CN108062463A - It is a kind of that packet inspection method and system are beaten again based on screenshot picture - Google Patents

It is a kind of that packet inspection method and system are beaten again based on screenshot picture Download PDF

Info

Publication number
CN108062463A
CN108062463A CN201610978199.4A CN201610978199A CN108062463A CN 108062463 A CN108062463 A CN 108062463A CN 201610978199 A CN201610978199 A CN 201610978199A CN 108062463 A CN108062463 A CN 108062463A
Authority
CN
China
Prior art keywords
application
atlas
measured
snapshot
legal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610978199.4A
Other languages
Chinese (zh)
Inventor
张虎
潘宣辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Antian Information Technology Co Ltd
Original Assignee
Wuhan Antian Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Antian Information Technology Co Ltd filed Critical Wuhan Antian Information Technology Co Ltd
Priority to CN201610978199.4A priority Critical patent/CN108062463A/en
Publication of CN108062463A publication Critical patent/CN108062463A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Artificial Intelligence (AREA)
  • Multimedia (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Packet inspection method is beaten again based on screenshot picture the invention discloses a kind of, including:The snapshot at each interface of legal application is obtained, forms the first atlas;The snapshot to be measured using each interface is obtained, forms the second atlas;Compare the similarity of the second atlas and the first atlas, when similarity meets a preset value, be determined as similar snapshot;The similar screenshotss map number of the second atlas is counted, if similar snapshot quantity is more than a preset value, the authentication information of legal application and application to be measured is obtained and is compared, judges that application to be measured is attached most importance to if authentication information difference and is packaged application.This detection method has the advantages that strong applicability, accuracy are high.Bag detecting system is beaten again based on screenshot picture the invention also provides a kind of.

Description

It is a kind of that packet inspection method and system are beaten again based on screenshot picture
Technical field
The present invention relates to field of information security technology more particularly to it is a kind of based on screenshot picture beat again packet inspection method and System.
Background technology
Smart mobile phone and tablet computer have become a part indispensable in people's daily life, and are based in market The mobile equipment accounting of Android alreadys exceed 80%.However, the safety problem of the mobile equipment based on Android platform is also more tight Weight.Since third party market does not have stringent APP to examine, the Malware in Android is caused largely to come from third party city .And by investigation, 86% Malware is using packet technology is beaten again, and by beating again packet technology, Malware developer is to just Version Android application carries out decompiling, embedded malicious code or modification partial code.When user downloads installation, these beat again bag generation After code, the malicious acts such as malice is deducted fees, personal information is stolen may be met with, and then serious economic damage is brought to user It loses.
Current packet inspection method of beating again mainly beats again the similitude wrapped between application and legal Android application by comparison It distinguishes.And Similarity measures are divided into the similarity detection method to be detected based on Code Clones and the phase based on resource file Like two kinds of property detection method.
Similarity detection method based on Code Clones is the executable file in being applied by decompiling Android, such as DroidMOSS methods are by extracting the sequence of opcodes in Dalvik bytecodes, using the method for fuzzy hash to applying journey Sequence generates a fingerprint signature simultaneously as feature, is applied program by comparing the editing distance between application program fingerprint Similarity.Static characteristic information is extracted from the Dalvik bytecodes that decompiling goes out, but DroidMOSS methods are easily subject to The influence of Code obfuscation, by interchange code order or increasing delete operation code all can cause the fingerprint of application program to change Become and fail so as to cause detection method;DNADroid methods beat again bag by comparing the program dependency graph (PDG) applied to detect Using it utilizes the semantic information of program, and Detection accuracy increases, but the detection method of the dependency graph based on program is held Line efficiency is not high, is very difficult to apply in large-scale beat again in bag application detection.
Similarity detection method based on file, mainly by extracting resource file in being applied from Android, including XML cloth Office file, audio files, picture file etc., are generated with this using feature.Latent structure structure tree or Kazakhstan are applied by these Uncommon value, carries out Similarity measures.However this method is also required to decompiling Android application, and the consumption of the polymerization classification used Duration is unfavorable for detecting on a large scale, and can not detect the interface of dynamic load in sample operational process.
The content of the invention
For above-mentioned technical problem, the present invention realizes with the following method:It is a kind of that bag inspection is beaten again based on screenshot picture Survey method, including:
The snapshot at each interface of legal application is obtained, forms the first atlas;
The snapshot to be measured using each interface is obtained, forms the second atlas;
Compare the similarity of the second atlas and the first atlas, when similarity meets a preset value, be determined as similar snapshot;
The similar screenshotss map number of the second atlas is counted, if similar snapshot quantity is more than a preset value, obtains application to be measured With legal copy application authentication information and compared, if mismatch, judge application to be measured attach most importance to packing application.
Further, the application to be measured and legal application are installed and run in same environment.
Further, application to be measured and the legal copy of obtaining is using the method for the snapshot under each interface:
HOOK applications to be measured and the behavior of legal application, make it possess Auto Cut-screen Function when interface redirects;
Application to be measured described in simulated operation and legal application so that all interfaces are traveled through, and obtain the snapshot under each interface; Wherein, the simulated operation includes:Simulation is clicked on or simulation input.
Further, judging the method for similar snapshot includes:
Using the Hamming distance for perceiving each snapshot in hash algorithm the second atlas of calculating and the first atlas, according to second figure Collect and whether less than a preset value to judge whether in two atlas be similar snapshot to the Hamming distance of the first atlas.
Further, it is described to obtain application to be measured and the legal authentication information applied and compared, if mismatching, sentence Fixed application to be measured, which is attached most importance to, is packaged application, is specially:
Authentication information is extracted in CERT.RSA files from the META-INF catalogues of application to be measured and legal application, and extracts institute State the public key information in authentication information;
If application to be measured is different with the public key information of legal copy application, judges that application to be measured is attached most importance to and be packaged application.
Bag detecting system is beaten again based on screenshot picture the invention also discloses a kind of, is obtained including the first acquisition mould, second Modulus block beats again bag determination module, wherein:
First acquisition module for obtaining the snapshot at each interface of legal application, forms the first atlas;
Second acquisition module for obtaining the snapshot to be measured using each interface, forms the second atlas;
Bag determination module is beaten again, for comparing the similarity of the second atlas and the first atlas, when similarity meets a preset value, is sentenced It is set to similar snapshot;The similar screenshotss map number of the second atlas is counted, if similar snapshot quantity is more than a preset value, is obtained It takes the authentication information to be measured applied with legal application and is compared, if mismatching, judge that application to be measured attaches most importance to being packaged and apply.
Further, the application to be measured and legal application are installed and run in same environment.
Further, first acquisition module is specifically used for the behavior of the legal applications of HOOK, it is made to possess interface and is redirected When Auto Cut-screen Function, legal application described in simulated operation obtains snapshot under each interface simultaneously shape so that interface redirects Into the first atlas;
Second acquisition module is specifically used for the behavior of HOOK applications to be measured, it is made to possess automatic screenshotss work(when interface redirects Can, application to be measured described in simulated operation causes interface to redirect, and obtains the snapshot under each interface and forms the second atlas;Its In, the simulated operation includes:Simulation is clicked on or simulation input.
Further, the bag determination module of beating again is calculated in the first atlas and the second atlas respectively using perception hash algorithm The similarity of snapshot;Judge the similar snapshot quantity of the second atlas whether more than a preset value.
Further, the bag determination module of beating again is additionally operable to when the similar snapshot quantity of the second atlas is more than a preset value When, authentication information is extracted from the CERT.RSA files in application to be measured and the legal META-INF catalogues applied, and extracts institute State the public key information in authentication information;If application to be measured is different with the public key information of legal copy application, judge that application to be measured is attached most importance to It is packaged application.
It has the beneficial effect that:This hair obtains each apply at each interface by dynamic load application to be measured and legal application Under snapshot, by comparing snapshot and authentication information, and then judge whether application to be measured attaches most importance to packing application.Institute of the present invention Technical solution is stated due to independent of decompiling code, from the influence of various obfuscations and reinforcement technique, applicability It is stronger;By each interface of dynamic load, therefore from the influence of resource file missing;Tentatively sentenced based on substantial amounts of snapshot Fixed packing application of whether attaching most importance to, ensure that the accuracy of testing result.
Description of the drawings
In order to illustrate more clearly of technical scheme, letter will be made to attached drawing needed in the embodiment below Singly introduce, it should be apparent that, the accompanying drawings in the following description is only some embodiments described in the present invention, for this field For those of ordinary skill, without creative efforts, other attached drawings are can also be obtained according to these attached drawings.
Fig. 1 a kind of beats again 1 flow chart of packet inspection method embodiment to be provided by the invention based on screenshot picture;
Fig. 2 a kind of beats again bag detecting system example structure figure to be provided by the invention based on screenshot picture.
Specific embodiment
Packet inspection method and system embodiment are beaten again based on screenshot picture The present invention gives a kind of, in order to make this technology The personnel in field more fully understand the technical solution in the embodiment of the present invention, and make the above objects, features and advantages of the present invention Can be more obvious understandable, technical solution in the present invention is described in further detail below in conjunction with the accompanying drawings.
Packet inspection method embodiment 1 is beaten again based on screenshot picture present invention firstly provides a kind of, as shown in Figure 1, bag It includes:
S101:The snapshot at each interface of legal application is obtained, forms the first atlas.
Wherein, the legal application can be the legal application obtained using crawler technology from official market.
S102:The snapshot to be measured using each interface is obtained, forms the second atlas.
In general, application to be measured and legal application are installed and run in same environment, specifically, to dynamic detection platform into Row environment set includes but not limited to:Unit type and screen resolution, and then ensure that all applying is pacified in same environment It fills and runs, and then ensure the accuracy that subsequent detection judges.
In S101-S102, obtain application to be measured and the snapshot under each interface of legal application method can there are many, this Invention is by taking following methods as an example:
HOOK applications to be measured and the behavior of legal application, make it possess Auto Cut-screen Function when interface redirects.Described in simulated operation Application to be measured and legal application cause interface to redirect, and obtain the snapshot under each interface.Including but not limited to:Use dynamic Injection technique so that respectively apply and carry out screenshotss operation automatically after interface occurs and redirects, and then obtain snapshot and preserve.
Wherein, simulated operation includes:Simulation is clicked on or simulation input.The purpose of simulated operation is to cause each application Interface redirects, and then obtains and apply the snapshot under each interface, and guarantee is needed to be answered for application to be measured with legal With simulated operation uniformity, and then promote the accuracy that final detection judges.
S103:Compare the similarity of the second atlas and the first atlas, if the similarity of corresponding a pair of snapshot meets one During preset value, judge that this pair of of snapshot is similar snapshot.
Specifically, title and whole cryptographic Hash based on legal copy application generate ID;ID herein is used to distinguish different application. Using the cryptographic Hash for perceiving hash algorithm the second atlas of calculating and all snapshots of the first atlas, if the second atlas and the first atlas All snapshots cryptographic Hash Hamming distance less than a preset value, then judge that this pair of of snapshot is similar snapshot.
S104:The similar screenshotss map number of the second atlas is counted, if similar screenshotss map number is more than a preset value, is obtained The authentication information of application to be measured and legal application is simultaneously compared, if authentication information mismatches, judges application to be measured to beat again Bag application.
It is stored specifically, can the snapshot be converted to cryptographic Hash, not only ensure that detection resource loss is low, And suitable for mass detection.
The method for obtaining the authentication information of application to be measured and legal application and being compared includes:From application to be measured and legal copy Authentication information is extracted in CERT.RSA files in the META-INF catalogues of application, and extracts the letter of the public key in the authentication information Breath.Compare the public key information of the two, if application to be measured is different with the public key information of legal copy application, judge application to be measured to beat again Bag application.
Technical solution of the present invention is due to independent of decompiling code, from various obfuscations and reinforcing skill The influence of art, applicability are stronger;Above-mentioned technical proposal can detect the layout interface of dynamic load, therefore be lacked from resource file The influence of mistake;Application is packaged come whether preliminary judgement attaches most importance to based on substantial amounts of snapshot, and then ensure that the accurate of testing result Property.
In further embodiments, as shown in Fig. 2, a kind of beat again bag detecting system based on screenshot picture, including:
First acquisition module 201 for obtaining the snapshot at each interface of legal application, forms the first atlas.Such as HOOK is legal The screenshotss behavior of application;Legal application causes interface to redirect described in simulated operation, obtains snapshot and shape under each interface Into the first atlas.
Second acquisition module 202 for obtaining the snapshot to be measured using each interface, forms the second atlas.Such as HOOK The screenshotss behavior of application to be measured;Application to be measured causes interface to redirect described in simulated operation, obtains the snapshot under each interface And form the second atlas;Wherein, simulated operation includes:Simulation is clicked on or simulation input.
Bag determination module 203 is beaten again, for comparing the similarity of the second atlas and the first atlas, if corresponding a pair of screenshotss When the similarity of figure meets a preset value, it is determined as similar snapshot;The similar screenshotss map number of the second atlas is counted, if similar Snapshot quantity is more than a preset value, then obtains the authentication information of application to be measured and legal application and compared, if mismatching, Then judge that application to be measured is attached most importance to and be packaged application.
Preferably, beat again bag determination module 203 and calculate in the second atlas and the first atlas each section using hash algorithm is perceived Shield the Hamming distance of figure, according to the Hamming distance of second atlas and the first atlas whether less than a preset value come described in judging Whether in two atlas is similar snapshot.
When the similar snapshot quantity of the second atlas be more than a preset value when, beat again bag determination module 303 from it is to be measured application and Authentication information is extracted in CERT.RSA files in the META-INF catalogues of legal copy application, and extracts the public affairs in the authentication information Key information;If application to be measured is different with the public key information of legal copy application, judges that application to be measured is attached most importance to and be packaged application.
In above system embodiment, the application to be measured and legal application are installed and run in same environment, specific to wrap It includes:Environment set is carried out to dynamic detection platform, is included but not limited to:Unit type and screen resolution;In the same of setting It is installed in environment and runs application to be measured and legal application.
Each embodiment in this specification is described by the way of progressive, the same or similar between each embodiment Just to refer each other for part, and the highlights of each of the examples are difference from other examples.Especially for system For embodiment, since it is substantially similar to embodiment of the method, so description is fairly simple, related part is implemented referring to method The part explanation of example.
Above-described embodiment give it is a kind of packet inspection method and system embodiment are beaten again based on screenshot picture, with tradition weight The detection method of packing is different, and the present invention will not be influenced be subject to using reinforcing or Code obfuscation, to be measured by dynamic load It is applied using with legal copy, and then obtains each snapshot applied under each interface, by comparing snapshot and authentication information, and then Judge whether application to be measured attaches most importance to and be packaged application.Since the present invention is judged whether by the snapshot at each interface of dynamic load Attach most importance to packing application, therefore from resource file missing influence, compared with than the prior art possess larger range of applicability and compared with High accuracy rate.
Above example is to illustrative and not limiting technical scheme.Appointing for spirit and scope of the invention is not departed from What modification or local replacement, should be covered by the scope of the claims of the present invention.

Claims (10)

1. a kind of beat again packet inspection method based on screenshot picture, which is characterized in that including:
The snapshot at each interface of legal application is obtained, forms the first atlas;
The snapshot to be measured using each interface is obtained, forms the second atlas;
Compare the similarity of the second atlas and the first atlas, if the similarity of corresponding a pair of snapshot meets a preset value, sentence It is set to similar snapshot;
The similar screenshotss map number of the second atlas is counted, if similar snapshot quantity is more than a preset value, obtains application to be measured With legal copy application authentication information and compared, if mismatch, judge application to be measured attach most importance to packing application.
2. the method as described in claim 1, which is characterized in that the application to be measured and legal application are installed and run on same In environment.
3. the method as described in claim 1, which is characterized in that described to obtain cutting under application to be measured and each interface of legal application The method of screen figure is:
HOOK applications to be measured and the behavior of legal application, make it possess Auto Cut-screen Function when interface redirects;
Application to be measured described in simulated operation and legal application so that all interfaces are traveled through, and obtain the snapshot under each interface; Wherein, the simulated operation includes:Simulation is clicked on or simulation input.
4. the method as described in claim 1, which is characterized in that judging the method for similar snapshot includes:
Using the Hamming distance for perceiving each snapshot in hash algorithm the second atlas of calculating and the first atlas, according to second figure Collect and whether less than a preset value to judge whether in two atlas be similar snapshot to the Hamming distance of the first atlas.
5. the method as described in claim 1, which is characterized in that described to obtain application to be measured and the legal authentication information applied simultaneously It is compared, if mismatching, judges that application to be measured is attached most importance to and be packaged application, be specially:
Authentication information is extracted in CERT.RSA files from the META-INF catalogues of application to be measured and legal application, and extracts institute State the public key information in authentication information;
If application to be measured is different with the public key information of legal copy application, judges that application to be measured is attached most importance to and be packaged application.
6. a kind of beat again bag detecting system based on screenshot picture, which is characterized in that obtains mould including the first acquisition module, second Block beats again bag determination module, wherein:
First acquisition module for obtaining the snapshot at each interface of legal application, forms the first atlas;
Second acquisition module for obtaining the snapshot to be measured using each interface, forms the second atlas;
Bag determination module is beaten again, for comparing the similarity of the second atlas and the first atlas, if the phase of corresponding a pair of snapshot When meeting a preset value like degree, it is determined as similar snapshot;The similar screenshotss map number of the second atlas is counted, if similar snapshot Quantity is more than a preset value, then obtains the authentication information of application to be measured and legal application and compared, if mismatching, judged Application to be measured, which is attached most importance to, is packaged application.
7. application to be measured applies system as claimed in claim 6 with legal, which is characterized in that the application to be measured and legal copy should With installing and run in same environment.
8. system as claimed in claims 6 or 7, which is characterized in that first acquisition module is specifically used for HOOK legal copies should Behavior makes it possess Auto Cut-screen Function when interface redirects, and legal application described in simulated operation causes interface to redirect, It obtains the snapshot under each interface and forms the first atlas;
Second acquisition module is specifically used for the behavior of HOOK applications to be measured, it is made to possess automatic screenshotss work(when interface redirects Can, application to be measured described in simulated operation causes interface to redirect, and obtains the snapshot under each interface and forms the second atlas;Its In, the simulated operation includes:Simulation is clicked on or simulation input.
9. system as claimed in claims 6 or 7, which is characterized in that the bag determination module of beating again is using perception hash algorithm The Hamming distance of each snapshot in the second atlas and the first atlas is calculated, according to second atlas and the Hamming distance of the first atlas From whether less than a preset value judging whether in two atlas be similar snapshot.
10. system as claimed in claims 6 or 7, which is characterized in that the bag determination module of beating again is additionally operable to when the second atlas When similar snapshot quantity is more than a preset value, the CERT.RSA from the META-INF catalogues of application to be measured and legal application Authentication information is extracted in file, and extracts the public key information in the authentication information;If application to be measured and the public key of legal application Information is different, then judges that application to be measured is attached most importance to and be packaged application.
CN201610978199.4A 2016-11-07 2016-11-07 It is a kind of that packet inspection method and system are beaten again based on screenshot picture Pending CN108062463A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610978199.4A CN108062463A (en) 2016-11-07 2016-11-07 It is a kind of that packet inspection method and system are beaten again based on screenshot picture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610978199.4A CN108062463A (en) 2016-11-07 2016-11-07 It is a kind of that packet inspection method and system are beaten again based on screenshot picture

Publications (1)

Publication Number Publication Date
CN108062463A true CN108062463A (en) 2018-05-22

Family

ID=62137689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610978199.4A Pending CN108062463A (en) 2016-11-07 2016-11-07 It is a kind of that packet inspection method and system are beaten again based on screenshot picture

Country Status (1)

Country Link
CN (1) CN108062463A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858249A (en) * 2019-02-18 2019-06-07 暨南大学 The quick, intelligent comparison of mobile Malware big data and safety detection method
CN112241502A (en) * 2020-10-16 2021-01-19 北京字节跳动网络技术有限公司 Page loading detection method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577206A (en) * 2012-07-27 2014-02-12 北京三星通信技术研究有限公司 Method and device for installing application software
CN103699843A (en) * 2013-12-30 2014-04-02 珠海市君天电子科技有限公司 Malicious activity detection method and device
CN103886260A (en) * 2014-04-16 2014-06-25 中国科学院信息工程研究所 Application program control method based on two-time signature verification technology
CN105095751A (en) * 2014-05-07 2015-11-25 中兴软创科技股份有限公司 Method for detecting malicious phishing application for Android platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577206A (en) * 2012-07-27 2014-02-12 北京三星通信技术研究有限公司 Method and device for installing application software
CN103699843A (en) * 2013-12-30 2014-04-02 珠海市君天电子科技有限公司 Malicious activity detection method and device
CN103886260A (en) * 2014-04-16 2014-06-25 中国科学院信息工程研究所 Application program control method based on two-time signature verification technology
CN105095751A (en) * 2014-05-07 2015-11-25 中兴软创科技股份有限公司 Method for detecting malicious phishing application for Android platform

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858249A (en) * 2019-02-18 2019-06-07 暨南大学 The quick, intelligent comparison of mobile Malware big data and safety detection method
CN109858249B (en) * 2019-02-18 2020-08-07 暨南大学 Rapid intelligent comparison and safety detection method for mobile malicious software big data
CN112241502A (en) * 2020-10-16 2021-01-19 北京字节跳动网络技术有限公司 Page loading detection method and device

Similar Documents

Publication Publication Date Title
CN104123493B (en) The safety detecting method and device of application program
US10142370B2 (en) Methods and apparatus for generating and using security assertions associated with containers in a computing environment
Moonsamy et al. Mining permission patterns for contrasting clean and malicious android applications
EP2972866B1 (en) Techniques for correlating vulnerabilities across an evolving codebase
Davies et al. Software bertillonage: Finding the provenance of an entity
KR101214893B1 (en) Apparatus and method for detecting similarity amongf applications
CN103368987B (en) Cloud server, application program verification, certification and management system and application program verification, certification and management method
CN103995774B (en) Method and device for detecting software installation package
CN103297267B (en) A kind of methods of risk assessment of network behavior and system
CN103473346A (en) Android re-packed application detection method based on application programming interface
Allen et al. Improving accuracy of android malware detection with lightweight contextual awareness
US11036479B2 (en) Devices, systems, and methods of program identification, isolation, and profile attachment
CN111222181B (en) AI model supervision method, system, server and storage medium
CN111859381A (en) File detection method, device, equipment and medium
CN108062463A (en) It is a kind of that packet inspection method and system are beaten again based on screenshot picture
CN106528422B (en) A kind of method and apparatus of detection java applet page disturbance
CN110929110A (en) Electronic document detection method, device, equipment and storage medium
CN103971055B (en) A kind of Android malware detection method based on program slicing technique
KR20180089997A (en) Measuring Similarity System and Method of Android Application Using Text Mining
CN105808980A (en) Detection method and device of illegal use of software
CN113935847A (en) Online process risk processing method, device, server and medium
CN106778276A (en) A kind of method and system for detecting incorporeity file malicious code
WO2021216098A1 (en) Privacy preserving application and device error detection
KR101792631B1 (en) Api-based software similarity measuring method and system using fuzzy hashing
Cam et al. Detect repackaged android applications by using representative graphs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180522