CN110427752A - A kind of method, mobile terminal and the storage medium of sandbox monitoring application program - Google Patents

A kind of method, mobile terminal and the storage medium of sandbox monitoring application program Download PDF

Info

Publication number
CN110427752A
CN110427752A CN201910720997.0A CN201910720997A CN110427752A CN 110427752 A CN110427752 A CN 110427752A CN 201910720997 A CN201910720997 A CN 201910720997A CN 110427752 A CN110427752 A CN 110427752A
Authority
CN
China
Prior art keywords
application program
mobile terminal
sandbox
source code
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910720997.0A
Other languages
Chinese (zh)
Inventor
张江寒
向鹏
邓培根
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhiyouwang'an Technology Co Ltd
Original Assignee
Beijing Zhiyouwang'an Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhiyouwang'an Technology Co Ltd filed Critical Beijing Zhiyouwang'an Technology Co Ltd
Priority to CN201910720997.0A priority Critical patent/CN110427752A/en
Publication of CN110427752A publication Critical patent/CN110427752A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • G06F8/44Encoding

Abstract

A kind of method, mobile terminal and the storage medium of sandbox monitoring application program, comprising: definition obtains information of mobile terminal behavior, and positions the acquisition information of mobile terminal behavior in the source code of mobile terminal;Log output function is inserted into the source code, compiling generates the installation of sandbox system in the terminal after modifying the source code;The sandbox system generates simultaneously output system log when application program executes and obtains information of mobile terminal behavior.When application call function obtains information of mobile terminal, the log output function being inserted in function source code produces a system log to monitor application program, and no matter whether application program, which encrypts, can be monitored application program;Application program can just be monitored application program when calling function, will not lead to the problem of wrong report;The sandbox system that original system source code generates is modified, it is compatible with mobile terminal, it can be widely used in mobile terminal.

Description

A kind of method, mobile terminal and the storage medium of sandbox monitoring application program
Technical field
The present invention relates to the sides of information technology security fields technical field more particularly to a kind of sandbox monitoring application program Method, mobile terminal and storage medium.
Background technique
The application program (being applied to the app in mobile phone) being mounted in mobile phone can obtain cellphone information, such as inquiry mobile phone Interior short message, message registration, address list obtain the operation such as mobile phone IMEI (international mobile equipment identification number), if not taking monitoring Means, it would be possible to cause the leakage of individual privacy information.
How to monitor application program and obtain cellphone information, existing technical solution has following two:
One is by way of decompiling combination static scanning: by decompiling application file, obtaining decompiling Code scans and matches the function that cellphone information is obtained in decompiling code, if getLine1Number () function is for obtaining Phone number.The shortcomings that technical solution is to be easy to appear information wrong report, and counter can not be compiled to the application program of reinforcing It translates, this method is not applicable.
Another kind is using hook frames such as xposed in cell phone system, and hook frame reads the function of cellphone information, When cellphone information function executes, corresponding log information, the log that operation mobile phone exports when applying according to hook frame are exported Information can monitor whether application program obtains cellphone information.The shortcomings that technical solution, is that many applications can detection device On hook frame, and do not support to run in the equipment for being equipped with hook frame.
Summary of the invention
In order to solve to monitor in the prior art be easy to appear when application program obtains cellphone information wrong report, detection efficiency it is low, The problem of application program and detection framework can not be installed on the same device simultaneously, the present invention propose that journey is applied in a kind of sandbox monitoring Method, mobile terminal and the storage medium of sequence.
What the invention is realized by the following technical scheme:
A kind of method of sandbox monitoring application program, comprising:
Definition obtains information of mobile terminal behavior, and positions the acquisition information of mobile terminal behavior in the source of mobile terminal Code;
Log output function is inserted into the source code, compiling generates the installation of sandbox system in the terminal;
The sandbox system generates simultaneously output system log when application program executes and obtains information of mobile terminal behavior.
The method of the described sandbox monitoring application program, wherein the acquisitions information of mobile terminal behavior include: deletion or Short message enquiry, inquiring call history, inquiry address list, the mobile device world identification code for obtaining mobile terminal, acquisition are mounted on The international mobile subscriber identity (IMSI) of mobile terminal, recording, opens mobile terminal at the phone number for obtaining mobile terminal At least one of camera, positioning, the administrator's permission for obtaining mobile terminal.
The method of the sandbox monitoring application program, wherein the system log includes: to obtain information of mobile terminal row For application program UID, according to the UID position obtain information of mobile terminal behavior application program.
The method of the sandbox monitoring application program, wherein the system log includes: to obtain information of mobile terminal row For application program method call stack, positioned in the application program according to the method call stack and obtain information of mobile terminal The function of behavior.
The method of the sandbox monitoring application program, wherein the system log includes: uniform resource locator and asks Ask the triggered time for obtaining information of mobile terminal behavior.
The method of the sandbox monitoring application program, wherein described " log output function is inserted into the source code, Compiling generate sandbox system installation in the terminal " include: by the source code be inserted into log output function original system, Sandbox system is compiled by-j the order of make.
The method of the sandbox monitoring application program, wherein described " log output function is inserted into the source code, Compiling generates the installation of sandbox system in the terminal " it include: that the sandbox system is installed by fastboot or recovery In the terminal.
The method of the sandbox monitoring application program, wherein described " log output function is inserted into the source code, Compiling generates the installation of sandbox system in the terminal " it later include: that test application program is installed in the terminal.
A kind of mobile terminal, including processor and memory, the sand that the memory storage can be executed by the processor Case system realizes the step of the method such as above-mentioned sandbox monitoring application program when the sandbox system is executed by the processor Suddenly.
A kind of storage medium, the storage medium are stored with one or more programs, and one or more of programs can quilt One or more processors execute, to realize the method such as above-mentioned sandbox monitoring application program.
The beneficial effects of the present invention are:
When application call function obtains information of mobile terminal, it is inserted in log output function in function source code i.e. A system log is produced to monitor application program, no matter whether application program, which encrypts, can be monitored application program;
Application program can just be monitored application program when calling function, will not lead to the problem of wrong report;
The sandbox system that original system source code generates is modified, it is compatible with mobile terminal, it can be widely used in mobile whole In end.
Detailed description of the invention
Fig. 1 is the running environment schematic diagram of mobile terminal, system and application program in the prior art;
Fig. 2 is the generation, compiling of sandbox system, installation procedure figure in the present invention;
Fig. 3 is in the present invention, and application program is when obtaining information of mobile terminal, the workflow of sandbox system and application program Cheng Tu;
Fig. 4 is a kind of running environment schematic diagram of mobile terminal proposed by the present invention.
Specific embodiment
To make the purpose of the present invention, technical solution and effect clearer, clear and definite, right as follows in conjunction with drawings and embodiments The present invention is further described.It should be appreciated that described herein, specific examples are only used to explain the present invention, is not used to Limit the present invention.
Referring to FIG. 1, being equipped with system in existing mobile terminal, user installs and runs using journey in system environments Sequence, such as Android system is installed in smart phone, it installed in Android system, run different apk files (application program text Part).The application program of installation in the terminal can obtain the letter stored in mobile terminal by way of calling system function The information of breath or mobile terminal itself, if by compiling system function to generate sandbox system, when application call system When function obtains information, sandbox system generates system log according to the system function of calling, can be monitored and be answered by system log Use program.
Referring to FIG. 2, generating sandbox system firstly the need of modification original system, specific implementation step, application and principle are as follows:
Modification original system needs to position the source code in original system, and positioning source code then needs specifically to determine application program Which the information for obtaining mobile terminal specifically includes.Thus, modification original system obtains information of mobile terminal row firstly the need of definition For.
S100, definition obtain information of mobile terminal behavior:
In one embodiment of the invention, the mobile terminal is smart phone, and application program obtains mobile terminal letter Breath behavior includes:
Inquiry deletes the short message stored in mobile terminal, inquiring call history, inquiry address list, obtains mobile terminal Mobile device world identification code (IMEI), obtain installation in the terminal the international mobile subscriber identity (IMSI) of SIM card, Phone number is recorded by mobile terminal or inquires recording file, the camera for opening mobile terminal, positioning, obtains movement eventually Administrator's permission (Root authority) at end.
S200 positions source code:
Information of mobile terminal behavior is obtained according to application program, can position what original system domestic demand in mobile terminal to be modified Source code, by taking Android system is the smart phone of operating system as an example, below in conjunction with above-mentioned acquisition information of mobile terminal behavior It is illustrated respectively:
1. inquiry deletes short message, inquires position of the class file of address list, inquiring call history in smart phone: rameworks/base/core/java/android/content/ContentResolver.java
1.1. short message respective function source code is deleted are as follows:
public final int delete(@NonNull Uri url,@Nullable String where,
@Nullable String[]selectionArgs)
When the first parameter is " content: //sms ", short message behavior is deleted in triggering.
1.2. short message enquiry respective function source code are as follows:
public final@Nullable Cursor query(final@NonNull Uri uri,@Nullable String[]projection,
@Nullable String selection,@Nullable String[]selectionArgs,
@Nullable String sortOrder,@Nullable CancellationSignal cancellationSignal)
Show to trigger short message enquiry behavior when the first parameter is " content: //sms ".
1.3. inquiring call history respective function source code are as follows:
public final@Nullable Cursor query(final@NonNull Uri uri,@Nullable String[]projection,
@Nullable String selection,@Nullable String[]selectionArgs,
@Nullable String sortOrder,@Nullable CancellationSignal cancellationSignal)
Show to trigger inquiring call history behavior when the first parameter is " content: //call_log/calls ".
1.4. address list respective function source code is inquired are as follows:
public final@Nullable Cursor query(final@NonNull Uri uri,@Nullable String[]projection,
@Nullable String selection,@Nullable String[]selectionArgs,
@Nullable String sortOrder,@Nullable CancellationSignal cancellationSignal)
Show to trigger inquiring call history row when the first parameter is " content: //com.android.contacts " For.
2. obtaining the mobile device world identification code (IMEI) of smart phone, acquisition is mounted on SIM card in smart phone Position of the class file in smart phone of international mobile subscriber identity (IMSI), phone number:
frameworks/base/telephony/java/android/telephony/ TelephonyManager.java
2.1. international mobile subscriber identity (IMSI) the respective function source code for being mounted on SIM card in smart phone is obtained Are as follows: public String getImei (int slotId)
2.2. the mobile device world identification code (IMEI) the respective function source code for being mounted on smart phone is obtained are as follows:
public String getImei()
2.3. the phone number respective function source code for installing SIM card in the terminal is obtained are as follows:
public String getLine1NumberForSubscriber(int subId)
3. opening position of the class file of smart phone recording in smart phone:
frameworks/base/media/java/android/media/AudioRecord.java
Open the respective function source code of smart phone recording are as follows:
public void startRecording(MediaSyncEvent syncEvent)
4. opening position of the class file of the camera of smart phone in smart phone:
frameworks/base/core/java/android/hardware/camera2/CameraManager.java
Open the respective function source code of the camera of smart phone are as follows:
public void openCamera(@NonNull String cameraId,
@NonNull final CameraDevice.StateCallback callback,@Nullable Handler handler)
5. position of the class file of positioning intelligent mobile phone in smart phone:
frameworks/base/location/java/android/location/LocationManager.java
The respective function source code of positioning intelligent mobile phone are as follows:
public Location getLastLocation()
6. obtaining position of the class file of administrator's permission (Root authority) of mobile terminal in smart phone:
libcore/luni/src/main/java/java/lang/Runtime.java
Obtain the respective function source code of administrator's permission (Root authority) of mobile terminal are as follows:
public Process exec(String[]progArray,String[]envp,File directory)
Show that triggering obtains root authority behavior when in the first parameter including " su ".
S300 is inserted into log output function in source code:
Log output function is inserted into or added in above-mentioned respective function source code, and log output function is executing corresponding letter A system log is exported when number source code, thus, when application call system function is to obtain cellphone information, system Log output function in function produces and output system log, and user, which can monitor application program by system log, is No acquisition cellphone information.
S400, compiling generate sandbox system:
System after modification source code, which is compiled, generates sandbox system, in a preferred embodiment of the invention, modification System after source code is compiled into sandbox system by the-j order of make.Code compilation at system can there are many compile mode, Wherein the compiling mode of make-j order can be stablized, quickly by code compilation at system file.In other realities of the invention It applies in example, source code can also be compiled into the compiling mode of system by other realizations.
S500 installs sandbox system in the terminal:
The sandbox system of generation is installed in the terminal to be monitored to the application program being mounted in sandbox system, Wherein, sandbox system is installed in the terminal by fastboot, can also be installed by recovery in the terminal, Mounting means is selected according to the usage mode of user.
The present invention is monitored application program by being inserted into log output function in original system source code, works as application program When obtaining information of mobile terminal, the corresponding function source code of system in mobile terminal is called, sandbox system will be by being inserted in source Code in log output function output system log, play the role of monitor application program, no matter application program whether reinforce or Encryption, once application program calling system function will generate system log, reinforce or encrypt with application program itself it is unrelated, no It will affect monitoring of the sandbox system to application program.Moreover, the present invention is to modify to generate sandbox to the system of mobile terminal System not will cause sandbox system and the incompatible problem of mobile terminal, and before usage mode and insertion log output function Usage mode it is identical, not will cause user's problem inconvenient for use, can be widely used among mobile terminal.
S600 installs test application program:
After sandbox system is installed in the terminal, test application program is installed in sandbox system to test sandbox system It unites and obtains the monitoring of information of mobile terminal to application program.
In sandbox system, sandbox system and application of the application program when obtaining information of mobile terminal, in mobile terminal Program is according to process flow operation shown in Fig. 3:
R100, application program, which executes, obtains information of mobile terminal behavior;
R200, sandbox system receives and executing application is requested;
R300, sandbox system pass through the output system log of log output function.
It is described in one embodiment of the present of invention in order to accurately illustrate sandbox system is how to monitor application program Log output function is as follows, wherein the behavior TYPE of the log output function is needed according to the above-mentioned respective function source code of insertion Position modification replace with corresponding function:
In above-mentioned log output function, the system log of generation includes: to obtain the application journey of information of mobile terminal behavior The UID of sequence, method call stack, the triggered time for obtaining information of mobile terminal behavior and uniform resource locator are executed.
Wherein, when UID is that application program is installed in the terminal, system distributes to the mark of application program, as long as obtaining Take UID, so that it may find the application program for obtaining mobile terminal, prevent from reporting by mistake.
In one embodiment of the invention, in mobile terminal, the programming language that sandbox system and application program use is Java voice, in Java language, each method can generate a corresponding method stack when being executed, describe for simplicity, By application executing method generate method stack become goal approach stack, system execute method generate method stack be referred to as be System method stack:
Application executing method is to obtain information of mobile terminal, and generate goal approach stack;
System receives the solicited message of application program, executes method as transmission information of mobile terminal to application program, and Systems approach stack is generated, which can be by the goal approach record stack of calling system method in systems approach stack, such as Fruit obtains systems approach stack, so that it may be accurately positioned in application program, obtain the position of information of mobile terminal function.Due to being System method stack has application program development request, calls and generate, thus systems approach stack is one kind of method call stack.Root According to the function for obtaining information of mobile terminal in method call stack positioning application program, the accuracy of monitoring may further ensure that, No matter whether application program encrypts, and the purpose of monitoring application program may be implemented.
Triggered time and uniform resource locator indicate that application program obtains time and the position of information of mobile terminal, are convenient for User monitoring provides additional monitoring data for user.
In one embodiment of the invention, when sandbox system is Android system, sandbox system is at runtime using life It enables adb logcat obtain corresponding system log in real time, makes due to containing UID in log when analysis log generates result The user behaviors log that the corresponding application program of UID is individually exported with grep combination UID order, achievees the purpose that monitoring.If there is defeated Log out illustrates there is the behavior for obtaining information of mobile terminal in application program
Referring to FIG. 4, the invention proposes a kind of mobile terminal, which includes processing on the basis of above-mentioned Device and memory, the sandbox system that the memory storage can be executed by the processor, the sandbox system is by the processing The step of method such as above-mentioned sandbox monitoring application program is realized when device executes.The mobile terminal passes through sandbox system monitoring The application program being mounted in the mobile terminal obtains the behavior of the information of mobile terminal, increases the letter of the mobile terminal Security performance is ceased, the system log that user generates according to the sandbox system being mounted in the mobile terminal understands application program The case where obtaining the information of mobile terminal prevents information of mobile terminal from revealing.
The present invention also proposes a kind of storage medium, and the storage medium is stored with one or more programs, it is one or Multiple programs can be executed by one or more processors, the method to realize above-mentioned sandbox monitoring application program.
It is inserted into log output function in source code, when executing source code, is necessarily performed simultaneously log output function and gives birth to At system log, it is only the mode for being inserted into output journal in the implementation procedure of source code, application program and sandbox system will not be generated It unites incompatible problem, it can be generally applicable.The mode of sandbox system output journal is by application call sandbox system What interior method was realized, application program may be recorded in when obtaining information of mobile terminal to sandbox system request by interface In the system log of output, no matter whether application program is reinforced, and can be positioned to application program, is positioned have by UID respectively The application program of body, method call stack position the function for obtaining information of mobile terminal in application program, avoid decompiling application The problem of being reported by mistake caused by program, meanwhile, Decompilation is bypassed, the application program of reinforcing can be equally monitored.
It should be understood that the application of the present invention is not limited to the above for those of ordinary skills can With improvement or transformation based on the above description, all these modifications and variations all should belong to the guarantor of appended claims of the present invention Protect range.

Claims (10)

1. a kind of method of sandbox monitoring application program characterized by comprising
Definition obtains information of mobile terminal behavior, and positions source code of the acquisition information of mobile terminal behavior in original system;
Log output function is inserted into the source code, compiling generates the installation of sandbox system in the terminal after modifying source code;
The sandbox system generates simultaneously output system log when application program executes and obtains information of mobile terminal behavior.
2. the method for sandbox monitoring application program according to claim 1, which is characterized in that the acquisition mobile terminal letter Breath behavior includes: deletion or short message enquiry, inquiring call history, inquiry address list, obtains mobile device world identification code, obtains International mobile subscriber identity, obtain the phone number of mobile terminal, recording, the camera for opening mobile terminal, position, obtain Take at least one of administrator's permission of mobile terminal.
3. the method for sandbox according to claim 1 monitoring application program, which is characterized in that the system log includes:
The UID for obtaining the application program of information of mobile terminal behavior is positioned according to the UID and is obtained information of mobile terminal behavior Application program.
4. the method for sandbox according to claim 1 monitoring application program, which is characterized in that the system log includes:
The method call stack for obtaining the application program of information of mobile terminal behavior positions the application according to the method call stack The function of information of mobile terminal behavior is obtained in program.
5. the method for the monitoring application program of sandbox described according to claim 1 or 3 or 4, which is characterized in that the system log It include: the triggered time of uniform resource locator and request information of mobile terminal behavior.
6. the method for sandbox monitoring application program according to claim 1, which is characterized in that described " in the source code It is inserted into log output function, compiling generates the installation of sandbox system in the terminal " include:
It will be inserted into the original system of log output function in the source code, sandbox system is compiled by-j the order of make.
7. the method for sandbox monitoring application program according to claim 1, which is characterized in that described " in the source code It is inserted into log output function, compiling generates the installation of sandbox system in the terminal " include:
The sandbox system is installed in the terminal by fastboot or recovery.
8. the method for sandbox monitoring application program according to claim 1, which is characterized in that described " in the source code It is inserted into log output function, compiling generates the installation of sandbox system in the terminal " include: later
Test application program is installed in the terminal.
9. a kind of mobile terminal, which is characterized in that including processor and memory, the memory storage can be by the processor The sandbox system of execution is realized as described in claim 1 to 8 any one when the sandbox system is executed by the processor Sandbox monitors the step of method of application program.
10. a kind of storage medium, which is characterized in that the storage medium is stored with one or more programs, one or more A program can be executed by one or more processors, to realize the monitoring of sandbox described in claim 1 to 8 any one using journey The method of sequence.
CN201910720997.0A 2019-08-06 2019-08-06 A kind of method, mobile terminal and the storage medium of sandbox monitoring application program Pending CN110427752A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910720997.0A CN110427752A (en) 2019-08-06 2019-08-06 A kind of method, mobile terminal and the storage medium of sandbox monitoring application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910720997.0A CN110427752A (en) 2019-08-06 2019-08-06 A kind of method, mobile terminal and the storage medium of sandbox monitoring application program

Publications (1)

Publication Number Publication Date
CN110427752A true CN110427752A (en) 2019-11-08

Family

ID=68414362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910720997.0A Pending CN110427752A (en) 2019-08-06 2019-08-06 A kind of method, mobile terminal and the storage medium of sandbox monitoring application program

Country Status (1)

Country Link
CN (1) CN110427752A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110888756A (en) * 2019-11-19 2020-03-17 支付宝(杭州)信息技术有限公司 Diagnostic log generation method and device
CN111050311A (en) * 2019-12-06 2020-04-21 Oppo广东移动通信有限公司 Data management method, device, storage medium and terminal
CN111597570A (en) * 2020-05-19 2020-08-28 展讯半导体(南京)有限公司 Application program reinforcing method, device, equipment and storage medium
CN111913847A (en) * 2020-07-21 2020-11-10 上海冰鉴信息科技有限公司 Method and system for acquiring remote task execution progress
CN112035354A (en) * 2020-08-28 2020-12-04 北京指掌易科技有限公司 Method, device and equipment for positioning risk code and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105427096A (en) * 2015-12-25 2016-03-23 北京奇虎科技有限公司 Payment security sandbox realization method and system and application program monitoring method and system
CN105528295A (en) * 2016-01-04 2016-04-27 北京航空航天大学 Method and device for detecting abnormal behaviors of mobile application program
CN108133139A (en) * 2017-11-28 2018-06-08 西安交通大学 A kind of Android malicious application detecting system compared based on more running environment behaviors
CN109344616A (en) * 2018-09-13 2019-02-15 西安交通大学 A kind of mobile applications dynamically load behavior monitoring method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105427096A (en) * 2015-12-25 2016-03-23 北京奇虎科技有限公司 Payment security sandbox realization method and system and application program monitoring method and system
CN105528295A (en) * 2016-01-04 2016-04-27 北京航空航天大学 Method and device for detecting abnormal behaviors of mobile application program
CN108133139A (en) * 2017-11-28 2018-06-08 西安交通大学 A kind of Android malicious application detecting system compared based on more running environment behaviors
CN109344616A (en) * 2018-09-13 2019-02-15 西安交通大学 A kind of mobile applications dynamically load behavior monitoring method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
何志昌: "Android平台应用程序恶意行为检测方法研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110888756A (en) * 2019-11-19 2020-03-17 支付宝(杭州)信息技术有限公司 Diagnostic log generation method and device
CN111050311A (en) * 2019-12-06 2020-04-21 Oppo广东移动通信有限公司 Data management method, device, storage medium and terminal
CN111597570A (en) * 2020-05-19 2020-08-28 展讯半导体(南京)有限公司 Application program reinforcing method, device, equipment and storage medium
CN111913847A (en) * 2020-07-21 2020-11-10 上海冰鉴信息科技有限公司 Method and system for acquiring remote task execution progress
CN111913847B (en) * 2020-07-21 2021-04-27 上海冰鉴信息科技有限公司 Method and system for acquiring remote task execution progress
CN112035354A (en) * 2020-08-28 2020-12-04 北京指掌易科技有限公司 Method, device and equipment for positioning risk code and storage medium

Similar Documents

Publication Publication Date Title
CN110427752A (en) A kind of method, mobile terminal and the storage medium of sandbox monitoring application program
Mann et al. A framework for static detection of privacy leaks in android applications
US8099472B2 (en) System and method for a mobile cross-platform software system
Sbîrlea et al. Automatic detection of inter-application permission leaks in android applications
JP4955669B2 (en) Apparatus and method for detecting and managing unauthenticated executable instructions on a wireless device
JP2008546318A5 (en)
Armando et al. Formal modeling and reasoning about the android security framework
CN103177210A (en) Method of implanting dynamic stain analysis module in Android
CN110602043A (en) API gateway implementation system and method for mobile application
CN107145376A (en) A kind of active defense method and device
KR20110128632A (en) Method and device for detecting malicious action of application program for smartphone
CN113256296B (en) Intelligent contract execution method, system, device and storage medium
CN112104715A (en) Link tracking method and system based on microservice log
CN106203110B (en) Android safety enhancing system based on resolving inversely mechanism
Mustafa et al. Understanding the implemented access control policy of Android system services with slicing and extended static checking
CN112153012B (en) Multi-terminal contact access method, device and storage medium
CN105681291B (en) A kind of realization multi-client uniform authentication method and system
Kröll et al. Aristoteles–dissecting apple’s baseband interface
CN116244741A (en) Method and device for dynamically monitoring mobile application personal privacy data call
CN108229152A (en) Method and system based on ios platform dynamic monitoring
Zhong et al. Privilege escalation detecting in android applications
CN112596823B (en) Safety control method and device and electronic equipment
Pei et al. ASCAA: API‐level security certification of android applications
CN113065131A (en) Plug-in safety control method, device and storage medium
Sutter Firmwaredroid: Security analysis of the android firmware ecosystem

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191108

RJ01 Rejection of invention patent application after publication