CN108959921A - A kind of malware analysis method based on intelligent terminal chip - Google Patents

A kind of malware analysis method based on intelligent terminal chip Download PDF

Info

Publication number
CN108959921A
CN108959921A CN201810538417.1A CN201810538417A CN108959921A CN 108959921 A CN108959921 A CN 108959921A CN 201810538417 A CN201810538417 A CN 201810538417A CN 108959921 A CN108959921 A CN 108959921A
Authority
CN
China
Prior art keywords
chip
intelligent terminal
malware
data
malware analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810538417.1A
Other languages
Chinese (zh)
Other versions
CN108959921B (en
Inventor
李毅
陈贤斌
左震宇
汤伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rock Software (shanghai) Co Ltd
Original Assignee
Rock Software (shanghai) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rock Software (shanghai) Co Ltd filed Critical Rock Software (shanghai) Co Ltd
Priority to CN201810538417.1A priority Critical patent/CN108959921B/en
Publication of CN108959921A publication Critical patent/CN108959921A/en
Application granted granted Critical
Publication of CN108959921B publication Critical patent/CN108959921B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Abstract

The malware analysis method based on intelligent terminal chip that the invention discloses a kind of obtains corresponding IC chip from intelligent terminal first, reads the logic unit data in chip, then analyzed data.The IC chip that scheme provided by the invention passes through dismantling intelligence;Malware behavior is analyzed based on the data stored in IC chip, analysis evidence obtaining can be carried out to Malware in the case where intelligent terminal can not effectively be switched on, to effectively solve the problems, such as that damage intelligent terminal can not analyze Malware.

Description

A kind of malware analysis method based on intelligent terminal chip
Technical field
The present invention relates to electronic evidence-collecting technologies, and in particular to the analysis forensic technologies of Malware.
Background technique
In recent years, increasing sharply with smart phone user, cell-phone function is also more and more.It stores in mobile phone a large amount of The information such as privacy of user, property.Security issues become increasingly urgent, and illegal person makes it hide by writing Malware On the mobile phone of user, the privacy information of user is then obtained, or customizes the business etc. of payment wantonly, causes the economic damage of user It becomes estranged privacy leakage.
Various malware analysis tools are had devised to this people, however existing most malware analysis tool, Requiring smart phone is to carry out the case where can be switched on and can run.If smart phone leads to intelligence in damage or other reasons Energy mobile phone cannot be started up, these malware analysis tools are then had no way of doing it, and evidence obtaining will have reached an impasse, and there is presently no preferable Method thoroughly solve the problems, such as this.
Summary of the invention
Malware analysis can not be carried out when smart machine cannot be started up for existing malware analysis tool The problem of, need a kind of new smart machine malware analysis scheme.
For this purpose, the purpose of the present invention is to provide a kind of malware analysis method based on intelligent terminal chip, can have Effect ground is solved the problems, such as to the smart phone malware analysis that cannot be started up.
In order to achieve the above object, the malware analysis method provided by the invention based on intelligent terminal chip, packet Include following steps:
Obtain the IC chip on intelligent terminal mainboard;
IC chip bottom data is read into single file;
Successful file is read in parsing;
Malware analysis is carried out to the data file after parsing.
Further, when reading IC chip data, chip is converted into USB DISK and is read out again, and generated single Dump file.
The IC chip that scheme provided by the invention passes through dismantling intelligence;Malice is analyzed based on the data stored in IC chip Software action can carry out analysis evidence obtaining to Malware in the case where intelligent terminal can not effectively be switched on, to effectively solve The problem of certainly damage intelligent terminal can not analyze Malware becomes one of the important breakthrough of electronic evidence-collecting work.
Detailed description of the invention
The present invention is further illustrated below in conjunction with the drawings and specific embodiments.
Fig. 1 is the flow chart that present example carries out malware analysis for damage smart phone;
Fig. 2 is the structural schematic diagram that conversion module is read in present example.
Specific embodiment
In order to be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, tie below Conjunction is specifically illustrating, and the present invention is further explained.
This example outside the intelligent terminal for being not powered on operation by directly reading dependency number in intelligent terminal chip According to thus analyzing mobile phone Malware behavior.The program is switched on without intelligent terminal, can be to original soft in intelligent terminal Part is analyzed.
Specifically, the scheme that this example carries out malware analysis to the intelligent terminal that cannot be started up is as follows:
Firstly, dismantling intelligent terminal, obtains its corresponding IC chip;
Then, reading intelligent terminal IC chip is single dump file;
Then, single dump file data is parsed respectively;
Finally, the data obtained for parsing carry out malicious act analysis by malware analysis tool.
The malware analysis being achieved in the case of cannot be started up for intelligent terminal.
In addition, the intelligent terminal being directed in this example approach is existing conventional intelligent terminal, such as operation Android system Smart phone, tablet computer or the smart phone for running IOS system, tablet computer etc..
For above scheme, it is illustrated by taking Android mobile phone as an example by an application example below.
For the smart phone of operation Android system in this example, and smart phone damage can not effectively be switched on.At this In the case of, in order to effectively analyze the malicious act for the software installed in the smart phone, this example uses following scheme:
Step 101: obtaining the IC chip on smart phone mainboard.
The step specifically obtains the storage chip on smart phone mainboard, first according to the model of smart phone, dismantling The mainboard of mobile phone out finds mobile phone storage chip, is removed chip from mainboard by demounting tool, be cleaned and dried to With.
Step 102: reading IC chip bottom data into single file.
The step puts it on corresponding conversion equipment, passes through for the storage chip got is disassembled in step 101 Storage chip is converted into USB DISK and is read out by the conversion equipment, and generates single dump file, and thus, it is possible to quickly complete The whole legacy data read on storage chip.
By way of the angle pin of storage chip in this programme getting dismantling is converted into SD card, then meet a SD EMMC chip is converted into USB DISK and is read out by the reading hardware module of card, realization.
Referring to fig. 2, this programme chip is read by following reading conversion module realization and be converted into USB DISK into Row is read.
As seen from the figure, which mainly includes control single chip computer STM32, SD/eMMC turn USB read module with And USB HUB, wherein SD/eMMC turns USB read module and is connected to eMMC chip by eMMC bus, and passes through USB data line It is connected to USB HUB;Single-chip microcontroller STM32 is connected to eMMC chip by eMMC bus, and is connected to USB by USB data line HUB;USB HUB is then connected to several USB interfaces.
USB DISK is converted by eMMC chip as a result, to be read out, and may be implemented:
1. the information such as the amount of capacity of character library can be recognized;
2. the reading of dump file can be carried out to character library;
3. normally reading each partition directory and the associated documents inside character library;
4. the character library can be recognized inside the disk management of Windows.
Step 103: successful file is read in parsing.
For each dump file read in the step, data analysis is carried out by analysis tool, to extract malice Software relative program file.
Step 104: malware analysis is carried out to the data file after parsing.
The step carries out malicious act analysis for the Malware relative program file that step 103 extracts.
Based on aforementioned four step it is found that this programme is based on intelligent terminal chip, smart phone storage chip is directly read In data, and analyze mobile phone Malware behavior, and various smart machines, including most of intelligence can be suitable for scheme Android or IOS mobile phone, tablet computer etc..
The malware analysis scheme based on intelligent terminal chip that this example provides is when for electronic evidence evidence obtaining, energy It is enough to carry out correct quickly analysis for the intelligent terminal damaged.
Form the malware analysis tool based on intelligent terminal chip based on top scheme, the analysis tool by software and Hardware cooperation is constituted, including smart phone demounting tool, conversion equipment, data analytical tool and Malware behavioural analysis work Tool.Wherein, conversion equipment and data analytical tool data connection, and data analytical tool and Malware behavioural analysis tool number According to connection.
Thus the malware analysis tool needle constituted carries out Malware behavioural analysis evidence obtaining to the intelligent terminal of damage When, first choice passes through smart phone demounting tool from the IC chip obtained above cell phone mainboard in smart phone;Then, by IC chip It is placed in conversion equipment, storage chip is converted into USB DISK by conversion equipment, reads the logic unit data in chip, And single dump file is generated, and by the single dump transmitting file in real time of generation to data analytical tool;Then, data parse Tool carries out malware analysis to the data received, extracts Malware relative program file based on the analysis results, and real Shi Chuanzhi Malware behavioural analysis tool;Finally, related to the Malware received by Malware behavioural analysis tool Program file carries out Malware behavioural analysis, and has according to standard criterion output and have equal authenticity, public with papery evidence The electronic evidence that Jian Fadeng relevant department is approved.
The basic principles, main features and advantages of the present invention have been shown and described above.The technology of the industry Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this The principle of invention, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention by appended claims and its Equivalent thereof.

Claims (2)

1. the malware analysis method based on intelligent terminal chip, which comprises the steps of:
Obtain the IC chip on intelligent terminal mainboard;
IC chip bottom data is read into single file;
Successful file is read in parsing;
Malware analysis is carried out to the data file after parsing.
2. malware analysis method according to claim 1, which is characterized in that when reading IC chip data, by core Piece is converted into USB DISK and is read out again, and generates single dump file.
CN201810538417.1A 2018-05-30 2018-05-30 Malicious software analysis method based on intelligent terminal chip Active CN108959921B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810538417.1A CN108959921B (en) 2018-05-30 2018-05-30 Malicious software analysis method based on intelligent terminal chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810538417.1A CN108959921B (en) 2018-05-30 2018-05-30 Malicious software analysis method based on intelligent terminal chip

Publications (2)

Publication Number Publication Date
CN108959921A true CN108959921A (en) 2018-12-07
CN108959921B CN108959921B (en) 2023-04-14

Family

ID=64492595

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810538417.1A Active CN108959921B (en) 2018-05-30 2018-05-30 Malicious software analysis method based on intelligent terminal chip

Country Status (1)

Country Link
CN (1) CN108959921B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136476A (en) * 2011-12-01 2013-06-05 深圳市证通电子股份有限公司 Mobile intelligent terminal malicious software analysis system
CN104598419A (en) * 2015-02-13 2015-05-06 北京安信荣达科技有限公司 Memory-chip data acquiring device for AX-flash mobile phones
CN105183395A (en) * 2015-09-18 2015-12-23 四川效率源信息安全技术股份有限公司 Data extraction method for mobile phone storage chip
CN205158208U (en) * 2015-11-03 2016-04-13 上海良相智能化工程有限公司 Electron investigation case of collecting evidence

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136476A (en) * 2011-12-01 2013-06-05 深圳市证通电子股份有限公司 Mobile intelligent terminal malicious software analysis system
CN104598419A (en) * 2015-02-13 2015-05-06 北京安信荣达科技有限公司 Memory-chip data acquiring device for AX-flash mobile phones
CN105183395A (en) * 2015-09-18 2015-12-23 四川效率源信息安全技术股份有限公司 Data extraction method for mobile phone storage chip
CN205158208U (en) * 2015-11-03 2016-04-13 上海良相智能化工程有限公司 Electron investigation case of collecting evidence

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘铁铭 等: "存储数据逆向分析与电子取证实验室建设实践与思考", 《计算机工程与科学》 *

Also Published As

Publication number Publication date
CN108959921B (en) 2023-04-14

Similar Documents

Publication Publication Date Title
CN106294222A (en) A kind of method and device determining PCIE device and slot corresponding relation
CN104598793A (en) Fingerprint authentication method and fingerprint authentication device
CN104375836A (en) Method and device for showing lock screen window
CN103679012A (en) Clustering method and device of portable execute (PE) files
CN101968769A (en) Behavioral model-based software security test case generation method
CN106155596A (en) Method for writing data and device
CN104484407A (en) Method and system for recognizing fraud information
CN107454118A (en) Identifying code acquisition methods and device, login method and system
CN103744890A (en) Log separation method and device
CN103324617A (en) Identification method and system for history waste information
CN107871080A (en) The hybrid Android malicious code detecting methods of big data and device
CN105159913A (en) Method and device for determining file to be cleaned
CN107277019A (en) Data clear text acquisition methods, device, electric terminal and readable storage medium storing program for executing
CN106445736A (en) Method for extracting and recombining MTK62 series word stock data of mobile phone
CN103177022A (en) Method and device of malicious file search
CN1234130C (en) System guiding device base on core and method for realizing said guide
CN102968325A (en) USB (Universal Serial Bus) equipment and method and device for automatically initializing same
CN104156430A (en) Device and method for fast extracting Android mobile phone data
CN102236426A (en) Terminal integrated input equipment and terminal interaction system
CN109582238A (en) A kind of hard disk binding, matching process, system and electronic equipment and storage medium
CN102982318A (en) Fingerprint acquisition system and network identity authentication system using the same
CN103369532A (en) Black box detection method for mobile terminal malicious software behavior
CN108959921A (en) A kind of malware analysis method based on intelligent terminal chip
CN104298570A (en) Data processing method and device
CN101425120B (en) Card reader and executing method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant