, safety detection device and terminal
CN106529290B (en) * 2016-10-11 2020-02-18 北京金山安全软件有限公司 Malicious software protection method and device and electronic equipment
CN111385791B (en) * 2018-12-28 2021-09-14 华为技术有限公司 Security threat detection method and terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930190A (en) * 2012-10-25 2013-02-13 中科方德软件有限公司 Method for preventing user from acquiring super user permission in Android system
CN103559440A (en) * 2013-11-11 2014-02-05 北京国双科技有限公司 Detection method, device and system of ios (iphone operation system) device user permission
CN103559431A (en) * 2013-11-11 2014-02-05 北京国双科技有限公司 Detection method, device and system of Android system user permission
CN104036199A (en) * 2014-06-12 2014-09-10 上海交通大学 Residual private-disk-data loophole detection method used for Android system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8448218B2 (en) * 2008-01-17 2013-05-21 Josep Bori Method and apparatus for a cryptographically assisted computer system designed to deter viruses and malware via enforced accountability

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930190A (en) * 2012-10-25 2013-02-13 中科方德软件有限公司 Method for preventing user from acquiring super user permission in Android system
CN103559440A (en) * 2013-11-11 2014-02-05 北京国双科技有限公司 Detection method, device and system of ios (iphone operation system) device user permission
CN103559431A (en) * 2013-11-11 2014-02-05 北京国双科技有限公司 Detection method, device and system of Android system user permission
CN104036199A (en) * 2014-06-12 2014-09-10 上海交通大学 Residual private-disk-data loophole detection method used for Android system

Also Published As

Publication number Publication date
CN104978517A (en) 2015-10-14

Similar Documents

Publication Publication Date Title
CN104978517B (en) The illegal root detection methods and system of a kind of android system
CN108804912B (en) Application program override detection method based on permission set difference
CN103559446B (en) Dynamic virus detection method and device for equipment based on Android system
KR101265173B1 (en) Apparatus and method for inspecting non-portable executable files
CN108763951B (en) Data protection method and device
WO2016015680A1 (en) Security detection method and security detection apparatus for mobile terminal input window
CN106845223B (en) Method and apparatus for detecting malicious code
CN106650441A (en) Screen recording method and device
US9659173B2 (en) Method for detecting a malware
KR20180032409A (en) Apparatus and method for blocking ransome ware using access control to the contents file
CN108197476B (en) Vulnerability detection method and device for intelligent terminal equipment
CN113946825B (en) Memory horse processing method and system
CN101866407A (en) Method and device for realizing security of operating system platform
CN104123499B (en) Method and device for recognizing software for resisting uninstallation by using Android device manager
CN107145781A (en) A kind of method and device that safety detection is carried out to application program
Suarez-Tangil et al. Thwarting obfuscated malware via differential fault analysis
CN103034810B (en) A kind of detection method, device and electronic equipment
KR101388053B1 (en) Method of enhancing security based on permission detection for android applications, and computer-readable recording medium with android security program based on permission detection for the same
CN107122664B (en) Safety protection method and device
CN106529299A (en) Method for detecting and repairing malicious software Rootkit in linux system
CN105912934B (en) A kind of data-oriented property right protection it is anti-in climb and visit prosecutor method
CN105447387A (en) Trusted application detection method and apparatus based on hardware isolation environment
US10853492B2 (en) Systems and methods for protecting a computing device against malicious code
CN106295336B (en) Malicious program detection method and device
KR101311367B1 (en) Method and apparatus for diagnosing attack that bypass the memory protection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 430000, Hubei province East Lake Wuhan New Technology Development Zone Software Park East Road 1 software industry phase 4-1, B4, building 12, room 01

Applicant after: Wuhan Antian Information Technology Co., Ltd.

Address before: 430000 Hubei Development Zone, East Lake, Optics Valley Venture Street, building 6, building 2, building

Applicant before: Wuhan Antian Information Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant