CN110162479A - It is abnormal to apply detection method, device and terminal device - Google Patents
It is abnormal to apply detection method, device and terminal device Download PDFInfo
- Publication number
- CN110162479A CN110162479A CN201910455132.6A CN201910455132A CN110162479A CN 110162479 A CN110162479 A CN 110162479A CN 201910455132 A CN201910455132 A CN 201910455132A CN 110162479 A CN110162479 A CN 110162479A
- Authority
- CN
- China
- Prior art keywords
- application
- item number
- debugging message
- abnormal
- detection method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/3628—Software debugging of optimised code
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
- Debugging And Monitoring (AREA)
Abstract
The application is suitable for software technology field, provides abnormal using detection method, device and terminal device, comprising: obtain the item number for having installed the Debugging message of application;If the item number of the Debugging message is more than preset item number threshold value, determine the application for abnormal application.By the above method can in time, abnormal application is effectively detected out.
Description
Technical field
The application belongs to software technology field, more particularly to abnormal using detection method, device, terminal device and computer
Readable storage medium storing program for executing.
Background technique
Currently, the application type that terminal device (such as mobile phone, tablet computer etc.) can be installed is more and more, still, due to
The application of installation is also likely to be abnormal application, such as, it is likely to by the application of poisoning intrusion, therefore, in order to guarantee terminal
The safe operation of the valid application of equipment then needs to carry out abnormality detection to application.
For detecting by the application of poisoning intrusion, in existing method, usually by the file of application and virus database
In virus document matched, if application file in exist matched with a certain virus document in virus database, sentence
The fixed application is by the application of poisoning intrusion.But since the virus document of virus database storage usually has hysteresis quality,
Existing method is still difficult to effectively detect abnormal application.
Therefore need to propose a kind of new method, to solve the above technical problems.
Summary of the invention
In view of this, the embodiment of the present application provides a kind of exception application detection method, to solve to be difficult in the prior art
Effectively detect abnormal the problem of applying.
The first aspect of the embodiment of the present application provides a kind of exception application detection method, comprising:
Obtain the item number for having installed the Debugging message of application;
If the item number of the Debugging message is more than preset item number threshold value, determine the application for abnormal application.
The second aspect of the embodiment of the present application provides a kind of exception application detection device, comprising:
The item number acquiring unit of Debugging message, for obtaining the item number for having installed the Debugging message of application;
It is abnormal to apply judging unit, if the item number for the Debugging message is more than preset item number threshold value, described in judgement
It is applied using to be abnormal.
The third aspect of the embodiment of the present application provides a kind of terminal device, including memory, processor and is stored in
In the memory and the computer program that can run on the processor, when the processor executes the computer program
The step of realizing method as described in relation to the first aspect.
The fourth aspect of the embodiment of the present application provides a kind of computer readable storage medium, the computer-readable storage
Media storage has computer program, and the step of method as described in relation to the first aspect is realized when the computer program is executed by processor
Suddenly.
Existing beneficial effect is the embodiment of the present application compared with prior art:
Since whether the item number according to Debugging message judges using being abnormal application, rather than by Debugging message with prestore
Whether information is matched to judge using being abnormal application, it is therefore not necessary to which the corresponding Debugging message of different application is stored in advance
Also can judge whether each application is abnormal application, so as in time, abnormal application is effectively detected out.
Detailed description of the invention
It in order to more clearly explain the technical solutions in the embodiments of the present application, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only some of the application
Embodiment for those of ordinary skill in the art without creative efforts, can also be attached according to these
Figure obtains other attached drawings.
Fig. 1 is the flow chart of the first exception application detection method provided by the embodiments of the present application;
Fig. 2 is the second provided by the embodiments of the present application abnormal flow chart for applying detection method;
Fig. 3 is the structural schematic diagram of exception application detection device provided by the embodiments of the present application;
Fig. 4 is the schematic diagram of terminal device provided by the embodiments of the present application.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed
Body details, so as to provide a thorough understanding of the present application embodiment.However, it will be clear to one skilled in the art that there is no these specific
The application also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, so as not to obscure the description of the present application with unnecessary details.
In order to illustrate technical solution described herein, the following is a description of specific embodiments.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " instruction is described special
Sign, entirety, step, operation, the presence of element and/or component, but be not precluded one or more of the other feature, entirety, step,
Operation, the presence or addition of element, component and/or its set.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
In the specific implementation, terminal device described in the embodiment of the present application is including but not limited to such as with the sensitive table of touch
Mobile phone, laptop computer or the tablet computer in face (for example, touch-screen display and/or touch tablet) etc it is other
Portable device.It is to be further understood that in certain embodiments, above equipment is not portable communication device, but is had
The desktop computer of touch sensitive surface (for example, touch-screen display and/or touch tablet).
In following discussion, the terminal device including display and touch sensitive surface is described.However, should manage
Solution, terminal device may include that one or more of the other physical User of such as physical keyboard, mouse and/or control-rod connects
Jaws equipment.
Terminal device supports various application programs, such as one of the following or multiple: drawing application program, demonstration application
Program, word-processing application, website creation application program, disk imprinting application program, spreadsheet applications, game are answered
With program, telephony application, videoconference application, email application, instant messaging applications, forging
Refining supports application program, photo management application program, digital camera application program, digital camera application program, web-browsing to answer
With program, digital music player application and/or video frequency player application program.
At least one of such as touch sensitive surface can be used in the various application programs that can be executed on the terminal device
Public physical user-interface device.It can be adjusted among applications and/or in corresponding application programs and/or change touch is quick
Feel the corresponding information shown in the one or more functions and terminal on surface.In this way, terminal public physical structure (for example,
Touch sensitive surface) it can support the various application programs with user interface intuitive and transparent for a user.
Embodiment one:
Fig. 1 shows the flow chart of the first exception application detection method provided by the embodiments of the present application, in the present embodiment
In, the application for being mounted on terminal device is carried out abnormality detection by the item number of the Debugging message of application, details are as follows:
Step S11 obtains the item number for having installed the Debugging message of application;
Specifically, when application is mounted on terminal device, executable file will be generated, for example, can hold virtual machine is generated
Capable binary file, the executable binary file record have Debugging message (debuginfo).
In this step, the Debugging message of application directly can be obtained from the executable binary file, and then obtained
The item number of Debugging message.
In some embodiments, since the executable binary file is other than including the Debugging message of application, also
Including other information, therefore, in order to the Debugging message of quick obtaining application, then before step S11, comprising:
Debugging message is extracted from the executable file for installed application, and is recorded in corresponding Debugging message table, institute
Stating executable file is to apply the file generated in installing terminal equipment;
Accordingly, the step S11 is specifically included:
The item number for having installed the Debugging message of application is obtained according to the Debugging message table.
In the present embodiment, since Debugging message is recorded in Debugging message table in advance, it is therefore not necessary to be carried out again to information
Filtering, so as to improve Debugging message item number acquisition speed.It, can will be each it should be noted that in the present embodiment
The Debugging message for having installed application is all recorded in the same Debugging message table, and the Debugging message of different application passes through the unique of application
Mark distinguishes, and can also install respectively by each using, a Debugging message table note corresponding with each Debugging message table
The Debugging message of application has been installed in record one.
In some embodiments, the suffix name of the executable file for having installed application is .dex, at this point, this is executable
File is dex file.
Step S12 determines that the application is answered to be abnormal if the item number of the Debugging message is more than preset item number threshold value
With.
Wherein, preset item number threshold value is according to empirically determined numerical value.
In the step, known according to the summary of experience of inventor, if the item number of the Debugging message is more than preset item number
Threshold value, then the application is abnormal application.
In the embodiment of the present application, the item number for having installed the Debugging message of application is obtained, if the item number of the Debugging message is super
Preset item number threshold value is crossed, determines the application for abnormal application.Due to the item number according to Debugging message judge using whether be
Abnormal application, rather than Debugging message is matched with the information prestored come whether judge to apply be abnormal application, therefore, nothing
The corresponding Debugging message of different application need to be stored in advance also can judge whether each application is abnormal application, so as to and
When, abnormal application is effectively detected out.
Embodiment two:
Fig. 2 shows the second provided by the embodiments of the present application abnormal flow charts for applying detection method, in the present embodiment
In, the corresponding executable file of preset item number threshold value is not above to the item number of Debugging message and is optimized, wherein step
S21, step S22 are identical as the step S11 step S12 of embodiment one respectively, and details are not described herein again.
Step S21 obtains the item number for having installed the Debugging message of application;
Step S22 determines that the application is answered to be abnormal if the item number of the Debugging message is more than preset item number threshold value
With.
Step S23, if the item number of the Debugging message is not above preset item number threshold value, to the executable file into
Row optimization.
Wherein, executable file is optimized and is specifically included: adjusting the sequence of the data of the executable file, for example,
Often accessed data are arranged closely together, in such manner, it is possible to guarantee that the data called all are by data to be used.
In some embodiments, to reduce the interference to user, executable file is optimized on backstage.
In some embodiments, if the item number of the Debugging message is more than preset item number threshold value, which is not believed
Corresponding executable file is ceased to optimize.
In the embodiment of the present application, held since the Debugging message for being only not above preset item number threshold value to item number is corresponding
Style of writing part optimizes, and therefore, avoiding optimization application process, (if executable file is dex file, optimizing application process is
Dex2oat excessively high memory is occupied) so as to avoid occupying use Caton phenomenon caused by excessively high memory.
In some embodiments, to further avoid the use Caton phenomenon caused by optimization process, the step
S23 includes:
If the terminal device where the application is in idle condition, and the item number of the Debugging message be not above it is default
Item number threshold value, the executable file is optimized.
Wherein, idle state includes following any case: the blank screen duration of terminal device is more than preset duration threshold value;
Terminal device is in charging and application that foreground is not run.
In the present embodiment, due to only just being optimized to executable file in idle state, and terminal when idle state
Equipment is not used by a user, therefore, can be avoided memory in optimization process it is occupied and to influence caused by user security risk.
In some embodiments, abnormal application is repaired in time for the ease of designated parties, then in the step S22
After (or step S12), comprising:
The executable file is not optimized, and will include that be that the information applied extremely is fed back to specified for the application
Side.
In the present embodiment, since the item number for the Debugging message applied extremely is greater than preset item number threshold value, not to sentencing
It is set to the executable file applied extremely to optimize, can be avoided and occupy excessively high memory when optimization.Further, since will include
Designated parties are fed back to using for the information applied extremely, therefore, application are detected in time convenient for designated parties, and repairing is answered
Loophole.
Further, the designated parties be third-party application, at this point, it is described and will include the application apply extremely
Information feeds back to designated parties and specifically includes:
The information of doubtful problem is extracted from the executable file, and will include the application be the information applied extremely with
And the information of the doubtful problem feeds back to third-party application.
In the present embodiment, the position to go wrong can be quickly determined for the ease of third-party application, then from executable text
Part extract doubtful problem information, the information such as information of the doubtful problem such as problem description, position, then by extraction can query
The information of topic and application are that the information applied extremely feeds back to third-party application together.
Certainly, if the terminal device corresponding shop server restocking application for being judged to applying extremely, will equally answer
It is sent to the shop server with for the information applied extremely, is applied so that the shop server chooses whether the undercarriage exception.
In some embodiments, if designated parties application judges that the item number of the Debugging message for the application that it is generated is not above
The application of preset item number threshold value, i.e. installing terminal equipment is illegal application, at this point, in order to reduce user due to using this to answer
With caused loss, then terminal device receives and shows that the application of designated parties application (such as shop server) transmission re-downloads and asks
Ask, if the agreement for receiving user's transmission re-downloads information, unload the application for being judged to applying extremely, and re-download it is legal
Using.Wherein, the Apply Names of the legal application of downloading are identical as the Apply Names applied extremely.
In the present embodiment, since designated parties judge application again, thereby it is ensured that judging result is accurate
Property, at this point, indicating that user re-downloads legal application, has unloaded abnormal application, has made so as to avoid user by designated parties
Caused loss is applied extremely with this.
In some embodiments, if designated parties application judges the application that it is generated for abnormal application, at this point, in order to guarantee
User uses the fluency applied extremely, then terminal device receives and shows that designated parties application (such as shop server) is sent
Application upgrade request upgrades the application for being judged to applying extremely if receiving the agreement upgrade information of user's transmission.
In the present embodiment, by upgrading to abnormal application, solve the problems, such as that exception application exists, to improve use
The usage experience at family.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present application constitutes any limit
It is fixed.
Embodiment three:
Corresponding with above-described embodiment one, embodiment two, Fig. 3 shows a kind of abnormal application inspection provided by the embodiments of the present application
The structural schematic diagram of device is surveyed, which is applied in terminal device, for ease of description, illustrates only this
The relevant part of embodiment.
The item number acquiring unit 31 and exception that the exception application detection device 3 includes: Debugging message are using judging unit 32.
Wherein:
The item number acquiring unit 31 of Debugging message, for obtaining the item number for having installed the Debugging message of application;
Specifically, when application is mounted on terminal device, executable file will be generated, for example, can hold virtual machine is generated
Capable binary file, the executable binary file record have Debugging message (debuginfo).
In some embodiments, since the executable binary file is other than including the Debugging message of application, also
Including other information, therefore, in order to the Debugging message of quick obtaining application, then the exception application detection device 3 further include:
Debugging message recording unit for extracting Debugging message from the executable file for installed application, and is recorded in
In corresponding Debugging message table, the executable file is to apply the file generated in installing terminal equipment;
Accordingly, the item number acquiring unit 31 of the Debugging message specifically includes:
The item number for having installed the Debugging message of application is obtained according to the Debugging message table.
In the present embodiment, since Debugging message is recorded in Debugging message table in advance, it is therefore not necessary to be carried out again to information
Filtering, so as to improve Debugging message item number acquisition speed.It, can will be each it should be noted that in the present embodiment
The Debugging message for having installed application is all recorded in the same Debugging message table, and the Debugging message of different application passes through the unique of application
Mark distinguishes, and can also install respectively by each using, a Debugging message table note corresponding with each Debugging message table
The Debugging message of application has been installed in record one.
In some embodiments, the suffix name of the executable file for having installed application is .dex, at this point, this is executable
File is dex file.
It is abnormal to apply judging unit 32, if the item number for the Debugging message is more than preset item number threshold value, determine institute
It states and is applied using to be abnormal.
Wherein, preset item number threshold value is according to empirically determined numerical value.
In the embodiment of the present application, since the item number according to Debugging message judges whether apply is abnormal application, rather than will
Whether Debugging message is matched to judge to answer using being abnormal application it is therefore not necessary to which difference is stored in advance with the information prestored
Can also be judged with corresponding Debugging message it is each application whether be abnormal application, so as in time, be effectively detected out it is different
Often application.
In some embodiments, the exception application detection device 3 further include:
Optimize unit, if the item number for the Debugging message is not above preset item number threshold value, to described executable
File optimizes.
Wherein, executable file is optimized and is specifically included: adjusting the sequence of the data of the executable file, for example,
Often accessed data are arranged closely together, in such manner, it is possible to guarantee that the data called all are by data to be used.
In some embodiments, to reduce the interference to user, executable file is optimized on backstage.
In some embodiments, the optimization unit further include: if the item number of the Debugging message is more than preset item number
Threshold value does not optimize the corresponding executable file of the Debugging message then.
In the present embodiment, due to the corresponding executable text of Debugging message for being only not above preset item number threshold value to item number
Part optimizes, and therefore, avoiding optimization application process, (if executable file is dex file, optimizing application process is
Dex2oat excessively high memory is occupied) so as to avoid occupying use Caton phenomenon caused by excessively high memory.
In some embodiments, to further avoid the use Caton phenomenon caused by optimization process, the optimization
Unit includes:
If the terminal device where the application is in idle condition, and the item number of the Debugging message be not above it is default
Item number threshold value, the executable file is optimized.
Wherein, idle state includes following any case: the blank screen duration of terminal device is more than preset duration threshold value;
Terminal device is in charging and application that foreground is not run.
In some embodiments, abnormal application is repaired in time for the ease of designated parties, then the application detection extremely
Device 3 further include:
Information feedback unit for not optimizing to the executable file, and will include that the application is answered to be abnormal
Information feeds back to designated parties.
In the present embodiment, since the item number for the Debugging message applied extremely is greater than preset item number threshold value, not to sentencing
It is set to the executable file applied extremely to optimize, can be avoided and occupy excessively high memory when optimization.Further, since will include
Designated parties are fed back to using for the information applied extremely, therefore, application are detected in time convenient for designated parties, and repairing is answered
Loophole.
Further, the designated parties are third-party application, at this point, in the information feedback unit and will include described answer
It is specifically included with designated parties are fed back to for the information applied extremely:
The information of doubtful problem is extracted from the executable file, and will include the application be the information applied extremely with
And the information of the doubtful problem feeds back to third-party application.
In the present embodiment, the position to go wrong can be quickly determined for the ease of third-party application, then from executable text
Part extract doubtful problem information, the information such as information of the doubtful problem such as problem description, position, then by extraction can query
The information of topic and application are that the information applied extremely feeds back to third-party application together.
Certainly, if the terminal device corresponding shop server restocking application for being judged to applying extremely, will equally answer
It is sent to the shop server with for the information applied extremely, is applied so that the shop server chooses whether the undercarriage exception.
In some embodiments, if designated parties application judges that the item number of the Debugging message for the application that it is generated is not above
The application of preset item number threshold value, i.e. installing terminal equipment is illegal application, at this point, in order to reduce user due to using this to answer
With caused loss, then the exception application detection device 3 further include:
Unit is re-downloaded, is asked for receiving and showing that the application of designated parties application (such as shop server) transmission re-downloads
Ask, if the agreement for receiving user's transmission re-downloads information, unload the application for being judged to applying extremely, and re-download it is legal
Using.Wherein, the Apply Names of the legal application of downloading are identical as the Apply Names applied extremely.
In the present embodiment, since designated parties judge application again, thereby it is ensured that judging result is accurate
Property, at this point, indicating that user re-downloads legal application, has unloaded abnormal application, has made so as to avoid user by designated parties
Caused loss is applied extremely with this.
In some embodiments, if designated parties application judges the application that it is generated for abnormal application, at this point, in order to guarantee
User uses the fluency applied extremely, then the exception application detection device 3 further include:
Upgrade unit, the application upgrade request sent for receiving and showing designated parties application (such as shop server), if
The agreement upgrade information for receiving user's transmission upgrades the application for being judged to applying extremely.
In the present embodiment, by upgrading to abnormal application, solve the problems, such as that exception application exists, to improve use
The usage experience at family.
Example IV:
Fig. 4 is the schematic diagram for the terminal device that one embodiment of the application provides.As shown in figure 4, the terminal of the embodiment is set
Standby 4 include: processor 40, memory 41 and are stored in the meter that can be run in the memory 41 and on the processor 40
Calculation machine program 42.The processor 40 realizes the step in above-mentioned each embodiment of the method when executing the computer program 42,
Such as step S11 to S12 shown in FIG. 1.Alternatively, the processor 40 realizes above-mentioned each dress when executing the computer program 42
Set the function of each module/unit in embodiment, such as the function of module 41 to 42 shown in Fig. 4.
Illustratively, the computer program 42 can be divided into one or more module/units, it is one or
Multiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the application.Described one
A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for
Implementation procedure of the computer program 42 in the terminal device 4 is described.For example, the computer program 42 can be divided
For the item number acquiring unit and exception for being cut into Debugging message using judging unit, each unit concrete function is as follows:
The item number acquiring unit of Debugging message, for obtaining the item number for having installed the Debugging message of application;
It is abnormal to apply judging unit, if the item number for the Debugging message is more than preset item number threshold value, described in judgement
It is applied using to be abnormal.
The terminal device 4 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set
It is standby.The terminal device may include, but be not limited only to, processor 40, memory 41.It will be understood by those skilled in the art that Fig. 4
The only example of terminal device 4 does not constitute the restriction to terminal device 4, may include than illustrating more or fewer portions
Part perhaps combines certain components or different components, such as the terminal device can also include input-output equipment, net
Network access device, bus etc..
Alleged processor 40 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 41 can be the internal storage unit of the terminal device 4, such as the hard disk or interior of terminal device 4
It deposits.The memory 41 is also possible to the External memory equipment of the terminal device 4, such as be equipped on the terminal device 4
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge
Deposit card (Flash Card) etc..Further, the memory 41 can also both include the storage inside list of the terminal device 4
Member also includes External memory equipment.The memory 41 is for storing needed for the computer program and the terminal device
Other programs and data.The memory 41 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list
Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
Scope of the present application.
In embodiment provided herein, it should be understood that disclosed device/terminal device and method, it can be with
It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute
The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as
Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately
A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device
Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can store in a computer readable storage medium.Based on this understanding, the application realizes above-mentioned implementation
All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium
It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code
Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice
Subtract, such as does not include electric carrier signal and electricity according to legislation and patent practice, computer-readable medium in certain jurisdictions
Believe signal.
Embodiment described above is only to illustrate the technical solution of the application, rather than its limitations;Although referring to aforementioned reality
Example is applied the application is described in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution should all
Comprising within the scope of protection of this application.
Claims (10)
1. a kind of exception application detection method characterized by comprising
Obtain the item number for having installed the Debugging message of application;
If the item number of the Debugging message is more than preset item number threshold value, determine the application for abnormal application.
2. as described in claim 1 abnormal using detection method, which is characterized in that the exception application detection method is also wrapped
It includes:
If the item number of the Debugging message is not above preset item number threshold value, the executable file is optimized.
3. as claimed in claim 2 abnormal using detection method, which is characterized in that if the item number of the Debugging message does not have
Preset item number threshold value is had more than, the executable file is optimized, comprising:
If the terminal device where the application is in idle condition, and the item number of the Debugging message is not above preset item
Number threshold value, optimizes the executable file.
4. as described in claim 1 abnormal using detection method, which is characterized in that determine that the application is answered to be abnormal described
With later, comprising:
The executable file is not optimized, and will be that the information applied extremely feeds back to designated parties including the application.
5. as claimed in claim 4 abnormal using detection method, which is characterized in that the designated parties are third-party application, this
When, it is described and will include the application be that the information applied extremely feeds back to designated parties and specifically includes:
The information of doubtful problem is extracted from the executable file, and will be the information applied extremely and institute including the application
The information for stating doubtful problem feeds back to third-party application.
6. as described in claim 1 abnormal using detection method, which is characterized in that installed the debugging of application in the acquisition
Before the item number of information, comprising:
Extract Debugging message from the executable file for installed application, and be recorded in corresponding Debugging message table, it is described can
Executing file is to apply the file generated in installing terminal equipment;
Accordingly, the item number for obtaining the Debugging message for having installed application specifically includes:
The item number for having installed the Debugging message of application is obtained according to the Debugging message table.
7. such as exception application detection method as claimed in any one of claims 1 to 6, which is characterized in that described to have installed application
The suffix name of executable file is .dex.
8. a kind of exception application detection device characterized by comprising
The item number acquiring unit of Debugging message, for obtaining the item number for having installed the Debugging message of application;
It is abnormal to apply judging unit, if the item number for the Debugging message is more than preset item number threshold value, determine the application
For abnormal application.
9. a kind of terminal device, including memory, processor and storage are in the memory and can be on the processor
The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 7 when executing the computer program
The step of any one the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In when the computer program is executed by processor the step of any one of such as claim 1 to 7 of realization the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910455132.6A CN110162479B (en) | 2019-05-29 | 2019-05-29 | Abnormal application detection method and device and terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910455132.6A CN110162479B (en) | 2019-05-29 | 2019-05-29 | Abnormal application detection method and device and terminal equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110162479A true CN110162479A (en) | 2019-08-23 |
CN110162479B CN110162479B (en) | 2023-09-29 |
Family
ID=67629567
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910455132.6A Active CN110162479B (en) | 2019-05-29 | 2019-05-29 | Abnormal application detection method and device and terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110162479B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112445487A (en) * | 2019-09-02 | 2021-03-05 | 深圳Tcl新技术有限公司 | Dex optimization method, system, intelligent terminal and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090222492A1 (en) * | 2008-02-28 | 2009-09-03 | Mtsubishi Electric Corporation | Logging Device and Recording Medium |
CN102622297A (en) * | 2012-02-23 | 2012-08-01 | 北京航空航天大学 | Method for generating test cases for fuzz tool aiming at com component derivative function parameter space and binary data |
WO2014030035A1 (en) * | 2012-08-22 | 2014-02-27 | Freescale Semiconductor, Inc. | Method and system for obtaining run-time information associated with executing an executable |
CN103902900A (en) * | 2013-05-03 | 2014-07-02 | 哈尔滨安天科技股份有限公司 | External extraction type detecting device and method for mobile terminal malicious code |
WO2016054957A1 (en) * | 2014-10-10 | 2016-04-14 | 北京金山安全软件有限公司 | Application exception detection method, device and mobile terminal |
CN105959462A (en) * | 2016-04-20 | 2016-09-21 | 深圳市万普拉斯科技有限公司 | Abnormal startup control method and system |
CN105959156A (en) * | 2016-06-29 | 2016-09-21 | 深圳市智汇十方科技有限公司 | Mobile terminal application exception processing method and system |
CN109284217A (en) * | 2018-09-28 | 2019-01-29 | 平安科技(深圳)有限公司 | Application exception processing method, device, electronic equipment and storage medium |
CN109800159A (en) * | 2018-12-27 | 2019-05-24 | 百富计算机技术(深圳)有限公司 | Program debugging method, program debugging device, terminal device and storage medium |
-
2019
- 2019-05-29 CN CN201910455132.6A patent/CN110162479B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090222492A1 (en) * | 2008-02-28 | 2009-09-03 | Mtsubishi Electric Corporation | Logging Device and Recording Medium |
CN102622297A (en) * | 2012-02-23 | 2012-08-01 | 北京航空航天大学 | Method for generating test cases for fuzz tool aiming at com component derivative function parameter space and binary data |
WO2014030035A1 (en) * | 2012-08-22 | 2014-02-27 | Freescale Semiconductor, Inc. | Method and system for obtaining run-time information associated with executing an executable |
CN103902900A (en) * | 2013-05-03 | 2014-07-02 | 哈尔滨安天科技股份有限公司 | External extraction type detecting device and method for mobile terminal malicious code |
WO2016054957A1 (en) * | 2014-10-10 | 2016-04-14 | 北京金山安全软件有限公司 | Application exception detection method, device and mobile terminal |
CN105959462A (en) * | 2016-04-20 | 2016-09-21 | 深圳市万普拉斯科技有限公司 | Abnormal startup control method and system |
CN105959156A (en) * | 2016-06-29 | 2016-09-21 | 深圳市智汇十方科技有限公司 | Mobile terminal application exception processing method and system |
CN109284217A (en) * | 2018-09-28 | 2019-01-29 | 平安科技(深圳)有限公司 | Application exception processing method, device, electronic equipment and storage medium |
CN109800159A (en) * | 2018-12-27 | 2019-05-24 | 百富计算机技术(深圳)有限公司 | Program debugging method, program debugging device, terminal device and storage medium |
Non-Patent Citations (4)
Title |
---|
EARL T. BARR等: "The Oracle Problem in Software Testing: A Survey", 《IEEE TRANSACTIONS ON SOFTWARE ENGINEERING》, vol. 41, no. 5, pages 507 - 525, XP011581002, DOI: 10.1109/TSE.2014.2372785 * |
孙润康;展娴;邵玉如;秦城;: "Android手机安全检测与取证分析系统", 信息网络安全, no. 03 * |
陆杰等: "分布式系统中的日志分析及应用", 《高技术通讯》 * |
陆杰等: "分布式系统中的日志分析及应用", 《高技术通讯》, no. 04, 15 April 2019 (2019-04-15) * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112445487A (en) * | 2019-09-02 | 2021-03-05 | 深圳Tcl新技术有限公司 | Dex optimization method, system, intelligent terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110162479B (en) | 2023-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107844189A (en) | A kind of method, system, terminal and computer-readable recording medium for reducing blank screen power consumption | |
CN110244963B (en) | Data updating method and device and terminal equipment | |
CN108038112A (en) | Document handling method, mobile terminal and computer-readable recording medium | |
CN108279947A (en) | The method and device of financial self-service equipment SP installation kits adaptation | |
WO2019019702A1 (en) | Algorithm generation method and device, terminal device and storage medium | |
CN107656750A (en) | Update of plug-in method and device | |
CN107368735A (en) | One kind applies installation method, mobile terminal and computer-readable recording medium | |
CN107506494B (en) | Document handling method, mobile terminal and computer readable storage medium | |
CN108520063A (en) | Processing method, device and the terminal device of event log | |
CN108920704A (en) | File access pattern method, file restoring device and mobile terminal | |
CN107272989B (en) | Using starting method, apparatus and terminal device | |
CN109671199A (en) | A kind of antisubmarine back method, device, system and terminal device | |
CN107301236A (en) | Application searches method, mobile terminal, server and computer-readable recording medium | |
CN110162479A (en) | It is abnormal to apply detection method, device and terminal device | |
CN107330058A (en) | Application searches method, mobile terminal and computer-readable recording medium | |
CN111815433A (en) | Loan risk assessment method and device, machine-readable medium and equipment | |
CN107248078A (en) | Mobile payment means of defence, mobile terminal and computer-readable recording medium | |
CN107315947A (en) | Pay class application management method, device and mobile terminal | |
CN108490824B (en) | Intelligent electric appliance control method, device and mobile terminal | |
CN106502858A (en) | A kind of multiple subsystem power consumption determines method and terminal | |
CN109544587A (en) | A kind of FIG pull handle method, apparatus and terminal device | |
CN107273168B (en) | A kind of application installation method, mobile terminal and computer readable storage medium | |
CN109561146A (en) | Document down loading method, device, terminal device | |
CN109543420B (en) | Permission configuration method and device based on sud, electronic equipment and storage medium | |
CN110018828A (en) | Source code inspection method, device and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |