CN105205396A - Detecting system for Android malicious code based on deep learning and method thereof - Google Patents

Detecting system for Android malicious code based on deep learning and method thereof Download PDF

Info

Publication number
CN105205396A
CN105205396A CN201510667016.2A CN201510667016A CN105205396A CN 105205396 A CN105205396 A CN 105205396A CN 201510667016 A CN201510667016 A CN 201510667016A CN 105205396 A CN105205396 A CN 105205396A
Authority
CN
China
Prior art keywords
vector
degree
apk
mentioned
malicious code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510667016.2A
Other languages
Chinese (zh)
Inventor
邹福泰
徐凯翼
唐佳莉
朱文彬
杭梦玥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CN201510667016.2A priority Critical patent/CN105205396A/en
Publication of CN105205396A publication Critical patent/CN105205396A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Abstract

The invention discloses a detecting system for an Android malicious code based on deep learning. The detecting system comprises a feature extracting module, a deep learning module and a report generating module, wherein the feature extracting module is used for taking APK (Android Package) procedure as input, combining the static extraction with the dynamic extraction and outputting 0 and 1 for forming an APK procedure feature vector; the deep learning module is used for taking a MLP (Modular Longitudinal Platform) model as a learning model, on the one hand, training and learning a sample set formed by the feature vector and a supervised value, thereby acquiring a mature learning model; on the other hand, the deep learning module is used for taking the feature vector as input, using the mature learning model for outputting a result probability and taking the result probability as the security level of the APK procedure; the report generating module is used for explaining and analyzing for lastly generating an assessment report according to the feature vector and security level of the APK procedure. According to the detecting system provided by the invention, the deep learning module is combined with the detection for the malicious code while the static feature is combined with the dynamic feature, so that the discriminating capability and detecting accuracy of the system for the unknown malicious code are promoted.

Description

A kind of Android malicious code detection system based on degree of depth study and method thereof
Technical field
The present invention relates to Android Malicious Code Detection field, particularly relate to a kind of Android malicious code detection system based on degree of depth study and method thereof.
Background technology
The annual safety message display that JuniperNetworks is up-to-date, although not clear market on earth should have two to mobile industry, three or four operation system of smart phone, but the authors of mobile Malware have selected the target of oneself, and just swarming to Android.
Android platform is Malware " severely afflicated area ", in virus propagation, third-party application shop is still the main path that intelligent mobile terminal virus is propagated, and due to opening and the market share widely of android system, the virus in the whole world 96% is from Android platform.
Consult relative literature visible, the detection at present for Malware mainly contains two kinds of methods: a kind of is the detection method of feature based code, and it checks that whether unknown software is containing the characteristic of malware code in feature code storehouse.The malicious code of the method to compression, encryption, distortion can not process well, needs to constantly update virus investigation engine and feature database, can not detect emerging Malware.
Another kind is behavior-based detection method.What it monitored is that how movable program is, instead of the code of software.This method focuses on the behavioral trait shown in malicious code operational process, and therefore not by polymorphic, to add shell impact, the static detection method of relative feature based code has fast, feature intuitively.Usually application programming interface (ApplicationProgrammingInterface, API) calling sequence, system features is mainly utilized to count or software code to the description of software action.But these describing methods, or too coarse or easy appearance is omitted, and often have impact on final classification accuracy.
Therefore, those skilled in the art is devoted to exploitation one malicious code detection system and method thereof more accurately.
Summary of the invention
Because the above-mentioned defect of prior art, how technical matters to be solved by this invention detects Android malicious code exactly.
For achieving the above object, the invention provides a kind of Android malicious code detection system based on degree of depth study and detection method, greatly can improve the discrimination capabilities of system for unknown malicious code and the accuracy of detection.
The invention provides a kind of Android malicious code detection system based on degree of depth study, Browser/Server framework is adopted in system architecture, the core that systemic-function realizes is focused on server, simplify the exploitation of system, maintenance and use, important breakthrough is obtained again in detection method, innovatively degree of deep learning model is introduced Android malware detection field, combine static analysis and dynamic analysing method simultaneously, improve the accuracy of detection, obtain software security analysis report more comprehensively.
A kind of Android malicious code detection system based on degree of depth study of the present invention, comprising:
Characteristic extracting module, described characteristic extracting module is configured to using APK program as input, uses static nature to extract and extracts with behavioral characteristics the mode combined, export by the proper vector of 0, the 1 described APK program formed;
Degree of depth study module, described degree of depth study module is configured to use multilayer perceptron model to train the sample set be made up of described proper vector and supervision value, obtains learning ripe model; Simultaneously using described proper vector as input, use the model that described study is ripe, Output rusults probability, as the level of security of described APK program;
Report generation module, described report generation module is configured to analyze according to described proper vector and described level of security, and generates assessment report.
Further, described detection system adopts browser end/server end framework, described server end is configured to by calling described characteristic extracting module, degree of depth study module and report generation module, carries out the ripe pre-service of model of described study and the detection of described APK program; Described browser end is configured to user oriented and carries out uploading APK file, searches for sha1 and present described assessment report.
Present invention also offers a kind of Android malicious code detecting method based on degree of depth study, comprise the following steps:
(S1) using APK program as input, use characteristic extracting module to extract behavioral characteristics and the static nature of described APK program, export by the proper vector of 0, the 1 described APK program formed;
(S2) degree of deep learning model is used to carry out pre-service;
(S3) described proper vector is detected;
(S4) assessment report is generated according to the result of above-mentioned detection.
Further, the described model preprocessing in step (S2) comprises the following steps:
(S2-1) gather a large amount of described APK programs with positive and negative mark, wherein the software of safety is with just identifying, and the software of malice is with negative mark;
(S2-2) static nature of the above-mentioned APK program of batch extracting, obtains static nature vector;
(S2-3) behavioral characteristics of the above-mentioned APK program of batch extracting, obtains behavioral characteristics vector;
(S2-4) by above-mentioned static nature vector and above-mentioned behavioral characteristics Vector Groups synthetic population proper vector;
(S2-5) vectorial for input dimension with above-mentioned general characteristic, the supervision value that described in integrating step (S2-1), APK program is corresponding, is combined into sample set;
(S2-6) above-mentioned sample set is inserted into system database;
(S2-7) using above-mentioned system database as input, degree of deep learning model is trained, obtain learning ripe model.
Further, described in step (S3), the detection of the proper vector of APK program comprises the following steps:
(S3-1) preserve the APK program that user uploads, and generate the SHA1 hashed value of this APK program;
(S3-2) for above-mentioned hashed value, in system database, fingerprint matching is carried out;
(S3-3) if above-mentioned matching result exists, then enter step (S3-9), otherwise enter step (S3-4);
(S3-4) extract the static nature of the APK program that user uploads, obtain static nature vector;
(S3-5) extract the behavioral characteristics of the APK program that user uploads, obtain behavioral characteristics vector;
(S3-6) by above-mentioned static nature vector and above-mentioned behavioral characteristics Vector Groups synthetic population proper vector;
(S3-7) above-mentioned general characteristic vector is inputed in the ripe model of study, Output rusults probability;
(S3-8) above-mentioned general characteristic vector is inserted described system database with above-mentioned Output rusults probability;
(S3-9) according to record in described system database, resolve and generate safety assessment report.
Further, step (S3-4), the behavioral characteristics described in (S3-5), static nature extract and comprise the following steps:
(S3-45-1) the APK program uploaded of decompression user, obtains file: AndroidManifest.xml and classes.dex;
(S3-45-2) use AXMLPrinter2 and TinyXml tool parses AndroidManifest.xml file, obtain all authorities of above-mentioned APK program application, dimension is 120, as the Part I of static nature vector;
(S3-45-3) with disassembler baksmali decompiling classes.dex file, and search for the source code that dis-assembling obtains, what obtain API calls situation, is abstracted into the proper vector that dimension is 365, as the Part II of static nature vector;
(S3-45-4) use DroidBox as the sandbox of dynamic monitoring, by 23 API in Hook Android program, obtain 23 dimension behavioral characteristics vectors.
Further, the degree of deep learning model used has following feature:
(1) mode adopting multi-story and multi-span and multilayer perceptron model to combine constructs block mold;
(2) adopt the unfixed dynamic behaviour sequence of multi-story and multi-span treated length, after taking out behavioral characteristics, be combined into the general characteristic vector that length is fixing again with static nature
(3) multilayer perceptron model is adopted to carry out treatment classification.
Further, the parameter of described multilayer perceptron model is:
Input: the proper vector of 508 dimensions, comprises static nature and behavioral characteristics;
Export: the probability of fail-safe software, the probability of Malware;
Node in hidden layer: 80;
Hidden layer is to the connection weights of output layer: 0.001;
The threshold value of output layer: 0.7;
Study iterations: 1000;
Learning rate: 0.05.
Further, described multilayer perceptron model have employed the method stopped fast, at the end of each iteration, namely calculates the accuracy of verification msg, when above-mentioned accuracy no longer improves, with regard to deconditioning, in order to avoid overfitting.
Further, described multilayer perceptron model have employed the method that 5 folding cross validations are tested as hit rate, is divided into five parts by verification msg collection, uses wherein four parts of conduct training in turn, a as checking, the net result that the average of ten results is tested as hit rate.
Compared with prior art, Android malicious code detection system based on degree of depth study provided by the invention and detection method have following beneficial effect: use degree of deep learning model can Automatic Extraction feature mode, Level by level learning, guarantee the utilization effectively and reasonably of feature, thus ensure that the accuracy of result.
Be described further below with reference to the technique effect of accompanying drawing to design of the present invention, concrete structure and generation, to understand object of the present invention, characteristic sum effect fully.
Accompanying drawing explanation
Fig. 1 is the Android malicious code detection system general frame figure based on degree of depth study of one embodiment of the present of invention;
Fig. 2 is the model preprocessing workflow diagram of the Android malicious code detection system based on degree of depth study shown in Fig. 1;
Fig. 3 is the APK overhaul flow chart of the Android malicious code detection system based on degree of depth study shown in Fig. 1;
Fig. 4 is the degree of deep learning model figure of the Android malicious code detection system based on degree of depth study shown in Fig. 1;
Fig. 5 is the static nature extraction figure of the Android malicious code detection system based on degree of depth study shown in Fig. 1;
Fig. 6 is the behavioral characteristics extraction figure of the Android malicious code detection system based on degree of depth study shown in Fig. 1.
Embodiment
As shown in Figure 1, the Android malicious code detection system based on degree of depth study of one embodiment of the present of invention comprises:
Characteristic extracting module: using APK program as input, the mode using static extraction to combine with Dynamic Extraction, exports the vector of 0,1 composition, as the proper vector of APK program;
Degree of depth study module: use multilayer perceptron (MLP) model as learning model.The sample set formed proper vector and supervision value on the one hand carries out training and learns, and obtains learning ripe model; On the other hand using proper vector as input, use the model that study is ripe, Output rusults probability, as the level of security of APK program;
Report generation module: according to proper vector and the level of security of APK program, make an explanation and analysis, generates assessment report.
The Android malicious code detecting method based on degree of depth study of the present embodiment is adopted to comprise the steps:
(1) using APK program as input, use characteristic extracting module to extract behavioral characteristics, the static nature of APK, export the vector of 0,1 composition, as the proper vector of APK program;
(2), after degree of deep learning model carries out pre-service, (1) described proper vector is detected;
(3) report generation module generates detailed APK analysis report according to the testing result in (2).
Fig. 2 shows the model preprocessing flow process of the Android malicious code detection system based on degree of depth study shown in Fig. 1, and the model preprocessing in step (2) comprises the following steps:
(1) a large amount of APK programs with positive and negative mark (fail-safe software and Malware) is gathered;
(2) static nature of batch extracting APK program, obtains static nature vector;
(3) behavioral characteristics of batch extracting APK program, obtains behavioral characteristics vector;
(4) (2) and the vector in (3) is combined, composition general characteristic vector;
(5) vectorial for input dimension with the general characteristic in (4), in conjunction with the supervision value of corresponding A PK program in (1), composition sample set;
(6) sample set in (5) is inserted into system database;
(7) using the sample set in database as input, degree of deep learning model is trained, obtain learning complete detection model.
Fig. 3 shows the APK testing process of the Android malicious code detection system based on degree of depth study shown in Fig. 1, and testing process comprises the following steps:
(1) preserve the APK program that user uploads, and generate the SHA1 hashed value of APK program;
(2) for the hashed value generated in (1), fingerprint matching is carried out in a database;
(3) if the matching result of (2) exists, enter (9), otherwise enter (4);
(4) extract the static nature of APK program in (1), obtain static nature vector;
(5) extract the behavioral characteristics of APK program in (1), obtain behavioral characteristics vector;
(6) (4) and the vector in (5) is combined, composition general characteristic vector;
(7) general characteristic vector in (6) is inputed in the complete detection model of study, Output rusults;
(8) by general characteristic vector in (6) and output valve in (7), insertion system database;
(9) according to record in database, resolve and generate safety assessment report.
Fig. 4 shows the degree of deep learning model part of the Android malicious code detection system based on degree of depth study shown in Fig. 1, and model comprises following characteristics:
(1) mode adopting RNN (multi-story and multi-span) and MLP (multilayer perceptron) model to combine constructs block mold.
(2) use the RNN neural network unfixed dynamic behaviour sequence of treated length, take out behavioral characteristics and be combined into the fixing proper vector of length again with static nature; The internal network state of RNN can well show the behavior of dynamic time sequence, be different from feedforward neural network, RNN can utilize the memory of its inside to process the list entries of arbitrary sequence, and therefore native system uses RNN model to carry out the dynamic behaviour feature of routine analyzer.The behavioral characteristics dimension that DroidBox extracts differed, by the process of RNN model, exports the 23 dimension behavioral characteristics that dimension is fixing.
(3) carry out treatment classification with MLP model, such processing mode has carried out adequately and reasonably using to static nature and behavioral characteristics.Multilayer perceptron (MLP) based on back propagation learning is typical feedforward network, and the process direction of its information is successively carried out to input layer from input layer to each hidden layer again.MLP needs the parameter determined to have: node in hidden layer, the hidden layer connection weights to output layer, the threshold value of output layer.We, by constantly adjusting these parameters, improve the efficiency of training.MLP multilayer perceptron can parallel computation, processing speed is fast and learning functionality is powerful, easily realize Nonlinear Mapping process, and fault-tolerance is strong, local neuron can not cause tremendous influence to overall activity after damaging, and have the function of mode conversion to input signal and feature extraction, uncertain factor is contained to system and the incomplete situation of input pattern is not too responsive.The MLP multilayer perceptron sample bigger than normal to dimension in native system can be integrated fully and train, and reaches the object improving and detect precision.
The MLP model major parameter of final utilization is:
Input: the proper vector (comprising static nature and behavioral characteristics) of 508 dimensions;
Export: the probability of 0 (fail-safe software), the probability of 1 (Malware);
Node in hidden layer: 80;
Hidden layer is to the connection weights of output layer: 0.001;
The threshold value of output layer: 0.7;
Study iterations (Epoch): 1000;
Learning rate (LearningRate): 0.05;
Simultaneously, in order to maximize the efficiency of learning process, native system have employed the method for quick termination (EarlyStopping), namely at the end of each iteration, (namely an iteration takes turns traversal to one of all training datas) calculates the accuracy (accuracy) of verification msg (validationdata), when accuracy no longer improves, with regard to deconditioning.Do like this and unnecessary study both can be avoided to cause waste, also can prevent overfitting (overfitting) simultaneously.
In addition, in the process of training study model, for reaching reliable and stable result, the method that native system uses 5 folding cross validations (5-foldcrossvalidation) to test as hit rate, data set is divided into five parts, use in turn wherein four parts as training, a as checking, the net result that the average of ten results is tested as hit rate.
Fig. 5,6 shows and extracts comprise the following steps based on the behavioral characteristics contained by the Android malicious code detection system of degree of depth study, static nature:
(1) the APK program uploaded of decompression user, obtains two critical file: AndroidManifest.xml and classes.dex;
(2) use AXMLPrinter2 and TinyXml tool parses AndroidManifest.xml file, obtain all authorities of this APK program application, dimension is 120, as the Part I of static nature;
(3) with disassembler baksmali decompiling classes.dex file, cruelly search program's source code, what obtain main API calls situation, is abstracted into the proper vector that dimension is 365, as the Part II of static nature;
(4) use DroidBox as the sandbox of dynamic monitoring, by the crucial API of more than 20 in Hook Android program, via RNN model, obtain 23 dimension behavioral characteristics.
More than describe preferred embodiment of the present invention in detail.Should be appreciated that the ordinary skill of this area just design according to the present invention can make many modifications and variations without the need to creative work.Therefore, all technician in the art, all should by the determined protection domain of claims under this invention's idea on the basis of existing technology by the available technical scheme of logical analysis, reasoning, or a limited experiment.

Claims (10)

1., based on an Android malicious code detection system for degree of depth study, it is characterized in that, described detection system comprises:
Characteristic extracting module, described characteristic extracting module is configured to using APK program as input, uses static nature to extract and extracts with behavioral characteristics the mode combined, export by the proper vector of 0, the 1 described APK program formed;
Degree of depth study module, described degree of depth study module is configured to use multilayer perceptron model to train the sample set be made up of described proper vector and supervision value, obtains learning ripe model; Simultaneously using described proper vector as input, use the model that described study is ripe, Output rusults probability, as the level of security of described APK program;
Report generation module, described report generation module is configured to analyze according to described proper vector and described level of security, and generates assessment report.
2. as claimed in claim 1 based on the Android malicious code detection system of degree of depth study, it is characterized in that, described detection system adopts browser end/server end framework, described server end is configured to by calling described characteristic extracting module, degree of depth study module and report generation module, carries out the ripe pre-service of model of described study and the detection of described APK program; Described browser end is configured to user oriented and carries out uploading APK file, searches for sha1 and present described assessment report.
3., based on an Android malicious code detecting method for degree of depth study, it is characterized in that, described detection method comprises the following steps:
(S1) using APK program as input, use characteristic extracting module to extract behavioral characteristics and the static nature of described APK program, export by the proper vector of 0, the 1 described APK program formed;
(S2) degree of deep learning model is used to carry out pre-service;
(S3) described proper vector is detected;
(S4) assessment report is generated according to the result of above-mentioned detection.
4., as claimed in claim 3 based on the Android malicious code detecting method of degree of depth study, it is characterized in that, the described model preprocessing in step S2 comprises the following steps:
(S2-1) gather a large amount of described APK programs with positive and negative mark, wherein the software of safety is with just identifying, and the software of malice is with negative mark;
(S2-2) static nature of the above-mentioned APK program of batch extracting, obtains static nature vector;
(S2-3) behavioral characteristics of the above-mentioned APK program of batch extracting, obtains behavioral characteristics vector;
(S2-4) by above-mentioned static nature vector and above-mentioned behavioral characteristics Vector Groups synthetic population proper vector;
(S2-5) vectorial for input dimension with above-mentioned general characteristic, the supervision value that described in integrating step (S2-1), APK program is corresponding, is combined into sample set;
(S2-6) above-mentioned sample set is inserted into system database;
(S2-7) using above-mentioned system database as input, degree of deep learning model is trained, obtain learning ripe model.
5., as claimed in claim 3 based on the Android malicious code detecting method of degree of depth study, it is characterized in that, the detection of the proper vector of the program of APK described in step S3 comprises the following steps:
(S3-1) preserve the APK program that user uploads, and generate the SHA1 hashed value of this APK program;
(S3-2) for above-mentioned hashed value, in system database, fingerprint matching is carried out;
(S3-3) if above-mentioned matching result exists, then enter step (S3-9), otherwise enter step (S3-4);
(S3-4) extract the static nature of the APK program that user uploads, obtain static nature vector;
(S3-5) extract the behavioral characteristics of the APK program that user uploads, obtain behavioral characteristics vector;
(S3-6) by above-mentioned static nature vector and above-mentioned behavioral characteristics Vector Groups synthetic population proper vector;
(S3-7) above-mentioned general characteristic vector is inputed in the ripe model of study, Output rusults probability;
(S3-8) above-mentioned general characteristic vector is inserted described system database with above-mentioned Output rusults probability;
(S3-9) according to record in described system database, resolve and generate safety assessment report.
6. as claimed in claim 5 based on the Android malicious code detecting method of degree of depth study, it is characterized in that, step (S3-4), the behavioral characteristics described in (S3-5), static nature extract and comprise the following steps:
(S3-45-1) the APK program uploaded of decompression user, obtains file: AndroidManifest.xml and classes.dex;
(S3-45-2) use AXMLPrinter2 and TinyXml tool parses AndroidManifest.xml file, obtain all authorities of above-mentioned APK program application, dimension is 120, as the Part I of static nature vector;
(S3-45-3) with disassembler baksmali decompiling classes.dex file, and search for the source code that dis-assembling obtains, what obtain API calls situation, is abstracted into the proper vector that dimension is 365, as the Part II of static nature vector;
(S3-45-4) use DroidBox as the sandbox of dynamic monitoring, by 23 API in Hook Android program, obtain 23 dimension behavioral characteristics vectors.
7., as claimed in claim 4 based on the Android malicious code detecting method of degree of depth study, it is characterized in that, the degree of deep learning model used has following feature:
(1) mode adopting multi-story and multi-span and multilayer perceptron model to combine constructs block mold;
(2) adopt the unfixed dynamic behaviour sequence of multi-story and multi-span treated length, after taking out behavioral characteristics, be combined into the general characteristic vector that length is fixing again with static nature
(3) multilayer perceptron model is adopted to carry out treatment classification.
8., as claimed in claim 7 based on the Android malicious code detecting method of degree of depth study, it is characterized in that, the parameter of described multilayer perceptron model is:
Input: the proper vector of 508 dimensions, comprises static nature and behavioral characteristics;
Export: the probability of fail-safe software, the probability of Malware;
Node in hidden layer: 80;
Hidden layer is to the connection weights of output layer: 0.001;
The threshold value of output layer: 0.7;
Study iterations: 1000;
Learning rate: 0.05.
9. as claimed in claim 7 based on the Android malicious code detecting method of degree of depth study, it is characterized in that, described multilayer perceptron model have employed the method stopped fast, namely at the end of each iteration, calculate the accuracy of verification msg, when above-mentioned accuracy no longer improves, with regard to deconditioning, in order to avoid overfitting.
10. as claimed in claim 7 based on the Android malicious code detecting method of degree of depth study, it is characterized in that, described multilayer perceptron model have employed the method that 5 folding cross validations are tested as hit rate, five parts are divided into by verification msg collection, use wherein four parts of conduct training in turn, a as checking, the net result that the average of ten results is tested as hit rate.
CN201510667016.2A 2015-10-15 2015-10-15 Detecting system for Android malicious code based on deep learning and method thereof Pending CN105205396A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510667016.2A CN105205396A (en) 2015-10-15 2015-10-15 Detecting system for Android malicious code based on deep learning and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510667016.2A CN105205396A (en) 2015-10-15 2015-10-15 Detecting system for Android malicious code based on deep learning and method thereof

Publications (1)

Publication Number Publication Date
CN105205396A true CN105205396A (en) 2015-12-30

Family

ID=54953070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510667016.2A Pending CN105205396A (en) 2015-10-15 2015-10-15 Detecting system for Android malicious code based on deep learning and method thereof

Country Status (1)

Country Link
CN (1) CN105205396A (en)

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740709A (en) * 2016-01-29 2016-07-06 博雅网信(北京)科技有限公司 Authority combination-based Android malicious software detection method
CN105893848A (en) * 2016-04-27 2016-08-24 南京邮电大学 Precaution method for Android malicious application program based on code behavior similarity matching
CN105975861A (en) * 2016-05-27 2016-09-28 百度在线网络技术(北京)有限公司 Application detection method and device
CN106022127A (en) * 2016-05-10 2016-10-12 江苏通付盾科技有限公司 APK file security detection method and apparatus
CN106096415A (en) * 2016-06-24 2016-11-09 康佳集团股份有限公司 A kind of malicious code detecting method based on degree of depth study and system
CN106709290A (en) * 2016-12-16 2017-05-24 江苏通付盾科技有限公司 Application security analysis method and device
CN106778277A (en) * 2017-01-13 2017-05-31 北京邮电大学 Malware detection methods and device
CN106845235A (en) * 2017-01-11 2017-06-13 中科院微电子研究所昆山分所 A kind of Android platform call back function detection method based on machine learning method
CN106843832A (en) * 2016-12-19 2017-06-13 曙光信息产业(北京)有限公司 The management system of deep learning
CN107169351A (en) * 2017-05-11 2017-09-15 北京理工大学 With reference to the Android unknown malware detection methods of dynamic behaviour feature
CN107180191A (en) * 2017-05-03 2017-09-19 北京理工大学 A kind of malicious code analysis method and system based on semi-supervised learning
CN107392025A (en) * 2017-08-28 2017-11-24 刘龙 Malice Android application program detection method based on deep learning
CN107742079A (en) * 2017-10-18 2018-02-27 杭州安恒信息技术有限公司 Malware recognition methods and system
CN107944274A (en) * 2017-12-18 2018-04-20 华中科技大学 A kind of Android platform malicious application off-line checking method based on width study
CN108008948A (en) * 2016-11-30 2018-05-08 上海寒武纪信息科技有限公司 A kind of multiplexer and method, processing unit for instructing generating process
CN108038378A (en) * 2017-12-28 2018-05-15 厦门服云信息科技有限公司 High in the clouds detection function is by the method for malicious modification, terminal device and storage medium
CN108334781A (en) * 2018-03-07 2018-07-27 腾讯科技(深圳)有限公司 Method for detecting virus, device, computer readable storage medium and computer equipment
CN108345794A (en) * 2017-12-29 2018-07-31 北京物资学院 The detection method and device of Malware
CN108509796A (en) * 2017-02-24 2018-09-07 中国移动通信集团公司 A kind of detection method and server of risk
CN108563951A (en) * 2018-04-13 2018-09-21 腾讯科技(深圳)有限公司 Method for detecting virus and device
CN108595955A (en) * 2018-04-25 2018-09-28 东北大学 A kind of Android mobile phone malicious application detecting system and method
CN108614970A (en) * 2018-04-03 2018-10-02 腾讯科技(深圳)有限公司 Detection method, model training method, device and the equipment of Virus
CN108734010A (en) * 2017-04-17 2018-11-02 北京京东尚科信息技术有限公司 The method, apparatus of file detection
CN108764935A (en) * 2018-04-19 2018-11-06 华东师范大学 A kind of ranking fraud detection method of application program
CN108763958A (en) * 2018-06-01 2018-11-06 中国科学院软件研究所 Intelligent mobile terminal sensitive data authority checking defect inspection method based on deep learning
CN108920958A (en) * 2018-07-13 2018-11-30 深圳市联软科技股份有限公司 Detect method, apparatus, medium and the equipment of pe file abnormal behaviour
CN108985060A (en) * 2018-07-04 2018-12-11 中共中央办公厅电子科技学院 A kind of extensive Android Malware automated detection system and method
CN109002696A (en) * 2018-06-29 2018-12-14 北京奇虎科技有限公司 It establishes the method for installation kit identification model, identify the method and device of installation kit
CN109120584A (en) * 2018-06-19 2019-01-01 上海交通大学 Terminal security prevention method and system based on UEFI and WinPE
CN109271788A (en) * 2018-08-23 2019-01-25 北京理工大学 A kind of Android malware detection method based on deep learning
CN109416719A (en) * 2016-04-22 2019-03-01 谭琳 Method for determining the defects of software code He loophole
CN109558707A (en) * 2018-11-16 2019-04-02 北京梆梆安全科技有限公司 A kind of detection method and device, the mobile device of encryption function security level
CN109840417A (en) * 2017-11-28 2019-06-04 清华大学 A kind of malware detection method and device
CN110135157A (en) * 2019-04-04 2019-08-16 国家计算机网络与信息安全管理中心 Malware homology analysis method, system, electronic equipment and storage medium
KR20190102451A (en) * 2018-02-26 2019-09-04 한국인터넷진흥원 Method for detecting malicious application and apparatus thereof
CN110210216A (en) * 2018-04-13 2019-09-06 腾讯科技(深圳)有限公司 A kind of method and relevant apparatus of viral diagnosis
CN110263538A (en) * 2019-05-13 2019-09-20 重庆大学 A kind of malicious code detecting method based on system action sequence
CN110515654A (en) * 2019-08-27 2019-11-29 北京电子科技学院 A kind of Android application management system and method based on deep learning
CN110633197A (en) * 2018-06-22 2019-12-31 北京京东尚科信息技术有限公司 Method and device for detecting excessive drawing
CN110659483A (en) * 2018-06-29 2020-01-07 卡巴斯基实验室股份制公司 System and method for identifying malicious files using a learning model trained on one malicious file
CN110858247A (en) * 2018-08-23 2020-03-03 北京京东尚科信息技术有限公司 Android malicious application detection method, system, device and storage medium
CN110941828A (en) * 2019-11-13 2020-03-31 辽宁大学 Android malicious software static detection method based on android GRU
CN111382434A (en) * 2018-12-28 2020-07-07 卡巴斯基实验室股份制公司 System and method for detecting malicious files
CN111523117A (en) * 2020-04-10 2020-08-11 西安电子科技大学 Android malicious software detection and malicious code positioning system and method
CN111753290A (en) * 2020-05-26 2020-10-09 郑州启明星辰信息安全技术有限公司 Software type detection method and related equipment
CN112417450A (en) * 2020-11-20 2021-02-26 复旦大学 Malicious behavior real-time detection system based on dynamic behavior sequence and deep learning
CN113378171A (en) * 2021-07-12 2021-09-10 东北大学秦皇岛分校 Android lasso software detection method based on convolutional neural network
CN113536302A (en) * 2021-07-26 2021-10-22 北京计算机技术及应用研究所 Interface caller safety rating method based on deep learning
CN113935022A (en) * 2021-12-17 2022-01-14 北京微步在线科技有限公司 Homologous sample capturing method and device, electronic equipment and storage medium
CN114237630A (en) * 2020-09-09 2022-03-25 中国电信股份有限公司 Privacy permission detection method and device
CN114692148A (en) * 2022-03-31 2022-07-01 中国舰船研究设计中心 Malicious code detection method based on machine learning
CN114692148B (en) * 2022-03-31 2024-04-26 中国舰船研究设计中心 Malicious code detection method based on machine learning

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102411687A (en) * 2011-11-22 2012-04-11 华北电力大学 Deep learning detection method of unknown malicious codes
CN103823751A (en) * 2013-12-13 2014-05-28 国家计算机网络与信息安全管理中心 Counterfeit application program monitoring method based on characteristic implantation
CN104123500A (en) * 2014-07-22 2014-10-29 卢永强 Android platform malicious application detection method and device based on deep learning

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102411687A (en) * 2011-11-22 2012-04-11 华北电力大学 Deep learning detection method of unknown malicious codes
CN103823751A (en) * 2013-12-13 2014-05-28 国家计算机网络与信息安全管理中心 Counterfeit application program monitoring method based on characteristic implantation
CN104123500A (en) * 2014-07-22 2014-10-29 卢永强 Android platform malicious application detection method and device based on deep learning

Cited By (72)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740709A (en) * 2016-01-29 2016-07-06 博雅网信(北京)科技有限公司 Authority combination-based Android malicious software detection method
CN105740709B (en) * 2016-01-29 2018-09-28 博雅网信(北京)科技有限公司 A kind of Android malware detection method based on permission combination
CN109416719A (en) * 2016-04-22 2019-03-01 谭琳 Method for determining the defects of software code He loophole
CN105893848A (en) * 2016-04-27 2016-08-24 南京邮电大学 Precaution method for Android malicious application program based on code behavior similarity matching
CN106022127A (en) * 2016-05-10 2016-10-12 江苏通付盾科技有限公司 APK file security detection method and apparatus
CN105975861A (en) * 2016-05-27 2016-09-28 百度在线网络技术(北京)有限公司 Application detection method and device
CN106096415B (en) * 2016-06-24 2019-05-21 康佳集团股份有限公司 A kind of malicious code detecting method and system based on deep learning
CN106096415A (en) * 2016-06-24 2016-11-09 康佳集团股份有限公司 A kind of malicious code detecting method based on degree of depth study and system
CN108008948B (en) * 2016-11-30 2023-08-25 上海寒武纪信息科技有限公司 Multiplexing device, multiplexing method and processing device for instruction generation process
CN108008948A (en) * 2016-11-30 2018-05-08 上海寒武纪信息科技有限公司 A kind of multiplexer and method, processing unit for instructing generating process
CN106709290A (en) * 2016-12-16 2017-05-24 江苏通付盾科技有限公司 Application security analysis method and device
CN106843832A (en) * 2016-12-19 2017-06-13 曙光信息产业(北京)有限公司 The management system of deep learning
CN106845235A (en) * 2017-01-11 2017-06-13 中科院微电子研究所昆山分所 A kind of Android platform call back function detection method based on machine learning method
CN106845235B (en) * 2017-01-11 2019-09-13 中科院微电子研究所昆山分所 A kind of Android platform call back function detection method based on machine learning method
CN106778277A (en) * 2017-01-13 2017-05-31 北京邮电大学 Malware detection methods and device
CN108509796B (en) * 2017-02-24 2022-02-11 中国移动通信集团公司 Method for detecting risk and server
CN108509796A (en) * 2017-02-24 2018-09-07 中国移动通信集团公司 A kind of detection method and server of risk
CN108734010A (en) * 2017-04-17 2018-11-02 北京京东尚科信息技术有限公司 The method, apparatus of file detection
CN107180191A (en) * 2017-05-03 2017-09-19 北京理工大学 A kind of malicious code analysis method and system based on semi-supervised learning
CN107169351A (en) * 2017-05-11 2017-09-15 北京理工大学 With reference to the Android unknown malware detection methods of dynamic behaviour feature
CN107392025A (en) * 2017-08-28 2017-11-24 刘龙 Malice Android application program detection method based on deep learning
CN107392025B (en) * 2017-08-28 2020-06-26 刘龙 Malicious android application program detection method based on deep learning
CN107742079B (en) * 2017-10-18 2020-02-21 杭州安恒信息技术股份有限公司 Malicious software identification method and system
CN107742079A (en) * 2017-10-18 2018-02-27 杭州安恒信息技术有限公司 Malware recognition methods and system
CN109840417A (en) * 2017-11-28 2019-06-04 清华大学 A kind of malware detection method and device
CN109840417B (en) * 2017-11-28 2020-12-01 清华大学 Malicious software detection method and device
CN107944274A (en) * 2017-12-18 2018-04-20 华中科技大学 A kind of Android platform malicious application off-line checking method based on width study
CN108038378A (en) * 2017-12-28 2018-05-15 厦门服云信息科技有限公司 High in the clouds detection function is by the method for malicious modification, terminal device and storage medium
CN108345794A (en) * 2017-12-29 2018-07-31 北京物资学院 The detection method and device of Malware
KR102058966B1 (en) * 2018-02-26 2019-12-24 한국인터넷진흥원 Method for detecting malicious application and apparatus thereof
KR20190102451A (en) * 2018-02-26 2019-09-04 한국인터넷진흥원 Method for detecting malicious application and apparatus thereof
CN108334781B (en) * 2018-03-07 2020-04-14 腾讯科技(深圳)有限公司 Virus detection method, device, computer readable storage medium and computer equipment
CN108334781A (en) * 2018-03-07 2018-07-27 腾讯科技(深圳)有限公司 Method for detecting virus, device, computer readable storage medium and computer equipment
CN108614970A (en) * 2018-04-03 2018-10-02 腾讯科技(深圳)有限公司 Detection method, model training method, device and the equipment of Virus
CN108614970B (en) * 2018-04-03 2023-12-15 腾讯科技(深圳)有限公司 Virus program detection method, model training method, device and equipment
CN110210216A (en) * 2018-04-13 2019-09-06 腾讯科技(深圳)有限公司 A kind of method and relevant apparatus of viral diagnosis
CN108563951A (en) * 2018-04-13 2018-09-21 腾讯科技(深圳)有限公司 Method for detecting virus and device
CN110210216B (en) * 2018-04-13 2023-03-17 腾讯科技(深圳)有限公司 Virus detection method and related device
CN108764935A (en) * 2018-04-19 2018-11-06 华东师范大学 A kind of ranking fraud detection method of application program
CN108595955A (en) * 2018-04-25 2018-09-28 东北大学 A kind of Android mobile phone malicious application detecting system and method
CN108763958A (en) * 2018-06-01 2018-11-06 中国科学院软件研究所 Intelligent mobile terminal sensitive data authority checking defect inspection method based on deep learning
CN109120584A (en) * 2018-06-19 2019-01-01 上海交通大学 Terminal security prevention method and system based on UEFI and WinPE
CN110633197B (en) * 2018-06-22 2024-04-12 北京京东尚科信息技术有限公司 Method and device for detecting excessive drawing
CN110633197A (en) * 2018-06-22 2019-12-31 北京京东尚科信息技术有限公司 Method and device for detecting excessive drawing
CN109002696A (en) * 2018-06-29 2018-12-14 北京奇虎科技有限公司 It establishes the method for installation kit identification model, identify the method and device of installation kit
CN110659483B (en) * 2018-06-29 2023-04-28 卡巴斯基实验室股份制公司 System and method for identifying multiple malicious files using a learning model trained on one malicious file
CN110659483A (en) * 2018-06-29 2020-01-07 卡巴斯基实验室股份制公司 System and method for identifying malicious files using a learning model trained on one malicious file
CN108985060A (en) * 2018-07-04 2018-12-11 中共中央办公厅电子科技学院 A kind of extensive Android Malware automated detection system and method
CN108920958A (en) * 2018-07-13 2018-11-30 深圳市联软科技股份有限公司 Detect method, apparatus, medium and the equipment of pe file abnormal behaviour
CN110858247A (en) * 2018-08-23 2020-03-03 北京京东尚科信息技术有限公司 Android malicious application detection method, system, device and storage medium
CN109271788A (en) * 2018-08-23 2019-01-25 北京理工大学 A kind of Android malware detection method based on deep learning
CN109271788B (en) * 2018-08-23 2021-10-12 北京理工大学 Android malicious software detection method based on deep learning
CN109558707B (en) * 2018-11-16 2021-05-07 北京梆梆安全科技有限公司 Method and device for detecting security level of encryption function and mobile device
CN109558707A (en) * 2018-11-16 2019-04-02 北京梆梆安全科技有限公司 A kind of detection method and device, the mobile device of encryption function security level
CN111382434A (en) * 2018-12-28 2020-07-07 卡巴斯基实验室股份制公司 System and method for detecting malicious files
CN110135157A (en) * 2019-04-04 2019-08-16 国家计算机网络与信息安全管理中心 Malware homology analysis method, system, electronic equipment and storage medium
CN110263538B (en) * 2019-05-13 2021-07-09 重庆大学 Malicious code detection method based on system behavior sequence
CN110263538A (en) * 2019-05-13 2019-09-20 重庆大学 A kind of malicious code detecting method based on system action sequence
CN110515654A (en) * 2019-08-27 2019-11-29 北京电子科技学院 A kind of Android application management system and method based on deep learning
CN110941828B (en) * 2019-11-13 2023-12-15 深圳市凌晨知识产权运营有限公司 Android malicious software static detection method based on android GRU
CN110941828A (en) * 2019-11-13 2020-03-31 辽宁大学 Android malicious software static detection method based on android GRU
CN111523117A (en) * 2020-04-10 2020-08-11 西安电子科技大学 Android malicious software detection and malicious code positioning system and method
CN111753290A (en) * 2020-05-26 2020-10-09 郑州启明星辰信息安全技术有限公司 Software type detection method and related equipment
CN114237630A (en) * 2020-09-09 2022-03-25 中国电信股份有限公司 Privacy permission detection method and device
CN112417450B (en) * 2020-11-20 2022-05-20 复旦大学 Malicious behavior real-time detection system based on dynamic behavior sequence and deep learning
CN112417450A (en) * 2020-11-20 2021-02-26 复旦大学 Malicious behavior real-time detection system based on dynamic behavior sequence and deep learning
CN113378171B (en) * 2021-07-12 2022-06-21 东北大学秦皇岛分校 Android lasso software detection method based on convolutional neural network
CN113378171A (en) * 2021-07-12 2021-09-10 东北大学秦皇岛分校 Android lasso software detection method based on convolutional neural network
CN113536302A (en) * 2021-07-26 2021-10-22 北京计算机技术及应用研究所 Interface caller safety rating method based on deep learning
CN113935022A (en) * 2021-12-17 2022-01-14 北京微步在线科技有限公司 Homologous sample capturing method and device, electronic equipment and storage medium
CN114692148A (en) * 2022-03-31 2022-07-01 中国舰船研究设计中心 Malicious code detection method based on machine learning
CN114692148B (en) * 2022-03-31 2024-04-26 中国舰船研究设计中心 Malicious code detection method based on machine learning

Similar Documents

Publication Publication Date Title
CN105205396A (en) Detecting system for Android malicious code based on deep learning and method thereof
CN105989283B (en) A kind of method and device identifying virus mutation
CN107392025B (en) Malicious android application program detection method based on deep learning
CN108595955B (en) Android mobile phone malicious application detection system and method
CN105022960B (en) Multiple features mobile terminal from malicious software detecting method and system based on network traffics
CN109241711A (en) User behavior recognition method and device based on prediction model
CN105471882A (en) Behavior characteristics-based network attack detection method and device
CN105184160B (en) A kind of method of the Android phone platform application program malicious act detection based on API object reference relational graphs
CN110489964A (en) Account detection method, device, server and storage medium
CN107659570A (en) Webshell detection methods and system based on machine learning and static and dynamic analysis
CN105677574B (en) Android application leak detection method and system based on function control stream
CN107944274A (en) A kind of Android platform malicious application off-line checking method based on width study
CN110414277B (en) Gate-level hardware Trojan horse detection method based on multi-feature parameters
CN109992969B (en) Malicious file detection method and device and detection platform
CN108985061A (en) A kind of webshell detection method based on Model Fusion
CN108229170B (en) Software analysis method and apparatus using big data and neural network
CN111931179B (en) Cloud malicious program detection system and method based on deep learning
Narayanan et al. Contextual weisfeiler-lehman graph kernel for malware detection
CN111177714A (en) Abnormal behavior detection method and device, computer equipment and storage medium
CN110765459A (en) Malicious script detection method and device and storage medium
CN109657461B (en) RTL hardware Trojan horse detection method based on gradient lifting algorithm
CN109858248A (en) Malice Word document detection method and device
CN107103237A (en) A kind of detection method and device of malicious file
CN109740347A (en) A kind of identification of the fragile hash function for smart machine firmware and crack method
CN109391624A (en) A kind of terminal access data exception detection method and device based on machine learning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151230