CN105718792A - Sandbox based two-dimensional code detection method and system - Google Patents

Sandbox based two-dimensional code detection method and system Download PDF

Info

Publication number
CN105718792A
CN105718792A CN201510495080.7A CN201510495080A CN105718792A CN 105718792 A CN105718792 A CN 105718792A CN 201510495080 A CN201510495080 A CN 201510495080A CN 105718792 A CN105718792 A CN 105718792A
Authority
CN
China
Prior art keywords
quick response
response code
information
sandbox
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510495080.7A
Other languages
Chinese (zh)
Inventor
王聪
李柏松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Antiy Technology Co Ltd
Original Assignee
Harbin Antiy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Antiy Technology Co Ltd filed Critical Harbin Antiy Technology Co Ltd
Priority to CN201510495080.7A priority Critical patent/CN105718792A/en
Publication of CN105718792A publication Critical patent/CN105718792A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a sandbox based two-dimensional code detection method. The sandbox based two-dimensional code detection method comprises the following steps of inputting a two-dimensional code to a simulation sandbox for running when a scanning tool is scanning the two-dimensional code; acquiring correlation behavior information of the two-dimensional code, and judging whether the correlation behavior information is possessed with a threat, if yes, giving out a threat level; monitoring the stability of the simulation sandbox in real time, and giving out an abnormal level if abnormality occurs; and comprehensively judging whether the two-dimensional code is malicious or not according to the thread level and the abnormal level, if yes, intercepting the two-dimensional code and generating a behavior report, otherwise allowing a terminal to open the two-dimensional code. The invention also discloses a sandbox based two-dimensional code detection system. With the technical scheme disclosed by the invention, the limitation of static detection can be made up, and a better detection effect can be achieved.

Description

A kind of Quick Response Code detection method based on sandbox and system
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of Quick Response Code detection method based on sandbox and system.
Background technology
The utilization rate of current Quick Response Code is more and more higher, is almost seen everywhere.Relatively common Quick Response Code content is usually network address, file (download app), WIFI login etc., but actually common text, individual business card, picture, note, phone etc. can be fabricated to Quick Response Code, and it is very low to make threshold.
The detection of malice Quick Response Code is but without more perfect method, but the form of malice Quick Response Code is varied, is currently based on the static detection method such as black and white lists and condition code and is not enough to safeguard the safety of Quick Response Code.
Summary of the invention
Technical solutions according to the invention are run by being put into by the Quick Response Code of scanning in simulation sandbox, by monitoring the corelation behaviour information of described Quick Response Code and providing threat level;Meanwhile, the stability of monitoring simulation sandbox, if occurring abnormal, provide exception level, whether maliciously Quick Response Code described in final synthetic determination, is only finally judged to that safe Quick Response Code is just permitted to open.Therefore, technical solutions according to the invention compensate for the hysteresis quality of traditional static feature detection and the problem that rate of false alarm is higher, and testing result is more accurate.
The present invention adopts and realizes with the following method: a kind of Quick Response Code detection method based on sandbox, including:
When finding that barcode scanning instrument is scanning Quick Response Code, then described Quick Response Code is put in simulation sandbox and run;
Obtain the corelation behaviour information of described Quick Response Code, and provide threat level based on described corelation behaviour information;
The stability of monitor in real time simulation sandbox, if occurring abnormal, then provides exception level;
According to described threat level and exception level comprehensive descision, maliciously whether Quick Response Code, if so, then intercepts and generate behavior report, otherwise allows terminal to open described Quick Response Code.
Further, the corelation behaviour information of described Quick Response Code, including: network behavior, local behavior, developer's information, plugin information, running background information on services, self-starting mode, authority information, embedded file situation, association URL or API Calls situation.
Further, according to described threat level and exception level comprehensive descision, maliciously whether Quick Response Code, particularly as follows: set weights according to described threat level and exception level, and judge weights and whether exceed predetermined threshold value, if exceeding, then it is malice, is otherwise safety.
Further, described interception the behavior that generates also include: extract the static nature of described Quick Response Code and add virus characteristic storehouse after reporting.
The present invention can adopt following system to realize: a kind of Quick Response Code based on sandbox detects system, including:
Monitoring module, for when finding that barcode scanning instrument is scanning Quick Response Code, then putting into described Quick Response Code in simulation sandbox and run;
Threat judgment module, for obtaining the corelation behaviour information of described Quick Response Code, and provides threat level based on described corelation behaviour information;
Unusual determination module, simulates the stability of sandbox for monitor in real time, if occurring abnormal, then provides exception level;
For Quick Response Code according to described threat level and exception level comprehensive descision whether maliciously synthetic determination module, if so, then intercept and generate behavior report, otherwise allow terminal to open described Quick Response Code.
Further, the corelation behaviour information of described Quick Response Code, including: network behavior, local behavior, developer's information, plugin information, running background information on services, self-starting mode, authority information, embedded file situation, association URL or API Calls situation.
Further, according to described threat level and exception level comprehensive descision, maliciously whether Quick Response Code, particularly as follows: set weights according to described threat level and exception level, and judge weights and whether exceed predetermined threshold value, if exceeding, then it is malice, is otherwise safety.
Further, described interception the behavior that generates also include: extract the static nature of described Quick Response Code and add virus characteristic storehouse after reporting.
As it has been described above, the present invention provides a kind of Quick Response Code detection method based on sandbox and system, first by etc. Quick Response Code to be opened put into simulation sandbox in;The terminal environments that described simulation sandboxing techniques Quick Response Code runs runs described Quick Response Code;The corelation behaviour information that monitoring now produces, and provide threat level based on these corelation behaviour information;Meanwhile, monitoring simulation sandbox is in the stability of Quick Response Code run duration, and provides exception level;It is based ultimately upon described threat level and described exception level judges whether maliciously described Quick Response Code.
Beneficial effect: traditional static detection method has some limitations and hysteresis quality, has Detection capability only for known malicious Quick Response Code, then helpless for unknown malice Quick Response Code;The present invention compensate for the deficiencies in the prior art, when terminal scanning Quick Response Code, first it is run in simulation sandbox and provides final result of determination and provide corresponding behavior to report, providing the user more comprehensively information, and auxiliary user judges and decision-making;Thus avoiding user to open malice Quick Response Code, and system itself will not be hurt, safer.
Accompanying drawing explanation
In order to be illustrated more clearly that technical scheme, the accompanying drawing used required in embodiment will be briefly described below, apparently, the accompanying drawing that the following describes is only some embodiments recorded in the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a kind of Quick Response Code detection method embodiment flow chart based on sandbox provided by the invention;
Fig. 2 is that a kind of Quick Response Code based on sandbox provided by the invention detects system embodiment structure chart.
Detailed description of the invention
The present invention gives a kind of Quick Response Code detection method based on sandbox and system embodiment, in order to make those skilled in the art be more fully understood that the technical scheme in the embodiment of the present invention, and it is understandable to enable the above-mentioned purpose of the present invention, feature and advantage to become apparent from, below in conjunction with accompanying drawing, technical scheme in the present invention is described in further detail:
Present invention firstly provides a kind of Quick Response Code detection method embodiment based on sandbox, as it is shown in figure 1, include:
Described Quick Response Code when finding that barcode scanning instrument is scanning Quick Response Code, is then put in simulation sandbox and is run by S101;
Wherein, utilize simulation sandbox to open Quick Response Code, do not worry harm security of system;
S102 obtains the corelation behaviour information of described Quick Response Code, and provides threat level based on described corelation behaviour information;
Wherein, utilize simulation sandbox to carry out Simulated movable terminal system environment, and then described Quick Response Code content is opened in simulation, and the corelation behaviour information of described Quick Response Code is monitored and obtained to the moment, based on the menace that described behavioural information reflects, provides threat level;Thus 2 D code information is intuitively shown in front of the user;
The stability of S103 monitor in real time simulation sandbox, if occurring abnormal, then provides exception level;
Wherein, the monitoring means of the stability of described monitoring simulation sandbox, including: monitoring associated process, or the response for simulated operation;Described occur abnormal, including: process collapse, the response abnormality of simulated operation or blue screen etc.;Difference according to these abnormal phenomenas, sets exception level;
Whether maliciously S104 Quick Response Code according to described threat level and exception level comprehensive descision, if so, then intercepts and generates behavior report, otherwise allows terminal to open described Quick Response Code.
Wherein, the present invention finally will provide for a behavior report, it is provided that the detailed behavioral data of malice Quick Response Code, allows user more can be visually seen malicious act, thus making decision-making more accurately.
Preferably, the corelation behaviour information of described Quick Response Code, including: network behavior, local behavior, developer's information, plugin information, running background information on services, self-starting mode, authority information, embedded file situation, association URL or API Calls situation.
Preferably, according to described threat level and exception level comprehensive descision, maliciously whether Quick Response Code, particularly as follows: set weights according to described threat level and exception level, and judges weights and whether exceedes predetermined threshold value, if exceeding, is then malice, is otherwise safety.Wherein, set different weights for each threat level with exception level, finally utilize weights and determine whether malice, it is possible to reduce wrong report or fail to report, improving accuracy.
Preferably, described interception the behavior that generates also include: extract the static nature of described Quick Response Code and add virus characteristic storehouse after reporting.Assisting Static Detection with this, updating virus characteristic storehouse, thus realizing more fully Detection results.
Present invention also offers a kind of Quick Response Code based on sandbox and detect system embodiment, as in figure 2 it is shown, include:
Monitoring module 201, for when finding that barcode scanning instrument is scanning Quick Response Code, then putting into described Quick Response Code in simulation sandbox and run;
Threat judgment module 202, for obtaining the corelation behaviour information of described Quick Response Code, and provides threat level based on described corelation behaviour information;
Unusual determination module 203, simulates the stability of sandbox for monitor in real time, if occurring abnormal, then provides exception level;
For Quick Response Code according to described threat level and exception level comprehensive descision whether maliciously synthetic determination module 204, if so, then intercept and generate behavior report, otherwise allow terminal to open described Quick Response Code.
Preferably, the corelation behaviour information of described Quick Response Code, including: network behavior, local behavior, developer's information, plugin information, running background information on services, self-starting mode, authority information, embedded file situation, association URL or API Calls situation.
Preferably, according to described threat level and exception level comprehensive descision, maliciously whether Quick Response Code, particularly as follows: set weights according to described threat level and exception level, and judges weights and whether exceedes predetermined threshold value, if exceeding, is then malice, is otherwise safety.
Preferably, described interception the behavior that generates also include: extract the static nature of described Quick Response Code and add virus characteristic storehouse after reporting.
As it has been described above, traditional Quick Response Code detection method is based on the means such as signature detection, or black and white lists coupling mostly, and these detection methods are not enough to safeguard the safety of Quick Response Code.In order to make up the deficiency of traditional detection method, the invention provides a kind of Quick Response Code detection method based on sandbox and system, run by the Quick Response Code of scanning is put in simulation sandbox, thus avoiding harm system, safer;Monitoring simulation sandbox, obtains corelation behaviour information and provides threat level based on this;If it is abnormal to find that simulation sandbox occurs, then provide exception level;It is based ultimately upon threat level and exception level provides final judgement;So not only provide final conclusion, and provide more directly perceived and objective class information and check for user;Thus assisting user to make decision-making more accurately, and compensate for the deficiency of Static Detection;Simultaneously, it is possible to finally provide behavior report, thus allowing user more accurately obtain the detailed behavioural information of malice Quick Response Code.
Above example is in order to illustrative not limiting technical scheme.Without departing from any modification or partial replacement of spirit and scope of the invention, all should be encompassed in the middle of scope of the presently claimed invention.

Claims (8)

1. the Quick Response Code detection method based on sandbox, it is characterised in that including:
When finding that barcode scanning instrument is scanning Quick Response Code, then described Quick Response Code is put in simulation sandbox and run;
Obtain the corelation behaviour information of described Quick Response Code, and provide threat level based on described corelation behaviour information;
The stability of monitor in real time simulation sandbox, if occurring abnormal, then provides exception level;
According to described threat level and exception level comprehensive descision, maliciously whether Quick Response Code, if so, then intercepts and generate behavior report, otherwise allows terminal to open described Quick Response Code.
2. method as claimed in claim 1, it is characterized in that, the corelation behaviour information of described Quick Response Code, including: network behavior, local behavior, developer's information, plugin information, running background information on services, self-starting mode, authority information, embedded file situation, association URL or API Calls situation.
3. method as claimed in claim 1, it is characterized in that, according to described threat level and exception level comprehensive descision, maliciously whether Quick Response Code, particularly as follows: set weights according to described threat level and exception level, and judge weights and whether exceed predetermined threshold value, if exceeding, then it is malice, is otherwise safety.
4. method as claimed in claim 1, it is characterised in that described interception the behavior that generates also include: extract the static nature of described Quick Response Code and add virus characteristic storehouse after reporting.
5. the Quick Response Code based on sandbox detects system, it is characterised in that including:
Monitoring module, for when finding that barcode scanning instrument is scanning Quick Response Code, then putting into described Quick Response Code in simulation sandbox and run;
Threat judgment module, for obtaining the corelation behaviour information of described Quick Response Code, and provides threat level based on described corelation behaviour information;
Unusual determination module, simulates the stability of sandbox for monitor in real time, if occurring abnormal, then provides exception level;
For Quick Response Code according to described threat level and exception level comprehensive descision whether maliciously synthetic determination module, if so, then intercept and generate behavior report, otherwise allow terminal to open described Quick Response Code.
6. system as claimed in claim 5, it is characterized in that, the corelation behaviour information of described Quick Response Code, including: network behavior, local behavior, developer's information, plugin information, running background information on services, self-starting mode, authority information, embedded file situation, association URL or API Calls situation.
7. system as claimed in claim 5, it is characterized in that, according to described threat level and exception level comprehensive descision, maliciously whether Quick Response Code, particularly as follows: set weights according to described threat level and exception level, and judge weights and whether exceed predetermined threshold value, if exceeding, then it is malice, is otherwise safety.
8. system as claimed in claim 5, it is characterised in that described interception the behavior that generates also include: extract the static nature of described Quick Response Code and add virus characteristic storehouse after reporting.
CN201510495080.7A 2015-08-13 2015-08-13 Sandbox based two-dimensional code detection method and system Pending CN105718792A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510495080.7A CN105718792A (en) 2015-08-13 2015-08-13 Sandbox based two-dimensional code detection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510495080.7A CN105718792A (en) 2015-08-13 2015-08-13 Sandbox based two-dimensional code detection method and system

Publications (1)

Publication Number Publication Date
CN105718792A true CN105718792A (en) 2016-06-29

Family

ID=56144859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510495080.7A Pending CN105718792A (en) 2015-08-13 2015-08-13 Sandbox based two-dimensional code detection method and system

Country Status (1)

Country Link
CN (1) CN105718792A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108009425A (en) * 2017-11-29 2018-05-08 四川无声信息技术有限公司 File detects and threat level decision method, apparatus and system
CN109450619A (en) * 2018-10-07 2019-03-08 杭州安恒信息技术股份有限公司 A kind of two-dimension code safe means of defence and system
CN109726551A (en) * 2017-10-31 2019-05-07 武汉安天信息技术有限责任公司 The methods of exhibiting and system of preceding bad behavior are installed in a kind of application
WO2020098326A1 (en) * 2018-11-15 2020-05-22 中兴通讯股份有限公司 Information management method and processing method, device and storage medium
US10970378B2 (en) * 2019-05-13 2021-04-06 Cyberark Software Ltd. Secure generation and verification of machine-readable visual codes
WO2021214597A1 (en) * 2020-04-23 2021-10-28 International Business Machines Corporation Deep packet analysis
CN115002685A (en) * 2022-07-14 2022-09-02 深圳市利诺威科技有限公司 Method and system for transmitting image data
CN116861412A (en) * 2023-06-26 2023-10-10 深圳市赛凌伟业科技有限公司 Information security analysis method and system based on big data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819723A (en) * 2011-12-26 2012-12-12 哈尔滨安天科技股份有限公司 Method and system for detecting malicious two-dimension codes
CN103984697A (en) * 2014-04-08 2014-08-13 百度在线网络技术(北京)有限公司 Barcode information processing method, device and system
CN104766011A (en) * 2015-03-26 2015-07-08 国家电网公司 Sandbox detection alarming method and system based on main engine characteristic

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819723A (en) * 2011-12-26 2012-12-12 哈尔滨安天科技股份有限公司 Method and system for detecting malicious two-dimension codes
CN103984697A (en) * 2014-04-08 2014-08-13 百度在线网络技术(北京)有限公司 Barcode information processing method, device and system
CN104766011A (en) * 2015-03-26 2015-07-08 国家电网公司 Sandbox detection alarming method and system based on main engine characteristic

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109726551A (en) * 2017-10-31 2019-05-07 武汉安天信息技术有限责任公司 The methods of exhibiting and system of preceding bad behavior are installed in a kind of application
CN108009425A (en) * 2017-11-29 2018-05-08 四川无声信息技术有限公司 File detects and threat level decision method, apparatus and system
CN109450619A (en) * 2018-10-07 2019-03-08 杭州安恒信息技术股份有限公司 A kind of two-dimension code safe means of defence and system
CN109450619B (en) * 2018-10-07 2022-08-19 杭州安恒信息技术股份有限公司 Two-dimensional code safety protection method and system
WO2020098326A1 (en) * 2018-11-15 2020-05-22 中兴通讯股份有限公司 Information management method and processing method, device and storage medium
US10970378B2 (en) * 2019-05-13 2021-04-06 Cyberark Software Ltd. Secure generation and verification of machine-readable visual codes
WO2021214597A1 (en) * 2020-04-23 2021-10-28 International Business Machines Corporation Deep packet analysis
GB2604797A (en) * 2020-04-23 2022-09-14 Kyndryl Inc Deep packet analysis
US11563761B2 (en) 2020-04-23 2023-01-24 Kyndryl, Inc. Deep packet analysis
US11757912B2 (en) 2020-04-23 2023-09-12 Kyndryl, Inc. Deep packet analysis
CN115002685A (en) * 2022-07-14 2022-09-02 深圳市利诺威科技有限公司 Method and system for transmitting image data
CN116861412A (en) * 2023-06-26 2023-10-10 深圳市赛凌伟业科技有限公司 Information security analysis method and system based on big data

Similar Documents

Publication Publication Date Title
CN105718792A (en) Sandbox based two-dimensional code detection method and system
CN106055980B (en) A kind of rule-based JavaScript safety detecting method
CN106570399B (en) A kind of detection method of across App inter-module privacy leakage
CN109660502A (en) Detection method, device, equipment and the storage medium of abnormal behaviour
CN103996007A (en) Testing method and system for Android application permission leakage vulnerabilities
US20140123289A1 (en) Computing Device to Detect Malware
CN105306610B (en) Network identity detection method and device
CN105447388B (en) A kind of Android malicious code detection system based on weight and method
CN105049592B (en) Mobile intelligent terminal voice safety protection method and system
CN106599688B (en) A kind of Android malware detection method based on applicating category
CN104462973B (en) The dynamic malicious act detecting system and method for application program in mobile terminal
CN104346566A (en) Method, device, terminal, server and system for detecting privacy authority risks
CN104462970A (en) Android application program permission abuse detecting method based on process communication
CN103927483A (en) Decision model used for detecting malicious programs and detecting method of malicious programs
CN104008332A (en) Intrusion detection system based on Android platform
CN104901962B (en) A kind of detection method and device of web page attacks data
CN108804912A (en) A kind of application program based on authority set difference is gone beyond one's commission detection method
CN105069354A (en) Attack tree model based Android software hybrid detection method
CN106452955B (en) A kind of detection method and system of abnormal network connection
CN102801706A (en) Terminal and security processing method for information contents
CN103905423A (en) Harmful advertisement piece detecting method and system based on dynamic behavior analysis
CN109698809A (en) A kind of recognition methods of account abnormal login and device
CN104504337A (en) Method for detecting malicious application disclosing Android data
CN105825129A (en) Converged communication malicious software identification method and system
CN104809046B (en) A kind of application program networking control method and application program networking control device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 150028 Building 7, Innovation Plaza, Science and Technology Innovation City, Harbin High-tech Industrial Development Zone, Heilongjiang Province (838 Shikun Road)

Applicant after: Harbin antiy Technology Group Limited by Share Ltd

Address before: 506 room 162, Hongqi Avenue, Nangang District, Harbin Development Zone, Heilongjiang, 150090

Applicant before: Harbin Antiy Technology Co., Ltd.

CB02 Change of applicant information
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160629

WD01 Invention patent application deemed withdrawn after publication