CN111026605A - Method and system for discovering illegal content of mobile application - Google Patents

Method and system for discovering illegal content of mobile application Download PDF

Info

Publication number
CN111026605A
CN111026605A CN201911104237.3A CN201911104237A CN111026605A CN 111026605 A CN111026605 A CN 111026605A CN 201911104237 A CN201911104237 A CN 201911104237A CN 111026605 A CN111026605 A CN 111026605A
Authority
CN
China
Prior art keywords
mobile application
application
interface
command
picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911104237.3A
Other languages
Chinese (zh)
Inventor
宋苑
李晓东
吴寒
何颖
李湘宁
胡赢
张莹莹
李立
霍思贤
刘铭
吴界壁
唐星宇
黄虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Branch Center Of National Computer Network And Information Security Management Center
Original Assignee
Guangzhou Branch Center Of National Computer Network And Information Security Management Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Branch Center Of National Computer Network And Information Security Management Center filed Critical Guangzhou Branch Center Of National Computer Network And Information Security Management Center
Priority to CN201911104237.3A priority Critical patent/CN111026605A/en
Publication of CN111026605A publication Critical patent/CN111026605A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/53Decompilation; Disassembly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a method and a system for discovering illegal contents of mobile application; the discovery method comprises the following steps: step S1, decompiling the mobile application by using a decompiling tool, thereby obtaining a decompiled source file; step S2, installing and running the mobile application through the android simulator, so as to open an application interface of the mobile application and trigger a functional component of the mobile application; monitoring an application interface of a mobile application from the time when the application interface is opened, and capturing a picture and/or extracting text information when the application interface is changed; acquiring a network data packet in a packet capturing mode from the running of the mobile application; s3, screening and matching the source file, the screenshot and the network data packet through a regular expression to obtain a picture URL, and downloading a corresponding picture file; the textual information and the picture file are analyzed to discover content violations. The method and the system for finding the illegal contents of the mobile application reduce manual operation and improve the working efficiency.

Description

Method and system for discovering illegal content of mobile application
Technical Field
The invention relates to the technical field of information, in particular to a method and a system for discovering illegal contents of mobile applications, which are used for automatically extracting, identifying and supervising illegal contents of mobile applications.
Background
The existing discovery method of Mobile Application (Mobile Application) illegal content needs to manually install and operate the Mobile Application, click each plate deep into the Mobile Application, perform detailed investigation on data content under each plate, discover illegal characters and pictures in the plates, and finally perform forensics and sorting. The method requires a large amount of manual intervention and is inefficient.
Disclosure of Invention
The invention provides a method and a system for discovering illegal contents of mobile applications, aiming at the technical problems.
The invention provides the following technical scheme:
the invention provides a method for discovering illegal contents of mobile application, which comprises the following steps:
step S1, decompiling the mobile application by using a decompiling tool, thereby obtaining a decompiled source file; extracting component information of a functional component of the mobile application in a source file;
s2, installing the mobile application through an android simulator, running the mobile application, opening an application interface of the mobile application, and triggering a functional component of the mobile application through the android simulator according to the component information of the functional component under the application interface of the mobile application; monitoring an application interface of a mobile application from the time when the application interface is opened, and capturing a picture and/or extracting text information when the application interface is changed; acquiring a network data packet in a packet capturing mode from the running of the mobile application;
s3, screening and matching the source file, the screenshot and the network data packet through a regular expression to obtain a picture URL, and downloading a corresponding picture file according to the picture URL; and analyzing the text information and the picture file to find illegal contents and classifying the illegal contents.
In the discovery method, the decompiling tool adopts APKTool, and the source files comprise android manifest.xml files and string.xml files;
acquiring component information of a functional component of the mobile application by analyzing the android manifest.
In the discovery method, the mobile application is run by using an am command and/or an input command of the android simulator; and opening an application interface of the mobile application by utilizing an am start-n command, an am start services command and an am broadcast command of the android simulator, and realizing the transmission of the system broadcast.
In the discovery method of the invention, the input tap command and/or the input text command and/or the input swap command of the android simulator are used for triggering the functional components of the mobile application.
In the discovery method, when the name of the functional component on the application interface of the mobile application is changed, the screenshot is executed; and when the main body content on the application interface of the mobile application is changed, performing character information extraction.
The invention also provides a system for discovering illegal contents of mobile applications, which comprises the following steps:
the application static picture URL extraction module is used for decompiling the mobile application by using a decompiling tool so as to obtain a decompiled source file; extracting component information of a functional component of the mobile application in a source file; the image processing device is also used for screening and matching the source files through the regular expressions so as to obtain the picture URL;
the dynamic interface screenshot module is used for installing the mobile application through the android simulator and running the mobile application so as to open an application interface of the mobile application, and then triggering the functional component of the mobile application through the android simulator according to the component information of the functional component under the application interface of the mobile application; monitoring an application interface of the mobile application from the time when the application interface is opened, and capturing a picture when the application interface is changed;
the dynamic interface character extraction module is used for extracting character information when the application interface changes;
the packet capturing tool is used for acquiring a network data packet in a packet capturing mode from the running time of the mobile application;
the dynamic network flow picture URL extraction module is used for screening and matching the screenshot and the network data packet through a regular expression so as to obtain a picture URL;
and the AI studying and judging analysis engine module is used for analyzing the text information and downloading the obtained corresponding picture file according to the picture URL to find illegal contents and classify the illegal contents.
In the discovery system, the decompiling tool adopts APKTool, and the source files comprise android manifest.xml files and string.xml files;
and the application static picture URL extraction module is also used for acquiring the component information of the functional component of the mobile application by analyzing the android manifest.
In the discovery system of the present invention, the dynamic interface screenshot module is further configured to run the mobile application by using an am command and/or an input command of the android simulator; and opening an application interface of the mobile application and realizing the transmission of the system broadcast by utilizing an am start-n command, an am startservices command and an am broadcast command of the android simulator.
In the discovery system of the present invention, the dynamic interface screenshot module is further configured to trigger a functional component of the mobile application by using an input tap command and/or an input text command and/or an input swap command of the android simulator.
In the discovery system of the present invention, the dynamic interface screenshot module is configured to execute screenshot when a name of a functional component on an application interface of the mobile application changes;
and the dynamic interface character extraction module is used for executing character information extraction when the main content on the application interface of the mobile application is changed.
The method and the system for finding the illegal contents of the mobile application extract characters and pictures in the static and dynamic running processes of the mobile application through automatic installation and running of any mobile application, and find the illegal contents through AI research and judgment analysis. The method and the system for finding the illegal mobile application content can reduce manual operation and improve the working efficiency.
Drawings
The invention is further described below with reference to the accompanying drawings:
FIG. 1 illustrates a flow chart of a method for discovering mobile application offending content in accordance with a preferred embodiment of the present invention;
fig. 2 is a functional block diagram of a mobile application violation content discovery system according to a preferred embodiment of the present invention.
Detailed Description
In order to make the technical solutions, technical objects, and technical effects of the present invention clearer so as to enable those skilled in the art to understand and implement the present invention, the present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
As shown in fig. 1, fig. 1 is a flow chart illustrating a method for discovering illegal contents of mobile applications according to a preferred embodiment of the present invention. Specifically, the invention provides a method for discovering illegal contents of mobile applications, which comprises the following steps:
step S1, decompiling the mobile application by using a decompiling tool, thereby obtaining a decompiled source file; extracting component information of a functional component of the mobile application in a source file;
in this step, the decompilation tool uses APKTool to decompilate the mobile application through APKTool, and the obtained source files generally include a smali file, an xml file, a json file, a js file, and an html file. xml files include android manifest.
The APK compilation tool provided by GOOGLE corporation is APK compilation tool, which can decompile and decompile APK, and requires Java support.
It should be understood that the decompilation tool is not limited to APKTool, and any tool capable of decompilating a mobile application should be within the meaning of the decompilation tool described above.
The package name and the related component information are obtained by analyzing the android manifest.
S2, installing the mobile application through an android simulator, running the mobile application, opening an application interface of the mobile application, and triggering a functional component of the mobile application through the android simulator according to the component information of the functional component under the application interface of the mobile application; monitoring an application interface of a mobile application from the time when the application interface is opened, and capturing a picture and/or extracting text information when the application interface is changed; acquiring a network data packet in a packet capturing mode from the running of the mobile application;
the android simulator can run on a personal computer and simulate an android mobile phone system, can install, use and uninstall android application software, and can also use mobile application programs in the simulator even if a user does not have mobile phone hardware equipment.
In this step, the mobile application is run by using am commands and/or input commands of the android simulator. And opening an application interface of the mobile application by utilizing an am start-n command, an am start services command and an am broadcast command of the android simulator, and realizing the transmission of the system broadcast.
And triggering the functional components of the mobile application by utilizing an input tap command and/or an input text command and/or an input swap command of the android simulator. Here, on the application interface, the functional components of the mobile application appear as trigger options on the mobile application that can change the content of the application interface.
Therefore, related network behaviors are triggered by starting components such as an application interface and a service of the mobile application, and the functional components of the mobile application are triggered by preset simulation, so that the network behaviors are triggered, and the captured network data packet is relatively comprehensive.
In the step, when the name of a functional component on an application interface of the mobile application is changed, executing screenshot; and when the main body content on the application interface of the mobile application is changed, performing character information extraction.
S3, screening and matching the source file, the screenshot and the network data packet through a regular expression to obtain a picture URL, and downloading a corresponding picture file according to the picture URL; and analyzing the text information and the picture file to find illegal contents and classifying the illegal contents.
The method also comprises the steps of adopting a preset rule to analyze the source file, the screenshot and the network data packet so as to extract content information related to the picture URL, and then screening and matching the content information so as to obtain the picture URL.
Regular expressions are a logical formula for operating on character strings including common characters (e.g., letters between a and z) and special characters (called "meta characters") ], i.e., a "regular character string" is formed by using specific characters defined in advance and combinations of the specific characters, and the "regular character string" is used for expressing a filtering logic for the character string. A regular expression is a text pattern that describes one or more strings of characters to be matched when searching for text.
By giving one regular expression and another character string, a desired specific portion can be obtained from the character string by the regular expression.
In the step, an AI research and judgment analysis engine extracts illegal keywords in the text information through semantic analysis, and classifies text contents, including terrorism-related, political-related, violence-related, yellow-related and the like; and classifying the picture information by deep learning and based on a large number of models of training materials, wherein the classification includes terrorism, political, violence, jaundice and the like.
As shown in fig. 2, fig. 2 is a functional module diagram of a mobile application violation content discovery system according to a preferred embodiment of the present invention. The invention also provides a system for discovering illegal contents of mobile applications, which comprises the following steps:
an application static picture URL extraction module 100, configured to perform decompilation on the mobile application using a decompilation tool, so as to obtain a decompilated source file; extracting component information of a functional component of the mobile application in a source file; the image processing device is also used for screening and matching the source files through the regular expressions so as to obtain the picture URL;
the application static picture URL extraction module 100 is further configured to parse the source file by using a preset rule, thereby extracting content information related to the picture URL, and then performing screening and matching on the content information, thereby obtaining the picture URL.
Here, the decompilation tool uses APKTool to decompilate the mobile application through APKTool, and the obtained source files generally include a smali file, an xml file, a json file, a js file, and an html file. xml files include android manifest.
The APK compilation tool provided by GOOGLE corporation is APK compilation tool, which can decompile and decompile APK, and requires Java support.
It should be understood that the decompilation tool is not limited to APKTool, and any tool capable of decompilating a mobile application should be within the meaning of the decompilation tool described above.
The application static picture URL extraction module 100 is further configured to obtain a package name and related component information by parsing an android manifest.
The dynamic interface screenshot module 200 is used for installing the mobile application through the android simulator, running the mobile application, opening an application interface of the mobile application, and triggering the functional component of the mobile application through the android simulator according to the component information of the functional component under the application interface of the mobile application; monitoring an application interface of the mobile application from the time when the application interface is opened, and capturing a picture when the application interface is changed;
the dynamic interface character extraction module 300 is used for extracting character information when an application interface changes;
the android simulator can run on a personal computer and simulate an android mobile phone system, can install, use and uninstall android application software, and can also use mobile application programs in the simulator even if a user does not have mobile phone hardware equipment.
The dynamic interface screenshot module 200 is further configured to run the mobile application by utilizing am commands and/or input commands of the android simulator. And opening an application interface of the mobile application and realizing the transmission of the system broadcast by utilizing an am start-n command, an am start services command and an ambroadcast command of the android simulator.
The dynamic interface screenshot module 200 is further used for triggering the functional components of the mobile application by utilizing an input tap command and/or an input text command and/or an input swap command of the android simulator. Here, on the application interface, the functional components of the mobile application appear as trigger options on the mobile application that can change the content of the application interface.
The packet capturing tool 600 is used for acquiring a network data packet in a packet capturing mode from the time of running of the mobile application;
therefore, related network behaviors are triggered by starting components such as an application interface and a service of the mobile application, and the functional components of the mobile application are triggered by preset simulation, so that the network behaviors are triggered, and the captured network data packet is relatively comprehensive.
The dynamic interface screenshot module 200 is configured to execute screenshot when a name of a function component on an application interface of the mobile application changes;
and the dynamic interface text extraction module 300 is configured to perform text information extraction when the main content on the application interface of the mobile application changes.
The dynamic network traffic picture URL extraction module 400 is used for screening and matching the screenshot and the network data packet through a regular expression so as to obtain a picture URL;
specifically, the dynamic network traffic picture URL extracting module 400 is further configured to analyze the screenshot and the network data packet by using a preset rule, so as to extract content information related to the picture URL, and then perform screening and matching on the content information, so as to obtain the picture URL.
Regular expressions are a logical formula for operating on character strings including common characters (e.g., letters between a and z) and special characters (called "meta characters") ], i.e., a "regular character string" is formed by using specific characters defined in advance and combinations of the specific characters, and the "regular character string" is used for expressing a filtering logic for the character string. A regular expression is a text pattern that describes one or more strings of characters to be matched when searching for text.
By giving one regular expression and another character string, a desired specific portion can be obtained from the character string by the regular expression.
A downloading module 700, configured to download a corresponding picture file according to the picture URL;
and the AI studying and judging analysis engine module 500 is used for analyzing the text information and downloading the obtained corresponding picture file according to the picture URL to find illegal contents and classify the illegal contents.
The AI studying and judging analysis engine extracts the illegal keywords in the character information through semantic analysis and classifies the character contents, including terrorism, political, violence, yellow and the like; and classifying the picture information by deep learning and based on a large number of models of training materials, wherein the classification includes terrorism, political, violence, jaundice and the like.
The method and the system for finding the illegal contents of the mobile application extract characters and pictures in the static and dynamic running processes of the mobile application through automatic installation and running of any mobile application, and find the illegal contents through AI research and judgment analysis. The method and the system for finding the illegal mobile application content can reduce manual operation and improve the working efficiency.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A method for discovering illegal contents of mobile applications is characterized by comprising the following steps:
step S1, decompiling the mobile application by using a decompiling tool, thereby obtaining a decompiled source file; extracting component information of a functional component of the mobile application in a source file;
s2, installing the mobile application through an android simulator, running the mobile application, opening an application interface of the mobile application, and triggering a functional component of the mobile application through the android simulator according to the component information of the functional component under the application interface of the mobile application; monitoring an application interface of a mobile application from the time when the application interface is opened, and capturing a picture and/or extracting text information when the application interface is changed; acquiring a network data packet in a packet capturing mode from the running of the mobile application;
s3, screening and matching the source file, the screenshot and the network data packet through a regular expression to obtain a picture URL, and downloading a corresponding picture file according to the picture URL; and analyzing the text information and the picture file to find illegal contents and classifying the illegal contents.
2. The discovery method of claim 1 wherein the decompilation tool employs APKTool, the source files including android manifest.
Acquiring component information of a functional component of the mobile application by analyzing the android manifest.
3. The discovery method of claim 1 wherein the mobile application is run by using am commands and/or input commands of an android simulator; and opening an application interface of the mobile application by utilizing an am start-n command, an am start services command and an am broadcast command of the android simulator, and realizing the transmission of the system broadcast.
4. Discovery method according to claim 1, characterized in that the functional components of the mobile application are triggered by an input tap command and/or an input text command and/or an input swap command with the android simulator.
5. The discovery method of claim 1 wherein the screenshot is executed when a name of a function component on the application interface of the mobile application changes; and when the main body content on the application interface of the mobile application is changed, performing character information extraction.
6. A system for discovering illegal content of a mobile application, comprising:
the application static picture URL extraction module (100) is used for decompiling the mobile application by using a decompiling tool so as to obtain a decompiled source file; extracting component information of a functional component of the mobile application in a source file; the image processing device is also used for screening and matching the source files through the regular expressions so as to obtain the picture URL;
the dynamic interface screenshot module (200) is used for installing the mobile application through the android simulator and running the mobile application so as to open an application interface of the mobile application, and then triggering the functional component of the mobile application through the android simulator according to the component information of the functional component under the application interface of the mobile application; monitoring an application interface of the mobile application from the time when the application interface is opened, and capturing a picture when the application interface is changed;
the dynamic interface character extraction module (300) is used for extracting character information when an application interface changes;
the packet capturing tool (600) is used for acquiring a network data packet in a packet capturing mode from the running time of the mobile application;
the dynamic network flow picture URL extraction module (400) is used for screening and matching the screenshot and the network data packet through a regular expression so as to obtain a picture URL;
the downloading module (700) is used for downloading the corresponding picture file according to the picture URL;
and the AI studying and judging analysis engine module (500) is used for analyzing the text information and downloading the obtained corresponding picture file according to the picture URL so as to find illegal contents and classify the illegal contents.
7. The discovery system of claim 6 wherein the decompilation tool employs APKTool, the source files including android manifest.xml files, string.xml files;
and the application static picture URL extraction module (100) is also used for acquiring the component information of the functional components of the mobile application by analyzing the android manifest.
8. The discovery system of claim 6, wherein the dynamic interface screenshot module (200) is further configured to run the mobile application by utilizing am commands and/or input commands of an android simulator; and opening an application interface of the mobile application by utilizing an amstart-n command, an am start services command and an am broadcast command of the android simulator, and realizing the transmission of the system broadcast.
9. The discovery system of claim 6, wherein the dynamic interface screenshot module (200) is further configured to trigger a functional component of the mobile application by utilizing an input tap command and/or an input text command and/or an input swap command of the android simulator.
10. The discovery system of claim 6,
the dynamic interface screenshot module (200) is used for executing screenshot when the name of a functional component on an application interface of the mobile application is changed;
and the dynamic interface text extraction module (300) is used for executing text information extraction when the main content on the application interface of the mobile application is changed.
CN201911104237.3A 2019-11-13 2019-11-13 Method and system for discovering illegal content of mobile application Pending CN111026605A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911104237.3A CN111026605A (en) 2019-11-13 2019-11-13 Method and system for discovering illegal content of mobile application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911104237.3A CN111026605A (en) 2019-11-13 2019-11-13 Method and system for discovering illegal content of mobile application

Publications (1)

Publication Number Publication Date
CN111026605A true CN111026605A (en) 2020-04-17

Family

ID=70205592

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911104237.3A Pending CN111026605A (en) 2019-11-13 2019-11-13 Method and system for discovering illegal content of mobile application

Country Status (1)

Country Link
CN (1) CN111026605A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112069500A (en) * 2020-09-17 2020-12-11 杭州安恒信息技术股份有限公司 Application software detection method, device and medium
CN112581812A (en) * 2020-11-23 2021-03-30 读书郎教育科技有限公司 System and method for assisting online education live broadcast after-class teacher to communicate with students

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601573A (en) * 2015-01-15 2015-05-06 国家计算机网络与信息安全管理中心 Verification method and device for Android platform URL (Uniform Resource Locator) access result
CN106022127A (en) * 2016-05-10 2016-10-12 江苏通付盾科技有限公司 APK file security detection method and apparatus
CN107180192A (en) * 2017-05-09 2017-09-19 北京理工大学 Android malicious application detection method and system based on multi-feature fusion
CN110232146A (en) * 2019-04-30 2019-09-13 北京邮电大学 A kind of data grab method and grabbing device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601573A (en) * 2015-01-15 2015-05-06 国家计算机网络与信息安全管理中心 Verification method and device for Android platform URL (Uniform Resource Locator) access result
CN106022127A (en) * 2016-05-10 2016-10-12 江苏通付盾科技有限公司 APK file security detection method and apparatus
CN107180192A (en) * 2017-05-09 2017-09-19 北京理工大学 Android malicious application detection method and system based on multi-feature fusion
CN110232146A (en) * 2019-04-30 2019-09-13 北京邮电大学 A kind of data grab method and grabbing device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵泽虎: "Android智能终端动态分析关键技术的研究与实现" *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112069500A (en) * 2020-09-17 2020-12-11 杭州安恒信息技术股份有限公司 Application software detection method, device and medium
CN112581812A (en) * 2020-11-23 2021-03-30 读书郎教育科技有限公司 System and method for assisting online education live broadcast after-class teacher to communicate with students

Similar Documents

Publication Publication Date Title
CN109145603A (en) A kind of Android privacy leakage behavioral value methods and techniques based on information flow
US20050229043A1 (en) System and method for software testing
JPWO2018235252A1 (en) Analyzing device, log analyzing method, and analyzing program
CN108985064B (en) Method and device for identifying malicious document
CN104834858A (en) Method for statically detecting malicious code in android APP (Application)
EP3547121B1 (en) Combining device, combining method and combining program
CN102830991B (en) Methods and devices used for realizing document collection and automatic installation of software package
CN105577528B (en) A kind of wechat public platform collecting method and device based on virtual machine
CN106529294B (en) A method of determine for mobile phone viruses and filters
CN108304483B (en) Webpage classification method, device and equipment
CN113076538B (en) Method for extracting embedded privacy policy of mobile application APK file
CN111026605A (en) Method and system for discovering illegal content of mobile application
CN113038153B (en) Financial live broadcast violation detection method, device, equipment and readable storage medium
CN108694319A (en) A kind of malicious code family determination method and device
CN103500109B (en) Method and device for achieving file collection and software package automatic installation
CN114398673A (en) Application compliance detection method and device, storage medium and electronic equipment
CN110287722B (en) Sensitive permission extraction method for privacy regulation check in iOS application
Alalfi et al. An approach to clone detection in sequence diagrams and its application to security analysis
CN112364227A (en) Mobile APP data acquisition method
CN115552401A (en) Fast application detection method, device, equipment and storage medium
CN114817925B (en) Android malicious software detection method and system based on multi-modal graph features
Rajapakse Techniques for De-fragmenting Mobile Applications: A Taxonomy.
CN114266906A (en) Method, device, medium, and program product for identifying violation data at user side
CN110888807B (en) Automatic packet grabbing method for android application
CN113110952A (en) Method and device for acquiring SDK abnormal information in application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination