CN113836528A - Android application shell checking method and device - Google Patents

Android application shell checking method and device Download PDF

Info

Publication number
CN113836528A
CN113836528A CN202010513695.9A CN202010513695A CN113836528A CN 113836528 A CN113836528 A CN 113836528A CN 202010513695 A CN202010513695 A CN 202010513695A CN 113836528 A CN113836528 A CN 113836528A
Authority
CN
China
Prior art keywords
android application
shell
static
dynamic
package
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010513695.9A
Other languages
Chinese (zh)
Other versions
CN113836528B (en
Inventor
殷铭
闻剑峰
陆广铖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202010513695.9A priority Critical patent/CN113836528B/en
Publication of CN113836528A publication Critical patent/CN113836528A/en
Application granted granted Critical
Publication of CN113836528B publication Critical patent/CN113836528B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The disclosure provides a shell checking method and device for android applications. Extracting static characteristics of the android application program package by the android application shell checking device; starting an android application program package to obtain dynamic characteristics of the android application program package; matching the static features with a preset static feature library to respectively obtain an indication function value of the static features relative to each shell adding mode; matching the dynamic features with a preset dynamic feature library to respectively obtain an indication function value of the dynamic features relative to each shell adding mode; calculating a weighted sum of the indication function values for each shell adding mode; judging whether the maximum weighted sum is larger than a preset threshold or not; and under the condition that the maximum weighted sum is greater than a preset threshold, taking the shell adding mode corresponding to the maximum weighting as the shell adding mode of the android application package. The shell checking method and the shell checking device can realize shell checking rapidly and in a non-invasive mode, and improve shell checking accuracy.

Description

Android application shell checking method and device
Technical Field
The disclosure relates to the field of security, in particular to a shell checking method and device for android applications.
Background
The android system is one of the mainstream mobile phone operating systems in the world, and a large number of developers contribute countless applications to the platform. In order to protect the application from being cracked, many application developers may choose to shell an APK (Android application package) file. But the malicious application developer can choose to add the shell to the APK in order to prevent the malicious application developed by the malicious application developer from being killed. As a large number of shell adding tools are filled in the market, the cost of adding shells to APK by malicious developers is low, and the shell adding rate of malicious applications is greatly higher than that of common applications. If these malicious applications need to be analyzed in detail, they necessarily need to be shelled. For different shells, corresponding shelling methods are usually used for shelling, so that accurate shell type identification is required for shelling firstly.
In the related art, two types of shell checking methods, namely static and dynamic, are mainly included. Static hull-finding methods include using PEID tools that analyze binary features of the file, PKID tools that match SO filenames, and the like. The dynamic shell checking method includes capturing system functions and non-system functions between shell program starting and application formal starting of the application through a hook function hook, and matching the captured system functions and non-system functions with a local feature library to identify a shell.
Disclosure of Invention
The inventors have noted that in the static shell-finding method, binary feature matching can be confused by the way the feature code is modified, resulting in a low detection rate. The way of matching only the SO file name is likely to generate erroneous judgment. In the dynamic shell-checking method, an intrusive way of capturing each function through a hook function hook may cause abnormal operation of the program, and the method is complex in itself and usually requires management authority of the device.
Accordingly, the android application shell checking scheme combining the static characteristic and the dynamic characteristic can quickly check the shell in a non-invasive mode and improve the shell checking accuracy.
According to a first aspect of the embodiments of the present disclosure, there is provided an android application shell checking method, including: extracting static characteristics of the android application program package; starting the android application program package to acquire the dynamic characteristics of the android application program package; matching the static features with a preset static feature library to respectively obtain an indication function value of the static features relative to each shell adding mode; matching the dynamic features with a preset dynamic feature library to respectively obtain an indication function value of the dynamic features relative to each shell adding mode; calculating a weighted sum of the indication function values for each shell adding mode; judging whether the maximum weighted sum is larger than a preset threshold or not; and taking the shell adding mode corresponding to the maximum weighting as the shell adding mode of the android application package under the condition that the maximum weighting sum is larger than the preset threshold.
In some embodiments, the static characteristics of the android application package comprise at least one of static file characteristics of the android application package, entry address characteristics of manifest files in the android application package, and characteristic functions in a smali file generated after an executable file in the android application package is decompiled.
In some embodiments, the static file characteristics include at least one of a directory name or a file name.
In some embodiments, the obtaining the dynamic characteristics of the android application package comprises: and acquiring dynamic characteristics of the android application program package by analyzing the system log, wherein the dynamic characteristics comprise at least one of the calling frequency of each function in the android application program package and the calling relation among the functions.
In some embodiments, in the event that the maximum weighted sum is not greater than the preset threshold, determining that a manner of shelling the android application package is unknown.
According to a second aspect of the embodiments of the present disclosure, there is provided an android application shell inspection device, including: the static feature extraction module is configured to extract static features of the android application package; the dynamic feature extraction module is configured to start the android application program package to acquire dynamic features of the android application program package; the first matching module is configured to match the static features with a preset static feature library so as to respectively obtain an indication function value of the static features relative to each shell adding mode; the second matching module is configured to match the dynamic features with a preset dynamic feature library so as to respectively obtain an indication function value of the dynamic features relative to each shell adding mode; the identification module is configured to calculate a weighted sum of indication function values for each shell adding mode, judge whether a maximum weighted sum is greater than a preset threshold, and take the shell adding mode corresponding to the maximum weighting as the shell adding mode of the android application package under the condition that the maximum weighted sum is greater than the preset threshold.
In some embodiments, the static characteristics of the android application package comprise at least one of static file characteristics of the android application package, entry address characteristics of manifest files in the android application package, and characteristic functions in a smali file generated after an executable file in the android application package is decompiled.
In some embodiments, the static file characteristics include at least one of a directory name or a file name.
In some embodiments, the dynamic feature extraction module is configured to obtain dynamic features of the android application package by analyzing a system log, where the dynamic features include at least one of a calling frequency of each function in the android application package and a calling relationship between each function.
In some embodiments, the identification module is further configured to determine that a manner of shelling for the android application package is unknown if the maximum weighted sum is not greater than the preset threshold.
According to a third aspect of the embodiments of the present disclosure, there is provided an android application shell inspection device, including: a memory configured to store instructions; a processor coupled to the memory, the processor configured to perform a method implementing any of the embodiments described above based on instructions stored by the memory.
According to a fourth aspect of the embodiments of the present disclosure, a computer-readable storage medium is provided, in which computer instructions are stored, and when executed by a processor, the computer-readable storage medium implements the method according to any of the embodiments described above.
Other features of the present disclosure and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description, taken with reference to the accompanying drawings, in which:
FIG. 1 is a schematic flow diagram of an android application shell inspection method according to an embodiment of the present disclosure;
FIG. 2 is a schematic structural diagram of an android application shell inspection device according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an android application shell inspection device according to another embodiment of the present disclosure.
It should be understood that the dimensions of the various parts shown in the figures are not drawn to scale. Further, the same or similar reference numerals denote the same or similar components.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. The description of the exemplary embodiments is merely illustrative and is in no way intended to limit the disclosure, its application, or uses. The present disclosure may be embodied in many different forms and is not limited to the embodiments described herein. These embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art. It should be noted that: the relative arrangement of parts and steps, the composition of materials and values set forth in these embodiments are to be construed as illustrative only and not as limiting unless otherwise specifically stated.
The use of the word "comprising" or "comprises" and the like in this disclosure means that the elements listed before the word encompass the elements listed after the word and do not exclude the possibility that other elements may also be encompassed.
All terms (including technical or scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs unless specifically defined otherwise. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
Fig. 1 is a schematic flow diagram of an android application shell inspection method according to an embodiment of the present disclosure. In some embodiments, the following android application shell-checking method steps are performed by an android application shell-checking device.
In step 101, static features of an android application package are extracted.
In some embodiments, the static characteristics of the android application package include at least one of static file characteristics of the android application package, entry address characteristics of a manifest file (android manifest. xml) in the android application package, and a characteristic function in a smali file generated after an executable file (dex file) in the android application package is decompiled.
In some embodiments, the static file characteristics include at least one of a directory name or a file name. For example, the file name includes a.so file, a.jar file, a.aar file, a.apk file, a.class file, a.dex file, a.des file, a. dey file, a.dat file, a.bin file, and the like.
At step 102, the android application package is started to obtain dynamic characteristics of the android application package.
In some embodiments, dynamic characteristics of the android application package are obtained by analyzing a system log, and the dynamic characteristics include at least one of calling frequency of functions and calling relation between the functions in the android application package.
In step 103, the static features are matched with a preset static feature library to obtain an indication function value of the static features relative to each shelling mode.
In some embodiments, the preset static feature library includes static file features of various known shell adding methods, as well as entry address features in the manifest file and feature functions in the smali file obtained by decompiling the dex file. Static file characteristics include directory and file names.
In step 104, the dynamic features are matched with a preset dynamic feature library to obtain an indication function value of the dynamic features relative to each shelling mode.
In some embodiments, the preset dynamic feature library includes function call features of various known shelling methods.
At step 105, a weighted sum is calculated indicating the function values for each of the hull modes.
In step 106, it is determined whether the maximum weighted sum is greater than a predetermined threshold.
In step 107, when the maximum weighted sum is greater than the preset threshold, the shell adding mode corresponding to the maximum weighted sum is used as the shell adding mode of the android application package.
In some embodiments, in the event that the maximum weighted sum is not greater than a preset threshold, it is determined that the manner in which the android application package is shelled is unknown.
In the android application shell checking method provided by the embodiment of the disclosure, the shell checking can be realized quickly and in a non-invasive manner by combining the static characteristic and the dynamic characteristic, and the shell checking accuracy is improved.
For example, by extracting static features of the android application package to obtain feature 1, feature 2, and feature 3. The characteristic 1 is a static file characteristic of the android application package, the characteristic 2 is an entry address characteristic of a manifest file in the android application package, and the characteristic 3 is a characteristic function in a smali file generated after an executable file (dex file) in the android application package is decompiled.
Then, the characteristics 4 are obtained by starting the android application package and acquiring the dynamic characteristics of the android application package. The characteristics 4 comprise the calling frequency of each function in the android application package and the calling relation among the functions.
Next, the features 1 to 3 are respectively matched with a preset static feature library to respectively obtain indication function values of the features 1 to 3 with respect to each shelling mode. If the feature 1 is matched with the class A shell and the class B shell and is not matched with the class C shell, setting the indication function value of the feature 1 relative to the class A shell and the class B shell to be 1, and setting the indication function value of the feature 1 relative to the class C shell to be 0. Accordingly, if feature 2 matches the class a shell and does not match the class B shell and the class C shell, the indication function value of feature 2 with respect to the class a shell is set to 1, and the indication function value of feature 2 with respect to the class B shell and the class C shell is set to 0. And if the feature 3 is matched with the class C shell and is not matched with the class A shell and the class B shell, setting the indication function value of the feature 3 relative to the class A shell and the class B shell to be 0, and setting the indication function value of the feature 3 relative to the class C shell to be 1.
And matching the characteristics 4 with a preset dynamic characteristic library to respectively obtain the indication function values of the dynamic characteristics relative to each shell adding mode. If the feature 4 is matched with the class A shell and the class B shell and is not matched with the class C shell, the indication function value of the feature 4 relative to the class A shell and the class B shell is set to be 1, and the indication function value of the feature 4 relative to the class C shell is set to be 0.
Next, a weighted sum indicating function values is calculated for each of the shell-adding manners. For example, let the weight of feature 1 to feature 3 be 0.2, and the weight of feature 4 be 0.4. From this a weighted sum of the indicated function values for each of the hull modes can be calculated.
As shown in table 1, for a class a shell, the corresponding weighted sum is:
YA=0.2×1+0.2×1+0.2×0+0.4×1=0.8
for a class B shell, the corresponding weighted sum is:
YB=0.2×1+0.2×0+0.2×0+0.4×1=0.6
for a class C shell, the corresponding weighted sum is:
YB=0.2×0+0.2×0+0.2×1+0.4×0=0.2
feature 1 Feature 2 Feature 3 Feature 4 Weighted sum
A 1 1 0 1 0.8
B 1 0 0 1 0.6
C 0 0 1 0 0.2
TABLE 1
If the preset threshold is set to 0.65, it can be seen from table 1 that the weighted sum of the class a shells is the largest, and 0.8 is greater than 0.65, so that it can be determined that the shell adding manner of the android application package is the class a shell adding manner.
On the contrary, if the weighted sum of the shells is not greater than the preset threshold through the calculation, it is indicated that the shell adding mode of the android application package is not included in the preset static feature library and dynamic feature library, and thus it is determined that the shell adding mode of the android application package is unknown.
In the android application shell checking method provided by the embodiment of the disclosure, the shell checking can be realized quickly and in a non-invasive manner by combining the static characteristic and the dynamic characteristic, and the shell checking accuracy is improved.
Fig. 2 is a schematic structural diagram of an android application shell inspection device according to an embodiment of the present disclosure. If shown in fig. 2, the android application shell checking device includes a static feature extraction module 21, a dynamic feature extraction module 22, a first matching module 23, a second matching module 24, and an identification module 25.
The static feature extraction module 21 is configured to extract static features of the android application package.
In some embodiments, the static characteristics of the android application package comprise at least one of static file characteristics of the android application package, entry address characteristics of manifest files in the android application package, and characteristic functions in a smali file generated after an executable file in the android application package is decompiled.
In some embodiments, the static file characteristics include at least one of a directory name or a file name. For example, the file name includes a.so file, a.jar file, a.aar file, a.apk file, a.class file, a.dex file, a.des file, a. dey file, a.dat file, a.bin file, and the like.
The dynamic feature extraction module 22 is configured to launch the android application package to obtain dynamic features of the android application package.
In some embodiments, the dynamic feature extraction module 22 obtains the dynamic features of the android application package by analyzing the system log, where the dynamic features include at least one of a call frequency of each function in the android application package and a call relationship between each function.
The first matching module 23 is configured to match the static features with a preset static feature library to obtain the indicated function values of the static features with respect to each shelling mode, respectively.
In some embodiments, the preset static feature library includes static file features of various known shell adding methods, as well as entry address features in the manifest file and feature functions in the smali file obtained by decompiling the dex file. Static file characteristics include directory and file names.
The second matching module 24 is configured to match the dynamic features with a preset dynamic feature library to obtain indication function values of the dynamic features relative to each shelling mode respectively;
in some embodiments, the preset dynamic feature library includes function call features of various known shelling methods.
The identification module 25 is configured to calculate a weighted sum of the indication function values for each of the shelling modes, determine whether a maximum weighted sum is greater than a preset threshold, and take the shelling mode corresponding to the maximum weighting as the shelling mode of the android application package when the maximum weighted sum is greater than the preset threshold.
In some embodiments, in the event that the maximum weighted sum is not greater than a preset threshold, it is determined that the manner in which the android application package is shelled is unknown.
In the android application shell checking device provided by the embodiment of the disclosure, the shell checking can be realized quickly and in a non-invasive manner by combining the static characteristic and the dynamic characteristic, and the shell checking accuracy is improved.
Fig. 3 is a schematic structural diagram of an android application shell inspection device according to another embodiment of the present disclosure. As shown in fig. 3, the android application shell-checking device includes a memory 31 and a processor 32.
The memory 31 is used to store instructions. The processor 32 is coupled to the memory 31. The processor 32 is configured to perform a method as referred to in any of the embodiments of fig. 1 based on the instructions stored by the memory.
As shown in fig. 3, the android application shell inspection device further includes a communication interface 33, which is used for information interaction with other devices. Meanwhile, the android application shell checking device further comprises a bus 34, and the processor 32, the communication interface 33 and the memory 31 complete mutual communication through the bus 34.
The Memory 31 may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM). Such as at least one disk storage. The memory 31 may also be a memory array. The storage 31 may also be partitioned and the blocks may be combined into virtual volumes according to certain rules.
Further, the processor 32 may be a central processing unit, or may be an ASIC (Application Specific Integrated Circuit), or one or more Integrated circuits configured to implement embodiments of the present disclosure.
The present disclosure also provides a computer-readable storage medium. The computer-readable storage medium stores computer instructions, and the instructions, when executed by the processor, implement the method according to any one of the embodiments in fig. 1.
In some embodiments, the functional modules may be implemented as a general purpose Processor, a Programmable Logic Controller (PLC), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), or other Programmable Logic device, discrete Gate or transistor Logic, discrete hardware components, or any suitable combination thereof, for performing the functions described in this disclosure.
So far, embodiments of the present disclosure have been described in detail. Some details that are well known in the art have not been described in order to avoid obscuring the concepts of the present disclosure. It will be fully apparent to those skilled in the art from the foregoing description how to practice the presently disclosed embodiments.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the foregoing examples are for purposes of illustration only and are not intended to limit the scope of the present disclosure. It will be understood by those skilled in the art that various changes may be made in the above embodiments or equivalents may be substituted for elements thereof without departing from the scope and spirit of the present disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (12)

1. An android application shell-checking method comprises the following steps:
extracting static characteristics of the android application program package;
starting the android application program package to acquire the dynamic characteristics of the android application program package;
matching the static features with a preset static feature library to respectively obtain an indication function value of the static features relative to each shell adding mode;
matching the dynamic features with a preset dynamic feature library to respectively obtain an indication function value of the dynamic features relative to each shell adding mode;
calculating a weighted sum of the indication function values for each shell adding mode;
judging whether the maximum weighted sum is larger than a preset threshold or not;
and taking the shell adding mode corresponding to the maximum weighting as the shell adding mode of the android application package under the condition that the maximum weighting sum is larger than the preset threshold.
2. The method of claim 1, wherein,
the static characteristics of the android application package comprise at least one of static file characteristics of the android application package, entry address characteristics of a manifest file in the android application package, and a characteristic function in a smali file generated after an executable file in the android application package is decompiled.
3. The method of claim 2, wherein,
the static file characteristics include at least one of a directory name or a file name.
4. The method of claim 1, wherein the obtaining dynamic features of the android application package comprises:
and acquiring dynamic characteristics of the android application program package by analyzing the system log, wherein the dynamic characteristics comprise at least one of the calling frequency of each function in the android application program package and the calling relation among the functions.
5. The method of any of claims 1-4, further comprising:
and determining that the shell adding mode of the android application package is unknown under the condition that the maximum weighted sum is not greater than the preset threshold.
6. An android application looks shell device, includes:
the static feature extraction module is configured to extract static features of the android application package;
the dynamic feature extraction module is configured to start the android application program package to acquire dynamic features of the android application program package;
the first matching module is configured to match the static features with a preset static feature library so as to respectively obtain an indication function value of the static features relative to each shell adding mode;
the second matching module is configured to match the dynamic features with a preset dynamic feature library so as to respectively obtain an indication function value of the dynamic features relative to each shell adding mode;
the identification module is configured to calculate a weighted sum of indication function values for each shell adding mode, judge whether a maximum weighted sum is greater than a preset threshold, and take the shell adding mode corresponding to the maximum weighting as the shell adding mode of the android application package under the condition that the maximum weighted sum is greater than the preset threshold.
7. The apparatus of claim 6, wherein,
the static characteristics of the android application package comprise at least one of static file characteristics of the android application package, entry address characteristics of a manifest file in the android application package, and a characteristic function in a smali file generated after an executable file in the android application package is decompiled.
8. The apparatus of claim 7, wherein,
the static file characteristics include at least one of a directory name or a file name.
9. The apparatus of claim 6, wherein,
the dynamic feature extraction module is configured to obtain dynamic features of the android application program package by analyzing a system log and by analyzing the system log, wherein the dynamic features include at least one of call frequency of each function in the android application program package and call relations among the functions.
10. The apparatus of any one of claims 6-9,
the identification module is further configured to determine that a shell style of the android application package is unknown if the maximum weighted sum is not greater than the preset threshold.
11. An android application looks shell device, includes:
a memory configured to store instructions;
a processor coupled to the memory, the processor configured to perform implementing the method of any of claims 1-5 based on instructions stored by the memory.
12. A computer-readable storage medium, wherein the computer-readable storage medium stores computer instructions which, when executed by a processor, implement the method of any one of claims 1-5.
CN202010513695.9A 2020-06-08 2020-06-08 Android application shell checking method and device Active CN113836528B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010513695.9A CN113836528B (en) 2020-06-08 2020-06-08 Android application shell checking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010513695.9A CN113836528B (en) 2020-06-08 2020-06-08 Android application shell checking method and device

Publications (2)

Publication Number Publication Date
CN113836528A true CN113836528A (en) 2021-12-24
CN113836528B CN113836528B (en) 2023-10-13

Family

ID=78963636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010513695.9A Active CN113836528B (en) 2020-06-08 2020-06-08 Android application shell checking method and device

Country Status (1)

Country Link
CN (1) CN113836528B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855440A (en) * 2012-09-13 2013-01-02 北京奇虎科技有限公司 Method, device and system for detecting packed executable files
CN104392177A (en) * 2014-12-16 2015-03-04 武汉虹旭信息技术有限责任公司 Android platform based virus forensics system and method
CN105205398A (en) * 2015-11-04 2015-12-30 北京鼎源科技有限公司 Shell checking method based on dynamic behaviors of APK (android package) packing software
CN107180191A (en) * 2017-05-03 2017-09-19 北京理工大学 A kind of malicious code analysis method and system based on semi-supervised learning
CN108038376A (en) * 2017-12-21 2018-05-15 中国人民解放军战略支援部队信息工程大学 The general hulling method of cryptor and device based on hybrid analysis
KR20190080445A (en) * 2017-12-28 2019-07-08 숭실대학교산학협력단 Whitelist construction method for analyzing malicious code, computer readable medium and device for performing the method
CN110795734A (en) * 2019-10-12 2020-02-14 南京信息职业技术学院 Malicious mobile application detection method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855440A (en) * 2012-09-13 2013-01-02 北京奇虎科技有限公司 Method, device and system for detecting packed executable files
CN104392177A (en) * 2014-12-16 2015-03-04 武汉虹旭信息技术有限责任公司 Android platform based virus forensics system and method
CN105205398A (en) * 2015-11-04 2015-12-30 北京鼎源科技有限公司 Shell checking method based on dynamic behaviors of APK (android package) packing software
CN107180191A (en) * 2017-05-03 2017-09-19 北京理工大学 A kind of malicious code analysis method and system based on semi-supervised learning
CN108038376A (en) * 2017-12-21 2018-05-15 中国人民解放军战略支援部队信息工程大学 The general hulling method of cryptor and device based on hybrid analysis
KR20190080445A (en) * 2017-12-28 2019-07-08 숭실대학교산학협력단 Whitelist construction method for analyzing malicious code, computer readable medium and device for performing the method
CN110795734A (en) * 2019-10-12 2020-02-14 南京信息职业技术学院 Malicious mobile application detection method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙贺 等: "一种结合动态与静态分析的函数调用图提取方法", 计算机工程, vol. 43, no. 03, pages 154 - 162 *

Also Published As

Publication number Publication date
CN113836528B (en) 2023-10-13

Similar Documents

Publication Publication Date Title
WO2016015680A1 (en) Security detection method and security detection apparatus for mobile terminal input window
US20160087998A1 (en) Detecting a malware process
CN110474900B (en) Game protocol testing method and device
CN108256322B (en) Security testing method and device, computer equipment and storage medium
CN112363937A (en) Method and device for testing differential coverage rate, computer equipment and storage medium
CN110674500B (en) Storage medium virus searching and killing method and device, computer equipment and storage medium
CN114139154A (en) Malicious code detection method and device, computer and readable storage medium
CN116204891B (en) Vulnerability exploitation analysis method, device and storage medium
CN113836528B (en) Android application shell checking method and device
CN108197475B (en) Malicious so module detection method and related device
CN108256327B (en) File detection method and device
CN112884258A (en) Method and device for detecting application risk
CN115935356A (en) Software security testing method, system and application
CN108650249A (en) POC attack detection methods, device, computer equipment and storage medium
US20140173392A1 (en) Hardware enforced protection of software data structures
CN111191234B (en) Virus information detection method and device
CN112328515B (en) Equipment detection method and device
CN114610577A (en) Target resource locking method, device, equipment and medium
KR20230082388A (en) Apparatus for verifying bootloader of ecu and method thereof
CN114915578A (en) WAF test method and device
CN106648558B (en) Control method and device for TPL (tire pressure level) Dataflow
CN109190366B (en) Program processing method and related device
CN110119618B (en) Malicious script detection method and device
CN115004185A (en) Detection method and device for private information leakage and electronic equipment
CN114048481A (en) Method, device, server and storage medium for processing security scanning report

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant