WO2015014299A1 - 移动终端中恶意广告的识别方法、装置和移动终端 - Google Patents

移动终端中恶意广告的识别方法、装置和移动终端 Download PDF

Info

Publication number
WO2015014299A1
WO2015014299A1 PCT/CN2014/083450 CN2014083450W WO2015014299A1 WO 2015014299 A1 WO2015014299 A1 WO 2015014299A1 CN 2014083450 W CN2014083450 W CN 2014083450W WO 2015014299 A1 WO2015014299 A1 WO 2015014299A1
Authority
WO
WIPO (PCT)
Prior art keywords
notification information
content
malicious
frequency
application
Prior art date
Application number
PCT/CN2014/083450
Other languages
English (en)
French (fr)
Inventor
张楠
苏海峰
焦国强
陈勇
Original Assignee
贝壳网际(北京)安全技术有限公司
北京金山网络科技有限公司
北京金山安全软件有限公司
珠海市君天电子科技有限公司
可牛网络技术(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 贝壳网际(北京)安全技术有限公司, 北京金山网络科技有限公司, 北京金山安全软件有限公司, 珠海市君天电子科技有限公司, 可牛网络技术(北京)有限公司 filed Critical 贝壳网际(北京)安全技术有限公司
Publication of WO2015014299A1 publication Critical patent/WO2015014299A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/564Static detection by virus signature recognition

Definitions

  • the present invention relates to the field of mobile security technologies, and in particular, to a method, device and mobile terminal for identifying malicious advertisements in a mobile terminal. Background technique
  • the malicious advertisements occupy a large part of the malware behavior of the operating system of the current mobile terminal, and usually cause a large amount of traffic to be lost to the user and interfere with the normal use of the user.
  • malware recognition methods in mobile terminals are usually first decompiled into plaintext codes, and then judged whether they have malicious behavior by extracting code features.
  • malware recognition is inefficient, and as the code of the malicious advertisement is confused, the virus producer encrypts the software program to make the software program reverse
  • the compilation is all garbled and cannot identify malicious behavior, which makes the extracted code feature matching technology seem weak when identifying such malicious advertisements.
  • the present invention aims to solve at least one of the above technical problems.
  • a first object of the present invention is to provide a method for identifying a malicious advertisement in a mobile terminal.
  • the method can accurately identify an application that can pop up malicious advertisements, effectively compensates for the deficiency of judging malicious advertisements by extracting code feature matching technology, and improves the recognition efficiency of malicious advertisements.
  • a second object of the present invention is to provide an apparatus for identifying a malicious advertisement in a mobile terminal.
  • a third object of the present invention is to provide a mobile terminal.
  • a fourth object of the present invention is to provide a storage medium.
  • a method for identifying a malicious advertisement in a mobile terminal includes the following steps: acquiring an application running in a mobile terminal; monitoring a notification bar of the mobile terminal to determine a corresponding to the application Notifying the information; and determining whether the application pops up a malicious advertisement based on the frequency of occurrence of the notification information and/or the content of the notification information.
  • a method for identifying a malicious advertisement in a mobile terminal by monitoring a notification bar of the mobile terminal to determine notification information corresponding to the application, and determining an application according to the frequency of occurrence of the notification information and/or the content of the notification information Whether the malware is popped up in the order can accurately identify the application that can pop up the malicious advertisement, effectively compensates for the deficiency of judging the malicious advertisement by extracting the code feature matching technology, and improves the recognition efficiency of the malicious advertisement.
  • the device for identifying a malicious advertisement in a mobile terminal includes: an obtaining module, configured to acquire an application running in the mobile terminal; and a monitoring module, configured to monitor the notification of the mobile terminal a column to determine notification information corresponding to the application; and a determining module, configured to determine, according to the frequency of occurrence of the notification information and/or the content of the notification information, whether the application pops up a malicious advertisement.
  • the device for identifying a malicious advertisement in the mobile terminal may monitor the notification bar of the mobile terminal by the monitoring module to determine notification information corresponding to the application, and the determining module determines the frequency of occurrence of the notification information and/or the content of the notification information. Whether the application pops up a malicious advertisement can accurately identify an application that can pop up a malicious advertisement, effectively compensates for the deficiency of judging the malicious advertisement by extracting the code feature matching technology, and improves the recognition efficiency of the malicious advertisement.
  • a mobile terminal includes: a casing, a processor, and a circuit board; the circuit board is disposed inside a space enclosed by the casing, and the processor is disposed in the circuit
  • the processor is configured to run an application; to determine notification information corresponding to the application by monitoring a notification bar of the mobile terminal; and according to an appearance frequency of the notification information and/or content of the notification information Determine if the app pops up a malicious ad
  • the mobile terminal can determine the notification information corresponding to the application by monitoring the notification bar of the mobile terminal, and determine whether the application pops up the malicious advertisement according to the appearance frequency of the notification information and/or the content of the notification information, and can accurately Identifying applications that can pop up malicious advertisements effectively compensates for the lack of malicious advertisements by extracting code feature matching technology, and improves the recognition efficiency of malicious advertisements.
  • a storage medium configured to store an application, and the application is used to execute a method for identifying a malicious advertisement in a mobile terminal according to the first aspect of the present invention.
  • FIG. 1 is a flowchart of a method for identifying a malicious advertisement in a mobile terminal according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for identifying a malicious advertisement in a mobile terminal according to another embodiment of the present invention
  • FIG. 3 is a flowchart of a method for identifying a malicious advertisement in a mobile terminal according to still another embodiment of the present invention
  • FIG. 5 is a structural block diagram of an apparatus for identifying a malicious advertisement in a mobile terminal according to another embodiment of the present invention.
  • the method, device, and mobile terminal for identifying a malicious advertisement in a mobile terminal are described below with reference to the accompanying drawings, in order to solve the problem that the malicious advertisement in the encrypted malware program cannot be recognized by the extracted code feature matching technology at the same time.
  • the invention solves the problem that the identification method of the malicious advertisement in the mobile terminal is inefficient, and the invention provides a method, a device and a mobile terminal for identifying a malicious advertisement in the mobile terminal.
  • FIG. 1 is a flow chart of a method for identifying a malicious advertisement in a mobile terminal according to an embodiment of the present invention. As shown in FIG. 1, the method for identifying a malicious advertisement in a mobile terminal includes the following steps.
  • the mobile terminal may be a hardware device having various operating systems such as a mobile phone, a tablet computer, a personal digital assistant, an e-book, etc., and may run an application and also have a network connection function.
  • the notification information may include an application's md5 value (Message Digest Algorithm 5), a digital signature md5 value, a name, a package name, a stack name, an information content, and the like.
  • md5 value Message Digest Algorithm 5
  • digital signature md5 value a name, a package name, a stack name, an information content, and the like.
  • the frequency of occurrence of the notification information or the content of the notification information may be selected to determine whether the application pops up a malicious advertisement, wherein determining whether the application pops up a malicious advertisement according to the frequency of occurrence of the notification information and the content of the notification information will be in a subsequent embodiment. As described in detail, determining whether the application pops up a malicious advertisement according to the frequency of occurrence of the notification information or the content of the notification information can be understood according to the subsequent embodiments.
  • a method for identifying a malicious advertisement in a mobile terminal by monitoring a notification bar of the mobile terminal to determine notification information corresponding to the application, and determining whether the application pops up according to the frequency of occurrence of the notification information and/or the content of the notification information.
  • Malicious advertisements can accurately identify applications that can pop up malicious advertisements, effectively compensate for the lack of malicious advertisements by extracting code feature matching technology, and improve the recognition efficiency of malicious advertisements.
  • the method for identifying a malicious advertisement in a mobile terminal includes the following steps.
  • the threshold can be set by default or set by the mobile terminal user. For example, if the threshold is 5 and the frequency of the notification information is greater than 5, the corresponding application is considered to frequently harass the user, and the notification information popped up by the application may be determined to be a malicious advertisement.
  • the preset condition may include: the content of the notification information includes a malicious word, the notification information is not clearable, the notification information does not have a push source, or the content of the notification information includes a risk string.
  • the content of the notification information may be determined according to the malicious vocabulary, whether the content of the notification information includes a malicious word, whether the notification information can be cleared according to the mark or attribute of the notification information, and the notification information is determined according to whether the content of the notification information includes the corresponding application name.
  • the risk string library determines whether the content of the notification information includes a risk string, wherein the malicious word may include words of bad content, for example, anti-government, obscene words, etc., the risk string may be a frequent pop-up notification message And the content of the notification message contains malicious words, filtering out the string obtained after the normal string such as downloading and installing successfully.
  • the malicious word may include words of bad content, for example, anti-government, obscene words, etc.
  • the risk string may be a frequent pop-up notification message
  • the content of the notification message contains malicious words, filtering out the string obtained after the normal string such as downloading and installing successfully.
  • determining that the notification information does not have a push source specifically includes: acquiring content information of the notification information; acquiring a preset number of characters in the content information; determining whether the preset number of characters include the corresponding application The name of the program; and if not included, it is determined that the notification information does not have a push source.
  • the preset number is 120, and 120 characters are obtained from the content information, and it is determined whether the 120 characters include the name of the corresponding application, if not
  • the notification information if the content of the notification information satisfies the preset condition, it may be determined that the corresponding application pops up the malicious advertisement. For example, if the content of the notification information includes a malicious word according to the malicious vocabulary, the notification information is not clear according to the mark or attribute of the notification information, and the notification information does not have the push information according to the content of the notification information that does not include the corresponding application name.
  • the source or the content of the notification information according to the risk string library contains the risk string, and it can be determined that the corresponding application will pop up a malicious advertisement.
  • the method for identifying a malicious advertisement in a mobile terminal if the content of the notification information satisfies a preset condition, or the frequency of occurrence of the notification information exceeds a threshold, it may be determined that the corresponding application pops up a malicious advertisement, which improves the accuracy. rate.
  • the notification information acquired by the monitoring notification bar is preferably filtered, and the notification information that meets the conditions is recorded, specifically, before determining whether the frequency of occurrence of the notification information exceeds the threshold,
  • the method further includes: detecting whether the white string is included in the notification information; if the white string is included, not recording the corresponding notification information; if the white string is not included, further determining whether the content length of the notification information is 0; If the content length is not 0, the frequency of occurrence of the notification information popped up by the application is increased by 1.
  • the white string can be a string in the content of the normal system notification information, for example, downloading, installation success, and the like.
  • the corresponding notification information is not recorded, that is, the text information in the notification column is not obtained, and the notification information may be a picture or the like, if the content length of the notification information is not 0. Then, the frequency of occurrence of the notification information corresponding to the application is increased by one. Thereby, the frequency of occurrence of the notification information can be obtained, so as to determine whether the application pops up a malicious advertisement according to the frequency of occurrence of the notification information, so that the recognition effect is more accurate.
  • the stack name and the application name of the notification information acquired by the monitoring notification bar are determined, thereby determining whether the corresponding application pops up a malicious advertisement, specifically, determining the notification information.
  • the method further includes: determining whether the stack name of the notification information exists in the black stack list; if there is a black stack list, further Determining whether the application name of the notification information exists in the white signature list; and if there is no white signature list, it is determined that the application pops up the malicious advertisement.
  • the black stack may be a stack name of a program stack corresponding to an SDK (Software Development Kit) containing inappropriate content (eg, anti-government, obscene words, etc.), and the white signature list may include no pop-up notification information.
  • the frequency of occurrence of the notification information is determined.
  • the S203 is further included: adding the content of the notification information to the risk string library. Specifically, when it is determined that the appearance frequency of the notification information exceeds the threshold, the content of the notification information may be added to the risk string library. As a result, the coverage of the risk string library is expanded.
  • the method for identifying the malicious advertisement in the mobile terminal further includes: if the content of the notification information includes a malicious word, adding the stack name corresponding to the notification information To the black stack list. Specifically, determining, according to the preset condition, whether the content of the notification information corresponding to the application includes a malicious word, and if the malicious word is included, that is, including the bad content, determining that the application pops up the malicious advertisement, and the notification corresponding to the stack The name is added to the black stack list. Thereby, the black stack list is expanded, and the recognition efficiency is further improved.
  • the length of the stack name corresponding to the notification information added to the black stack list needs to exceed a preset length, and the stack name does not include a specific character string, for example, ijinshan, tencent, etc., if the notification If the stack name corresponding to the information contains a specific string, the stack name is not a black stack, that is, the corresponding application cannot be judged to pop up a malicious advertisement. Thereby, the reliability of the black stack list is guaranteed.
  • FIG. 3 is a flow chart of a method for identifying a malicious advertisement in a mobile terminal according to still another embodiment of the present invention. If it is determined that the application pops up a malicious advertisement, the application and/or the corresponding malicious advertisement is sent to the cloud server. Specifically, as shown in FIG. 3, the method for identifying a malicious advertisement in a mobile terminal includes the following steps.
  • the network connection can be 2G (Second Generation, 2G Ord-Generation, 3rd generation mobile communication technology), WiFi (wireless fidelity, wireless compatibility certification), WiMax (Worldwide Interoperability for Microwave) Access, global microwave mutual ear access) and so on.
  • 2G Second Generation, 2G Ord-Generation, 3rd generation mobile communication technology
  • WiFi wireless fidelity, wireless compatibility certification
  • WiMax Worldwide Interoperability for Microwave
  • the present invention also provides an apparatus for identifying a malicious advertisement in a mobile terminal.
  • 4 is a structural block diagram of an apparatus for identifying a malicious advertisement in a mobile terminal according to an embodiment of the present invention. As shown in FIG. 4, the device for identifying a malicious advertisement in a mobile terminal includes: an obtaining module 10, a monitoring module 20, and a determining module 30.
  • the obtaining module 10 is configured to acquire an application running in the mobile terminal.
  • the mobile terminal may be a hardware device having various operating systems, such as a mobile phone, a tablet computer, a personal digital assistant, an e-book, etc., and may run an application and also have a network connection function.
  • the monitoring module 20 is configured to monitor a notification bar of the mobile terminal to determine notification information corresponding to the application.
  • the notification information may include an application's md5 value, a digital signature md5 value, a name, a package name, a stack name, an information content, and the like.
  • the determining module 30 is configured to determine whether the application pops up a malicious advertisement according to the frequency of occurrence of the notification information and/or the content of the notification information. More specifically, the determination module 30 can determine whether the application pops up a malicious advertisement based on the frequency of occurrence of the notification information and the content of the notification information. Thus, an accuracy rate is provided in which the recognition application pops up a malicious advertisement. It should be understood that the determining module 30 may also select the frequency of occurrence of the notification information or the content of the notification information to determine whether the application pops up a malicious advertisement, wherein determining whether the application pops up a malicious advertisement according to the frequency of occurrence of the notification information and the content of the notification information will be followed. As described in detail in the embodiment, determining whether the application pops up a malicious advertisement according to the frequency of occurrence of the notification information or the content of the notification information can be understood according to the subsequent embodiments.
  • the device for identifying a malicious advertisement in the mobile terminal may monitor the notification bar of the mobile terminal by the monitoring module to determine notification information corresponding to the application, and the determining module determines the frequency of occurrence of the notification information and/or the content of the notification information. Whether the application pops up a malicious advertisement can accurately identify an application that can pop up a malicious advertisement, effectively compensates for the deficiency of judging the malicious advertisement by extracting the code feature matching technology, and improves the recognition efficiency of the malicious advertisement.
  • the determining module 30 is specifically configured to: determine whether the frequency of occurrence of the notification information exceeds a threshold, and determine that the application pops up a malicious advertisement when the frequency of occurrence of the notification information exceeds a threshold, and in the notification information When the appearance frequency does not exceed the threshold, it is further determined whether the content of the notification information satisfies the preset condition, and when the content of the notification information satisfies the preset condition, it is determined that the application pops up the malicious advertisement.
  • the threshold may be set by the system by default, or may be set by the mobile terminal user.
  • the threshold is 5, and the preset condition may include: the content of the notification information includes a malicious word, the notification information cannot be cleared, and the notification is The information does not have a push source or the notification information content includes a risk string, etc.
  • the content of the notification information may be determined according to the malicious vocabulary to include a malicious word, and the notification information may be determined according to the mark or attribute of the notification information, according to the notification.
  • the risk string can be a pop-up notification message frequently and the content of the notification message contains malicious words, filtering out the string obtained after the normal string such as downloading and installing successfully. Thereby, the accuracy of the recognition result is improved.
  • the determining module 30 is further configured to obtain the content information of the notification information, and obtain a preset number of characters in the content information, and further determine whether the preset number of characters includes the name of the corresponding application, and When the name of the corresponding application is not included, it is determined that the notification information does not have a push source.
  • the preset number is 120, and 120 characters are obtained from the content information, and it is determined whether the 120 characters include the name of the corresponding application. If not, the determining module 30 may determine that the corresponding notification information does not have the push. The source, thereby determining that the application corresponding to the notification information without the push source will pop up a malicious advertisement, making the recognition result more accurate.
  • the determining module 30 is further configured to: before determining whether the frequency of occurrence of the notification information exceeds a threshold, detecting whether the white string is included in the notification information, and not including when the white string is included Corresponding notification information, and when the white character string is not included, further determines whether the content length of the notification information is 0, and when the content length is not 0, increases the appearance frequency of the notification information popped up by the application by one.
  • the white string can be a string in the content of the normal system notification information, for example, downloading, installation success, and the like.
  • the determining module 30 does not record the corresponding notification information, that is, the text information in the notification column is not obtained, and the notification information may be a picture or the like, if the content length of the notification information When it is not 0, the determination module 30 increases the frequency of occurrence of the notification information corresponding to the application by one. Thereby, the frequency of occurrence of the notification information can be obtained, so as to determine whether the application pops up a malicious advertisement according to the frequency of occurrence of the notification information, so that the recognition effect is more accurate.
  • the determining module 30 is further configured to: after determining that the frequency of occurrence of the notification information exceeds a threshold and/or determining that the preset condition is met, determining whether the stack name of the notification information exists in the black stack list, and When there is a black stack list, it is further determined whether the application name of the notification information exists in the white signature list, and when the white signature list does not exist, it is determined that the application pops up the malicious advertisement.
  • the black stack may be a stack name of a program stack corresponding to an advertisement SDK containing inappropriate content (for example, anti-government, obscene words, etc.), and the white signature list may include an application name without pop-up notification information, and pop-up normal notification information. Application name, etc. Thereby, the accuracy of the recognition result is further improved.
  • the determining module 30 is further configured to: add the content of the notification information to the risk string library after determining that the frequency of occurrence of the notification information exceeds a threshold. Specifically, when it is determined that the frequency of occurrence of the notification information exceeds a threshold, the determining module 30 may add the content of the notification information to the risk string library. As a result, the coverage of the risk string is expanded.
  • the determining module 30 is further configured to: when the malicious word is included in the content of the notification information, add the stack name corresponding to the notification information to the black stack list. Specifically, it is determined whether the content of the notification information corresponding to the application includes a malicious word according to the preset condition. If the malicious word is included, that is, the bad content is included, the determining module 30 may determine that the application pops up the malicious advertisement, and the notification information is corresponding. The stack name is added to the black stack list. Thereby, the black stack list is expanded, and the recognition efficiency is further improved.
  • the length of the stack name corresponding to the notification information added to the black stack list needs to exceed a preset length, and the stack name does not include a specific character string, for example, ijinshan, tencent, etc., if the notification If the stack name corresponding to the information contains a specific string, the stack name is not a black stack, that is, the corresponding application cannot be judged to pop up a malicious advertisement. Thereby, the reliability of the black stack list is guaranteed.
  • FIG. 5 is a structural block diagram of an apparatus for identifying a malicious advertisement in a mobile terminal according to another embodiment of the present invention.
  • the device for identifying a malicious advertisement in the mobile terminal includes: an obtaining module 10, a monitoring module 20, a determining module 30, and a sending module 40.
  • the sending module 40 is configured to send the application and/or the corresponding malicious advertisement to the cloud server when determining that the application pops up the malicious advertisement. More specifically, after determining that the application pops up the malicious advertisement, the sending module 40 may send one or more of the application, the corresponding malicious advertisement, the corresponding notification information, and the like to the cloud server through the network connection, so that the cloud server Get application information that can pop up malicious ads.
  • the network connection can be 2G, 3G, WiFi, WiMax and so on.
  • the device for identifying a malicious advertisement in the mobile terminal may use the sending module to determine one or more of an application, a corresponding malicious advertisement, a corresponding notification information, and the like after determining that the application pops up the malicious advertisement.
  • Sending to the cloud server so that the cloud server obtains the application information that can pop up the malicious advertisement.
  • the cloud server can send a reminder message to the corresponding mobile terminal to remind the user that the promotion is improved. user experience.
  • the present invention also proposes a mobile terminal.
  • a mobile terminal comprising: a casing, a processor and a circuit board; the circuit board is disposed inside the space enclosed by the casing, and the processor is disposed on the circuit board; the processor is configured to:
  • the application is run, and the notification information corresponding to the application is monitored by monitoring the notification bar of the mobile terminal, and whether the application pops up a malicious advertisement according to the frequency of occurrence of the notification information and/or the content of the notification information.
  • the mobile terminal may be a hardware device with various operating systems, such as a mobile phone, a tablet computer, a personal digital assistant, an e-book, etc., and may run an application and also have a network connection function, and the notification information may include an md5 value of the application, Digital signature md5 value, name, package name, stack name, information content, etc.
  • whether the application pops up a malicious advertisement can be determined according to the frequency of occurrence of the notification information and the content of the notification information.
  • an accuracy rate is provided in which the recognition application pops up a malicious advertisement.
  • the frequency of occurrence of the notification information or the content of the notification information may be selected to determine whether the application pops up a malicious advertisement, wherein determining whether the application pops up a malicious advertisement according to the frequency of occurrence of the notification information and the content of the notification information will be in a subsequent embodiment.
  • determining whether the application pops up a malicious advertisement according to the frequency of occurrence of the notification information or the content of the notification information can be understood according to the subsequent embodiments.
  • a mobile terminal detects a notification corresponding to an application by monitoring a notification bar of the mobile terminal.
  • the information, and determining whether the application pops up a malicious advertisement according to the frequency of occurrence of the notification information and/or the content of the notification information, can accurately identify the application that can pop up the malicious advertisement, effectively compensates for the malicious advertisement by extracting the code feature matching technology.
  • the lack of efficiency has improved the recognition efficiency of malicious advertisements.
  • the processor is further configured to: determine whether the frequency of occurrence of the notification information exceeds a threshold, and when the frequency of occurrence of the notification information exceeds a threshold, determine that the application pops up the malicious advertisement, and in the notification information When the frequency of occurrence does not exceed the threshold, it is further determined whether the content of the notification information satisfies the preset condition, and when the preset condition is met, it is determined that the application pops up the malicious advertisement.
  • the threshold may be set by default of the system, or may be set by the mobile terminal user.
  • the threshold is 5, and the preset condition may include: the content of the notification information includes a malicious word, the notification information cannot be cleared, and the notification The information does not have a push source or the notification information content includes a risk string or the like.
  • the content of the notification information may be determined according to the malicious vocabulary, whether the content of the notification information includes a malicious word, and whether the notification information can be cleared according to the mark or attribute of the notification information, according to the notification Whether the content of the information includes the corresponding application name to determine whether the notification information has a push source, and according to the risk string, whether the content of the notification information includes a risk string, and the malicious word may include words of bad content, for example, anti-government, obscenity Words, etc.
  • the risk string can be a pop-up notification message frequently and the content of the notification message contains malicious words, filtering out the string obtained after the normal string such as downloading and installing successfully. Thereby, the accuracy of the recognition result is improved.
  • the processor is further configured to: acquire content information of the notification information, and obtain a preset number of the content information. Characters, and further determining whether the preset number of characters includes the name of the corresponding application, and determining that the notification information does not have a push source when the name of the corresponding application is not included.
  • the preset number is 120, and 120 characters are obtained from the content information, and it is determined whether the 120 characters include the name of the corresponding application. If not, the processor may determine that the corresponding notification information does not have a push source. Therefore, the application corresponding to the notification information that does not have the push source may pop up a malicious advertisement, so that the recognition result is more accurate.
  • the processor is further configured to: before determining whether the frequency of occurrence of the notification information exceeds a threshold, detecting whether the white string is included in the notification information, and not including the white string when the white string is included.
  • the notification information, and when the white string is not included further determines whether the content length of the notification information is 0, and when the content length is not 0, increases the frequency of occurrence of the notification information popped up by the application by one.
  • the white string can be a string in the content of the normal system notification information, for example, downloading, installation success, and the like.
  • the corresponding notification information is not recorded, that is, the text information in the notification column is not obtained, and the notification information may be a picture or the like, if the content length of the notification information is not 0. Then, the frequency of occurrence of the notification information corresponding to the application is increased by one. Thereby, the frequency of occurrence of the notification information can be obtained, so as to determine whether the application pops up a malicious advertisement according to the frequency of occurrence of the notification information, so that the recognition effect is more accurate.
  • the processor is further configured to: determine that the frequency of occurrence of the notification information exceeds a threshold and After determining whether the preset condition is met, it is determined whether the stack name of the notification information exists in the black stack list, and when there is a black stack list, further determining whether the application name of the notification information exists in the white signature list, and does not exist When white signing the list, make sure the app pops up a malicious ad.
  • the black stack may be a stack name of a program stack corresponding to an advertisement SDK containing inappropriate content (for example, anti-government, obscene words, etc.), and the white signature list may include an application name without pop-up notification information, and pop-up normal notification information. Application name, etc. Thereby, the accuracy of the recognition result is further improved.
  • the processor is further configured to: add the content of the notification information to the risk string library after determining that the frequency of occurrence of the notification information exceeds a threshold. Specifically, when it is judged that the appearance frequency of the notification information exceeds the threshold, the content of the notification information may be added to the risk string library. As a result, the coverage of the risk string is expanded.
  • the processor is further configured to: when the malicious word is included in the content of the notification information, add the stack name corresponding to the notification information to the black stack list. Specifically, determining, according to the preset condition, whether the content of the notification information corresponding to the application includes a malicious word, and if the malicious word is included, that is, including the bad content, the processor may determine that the application pops up the malicious advertisement, and the notification information corresponds to The stack name is added to the black stack list. As a result, the black stack list is expanded, further improving the recognition efficiency.
  • the length of the stack name corresponding to the notification information added to the black stack list needs to exceed a preset length, and the stack name does not include a specific character string, for example, ijinshan, tencent, etc., if the notification If the stack name corresponding to the information contains a specific string, the stack name is not a black stack, that is, the corresponding application cannot be judged to pop up a malicious advertisement. Thereby, the reliability of the black stack list is guaranteed.
  • the processor is further configured to: send the application and/or the corresponding malicious advertisement to the cloud server when determining that the application pops up the malicious advertisement.
  • the processor may send one or more of the application, the corresponding malicious advertisement, the corresponding notification information, and the like to the cloud server through the network connection, so that the cloud server obtains the Pop up the app information for malicious ads.
  • the network connection can be 2G, 3G, WiFi, WiMax and so on. Therefore, when the user downloads and installs the application that can pop up the malicious advertisement, the cloud server can send an alert message to the corresponding mobile terminal to remind the user, which improves the user experience.
  • the present invention provides a storage medium for storing an application for executing a method for identifying a malicious advertisement in a mobile terminal according to any of the embodiments of the present invention.
  • portions of the invention may be implemented in hardware, software, firmware or a combination thereof.
  • multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
  • a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
  • sequence numbers of the steps are not used to limit the sequence of the steps.
  • the steps of the steps are changed without any creative work. It is also within the scope of the invention.

Abstract

本发明提供一种移动终端中恶意广告的识别方法、装置、移动终端和存储介质。所述方法包括以下步骤:获取移动终端中运行的应用程序;监控移动终端的通知栏以确定应用程序对应的通知信息;以及根据通知信息的出现频次和/或通知信息的内容确定应用程序是否弹出恶意广告。本发明实施例的方法通过监控移动终端的通知栏以确定应用程序对应的通知信息,并根据通知信息的出现频次和/或通知信息的内容确定应用程序是否弹出恶意广告,能够准确地识别出可弹出恶意广告的应用程序,有效地弥补了通过提取代码特征匹配技术判断恶意广告的不足,提高了恶意广告的识别效率。

Description

移动终端中恶意广告的识别方法、 装置和移动终端
技术领域
本发明涉及移动安全技术领域, 特别是指一种移动终端中恶意广告的识别方法、装置和 移动终端。 背景技术
随着移动互联网的快速发展和移动终端的逐步普及, 移动终端的病毒也日益猖狂。 而恶 意广告在目前移动终端的操作系统的恶意软件行为中占一大部分,通常会导致流失用户的大 量流量并干扰用户正常使用。
目前, 移动终端中恶意软件的识别方法通常首先将其反编译成明文代码, 然后通过提取 代码特征判断其是否具有恶意行为。
经过对现有技术的分析, 发明人发现现有技术中至少存在以下问题: 恶意软件识别效率 低, 并且随着恶意广告的代码混淆对抗, 病毒制作者对软件程序进行加密, 以使得软件程序 反编译出来全是乱码, 无法识别恶意行为, 从而使得提取代码特征匹配技术在识别这类恶意 广告的时候显得有些乏力。 发明内容
本发明旨在至少解决上述技术问题之一。
为此, 本发明的第一个目的在于提出一种移动终端中恶意广告的识别方法。 该方法能够 准确地识别出可弹出恶意广告的应用程序,有效地弥补了通过提取代码特征匹配技术判断恶 意广告的不足, 提高了恶意广告的识别效率。
本发明的第二个目的在于提出一种移动终端中恶意广告的识别装置。
本发明的第三个目的在于提出一种移动终端。
本发明的第四个目的在于提出一种存储介质。
为了实现上述目的,本发明第一方面实施例的移动终端中恶意广告的识别方法包括以下 步骤: 获取移动终端中运行的应用程序; 监控所述移动终端的通知栏以确定所述应用程序对 应的通知信息; 以及根据所述通知信息的出现频次和 /或所述通知信息的内容确定所述应用 程序是否弹出恶意广告。
根据本发明实施例的移动终端中恶意广告的识别方法,通过监控移动终端的通知栏以确 定应用程序对应的通知信息, 并根据通知信息的出现频次和 /或通知信息的内容确定应用程 序是否弹出恶意广告, 能够准确地识别出可弹出恶意广告的应用程序, 有效地弥补了通过提 取代码特征匹配技术判断恶意广告的不足, 提高了恶意广告的识别效率。
为了实现上述目的, 本发明第二方面实施例的移动终端中恶意广告的识别装置, 包括: 获取模块, 用于获取移动终端中运行的应用程序; 监控模块, 用于监控所述移动终端的通知 栏以确定所述应用程序对应的通知信息; 以及确定模块, 用于根据所述通知信息的出现频次 和 /或所述通知信息的内容确定所述应用程序是否弹出恶意广告。
根据本发明实施例的移动终端中恶意广告的识别装置,可通过监控模块监控移动终端的 通知栏以确定应用程序对应的通知信息, 确定模块根据通知信息的出现频次和 /或通知信息 的内容确定应用程序是否弹出恶意广告, 能够准确地识别出可弹出恶意广告的应用程序, 有 效地弥补了通过提取代码特征匹配技术判断恶意广告的不足, 提高了恶意广告的识别效率。
为了实现上述目的, 本发明第三方面实施例的移动终端, 包括: 外壳, 处理器和电路板; 所述电路板安置在所述外壳围成的空间内部, 所述处理器设置在所述电路板上; 所述处理器 用于运行应用程序; 通过监控所述移动终端的通知栏以确定所述应用程序对应的通知信息; 以及根据所述通知信息的出现频次和 /或所述通知信息的内容确定所述应用程序是否弹出恶 意广告
根据本发明实施例的移动终端,通过监控移动终端的通知栏以确定应用程序对应的通知 信息, 并根据通知信息的出现频次和 /或通知信息的内容确定应用程序是否弹出恶意广告, 能够准确地识别出可弹出恶意广告的应用程序,有效地弥补了通过提取代码特征匹配技术判 断恶意广告的不足, 提高了恶意广告的识别效率。
为了实现上述目的, 本发明第四方面实施例的存储介质, 用于存储应用程序, 所述应用 程序用于执行本发明第一方面实施例所述的移动终端中恶意广告的识别方法。
本发明附加的方面和优点将在下面的描述中部分给出, 部分将从下面的描述中变得明 显, 或通过本发明的实践了解到。 附图说明
本发明上述的和 /或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和 容易理解, 其中,
图 1是根据本发明一个实施例的移动终端中恶意广告的识别方法的流程图;
图 2是根据本发明另一个实施例的移动终端中恶意广告的识别方法的流程图; 图 3是根据本发明又一个实施例的移动终端中恶意广告的识别方法的流程图; 图 4是根据本发明一个实施例的移动终端中恶意广告的识别装置的结构框图; 图 5是根据本发明另一个实施例的移动终端中恶意广告的识别装置的结构框图。 具体实施方式
下面详细描述本发明的实施例, 所述实施例的示例在附图中示出, 其中自始至终相同或 类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的 实施例是示例性的, 仅用于解释本发明, 而不能理解为对本发明的限制。 相反, 本发明的实 施例包括落入所附加权利要求书的精神和内涵范围内的所有变化、 修改和等同物。
在本发明的描述中, 需要理解的是, 术语 "第一 "第二"等仅用于描述目的, 而不能 理解为指示或暗示相对重要性。 在本发明的描述中, 需要说明的是, 除非另有明确的规定和 限定, 术语 "相连"、 "连接"应做广义理解, 例如, 可以是固定连接, 也可以是可拆卸连 接, 或一体地连接; 可以是机械连接, 也可以是电连接; 可以是直接相连, 也可以通过中间 媒介间接相连。对于本领域的普通技术人员而言, 可以具体情况理解上述术语在本发明中的 具体含义。 此外, 在本发明的描述中, 除非另有说明, "多个" 的含义是两个或两个以上。
流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或 更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分, 并且 本发明的优选实施方式的范围包括另外的实现, 其中可以不按所示出或讨论的顺序, 包括根 据所涉及的功能按基本同时的方式或按相反的顺序, 来执行功能, 这应被本发明的实施例所 属技术领域的技术人员所理解。
下面参考附图描述根据本发明实施例的移动终端中恶意广告的识别方法、装置和移动终 为了解决目前通过提取代码特征匹配技术无法识别被加密过的恶意软件程序中的恶意 广告的问题, 同时解决目前移动终端中恶意广告的识别方法效率低的问题, 本发明提出一种 移动终端中恶意广告的识别方法、 装置和移动终端。
图 1是根据本发明一个实施例的移动终端中恶意广告的识别方法的流程图。如图 1所示, 移动终端中恶意广告的识别方法包括以下步骤。
5101 , 获取移动终端中运行的应用程序。
在本发明的一个实施例中, 移动终端可以是手机、 平板电脑、 个人数字助理、 电子书等 具有各种操作系统的硬件设备, 并且可以运行应用程序, 也具有网络连接的功能。
5102, 监控移动终端的通知栏以确定应用程序对应的通知信息。
其中, 通知信息可包括应用程序的 md5值 (Message Digest Algorithm 5, 信息摘要值)、 数字签名 md5值、 名称、 包名、 栈名、 信息内容等。
5103 , 根据通知信息的出现频次和 /或通知信息的内容确定应用程序是否弹出恶意广告。 具体地, 可根据通知信息的出现频次和通知信息的内容确定应用程序是否弹出恶意广 告。 由此, 提高了识别应用程序会弹出恶意广告的准确率。 应当理解, 还可以选择通知信息 的出现频次或者通知信息的内容确定应用程序是否弹出恶意广告, 其中, 根据通知信息的出 现频次和通知信息的内容确定应用程序是否弹出恶意广告将在后续的实施例中详细叙述,根 据通知信息的出现频次或者通知信息的内容确定应用程序是否弹出恶意广告可以根据后续 的实施例对应进行理解。
根据本发明实施例的移动终端中恶意广告的识别方法,通过监控移动终端的通知栏以确 定应用程序对应的通知信息, 并根据通知信息的出现频次和 /或通知信息的内容确定应用程 序是否弹出恶意广告, 能够准确地识别出可弹出恶意广告的应用程序, 有效地弥补了通过提 取代码特征匹配技术判断恶意广告的不足, 提高了恶意广告的识别效率。
图 2是根据本发明另一个实施例的移动终端中恶意广告的识别方法的流程图。如果通知 信息的内容满足预设条件, 或者通知信息的出现频次超过阀值, 则确定应用程序弹出恶意广 告。 具体地, 如图 2所示, 移动终端中恶意广告的识别方法包括以下步骤。
5201 , 获取移动终端中运行的应用程序。
5202, 监控移动终端的通知栏以确定应用程序对应的通知信息。
5203, 判断通知信息的出现频次是否超过阈值, 如果通知信息的出现频次超过阀值, 则 继续执行 S205。
其中, 阀值可以为系统默认设定的, 也可以为移动终端用户自己设定的。 例如, 阈值为 5, 通知信息的出现频次大于 5, 则认为对应的应用程序频繁的骚扰用户, 可确定该应用程 序弹出的通知信息为恶意广告。
5204, 如果通知信息的出现频次未超过阈值, 则进一步判断通知信息的内容是否满足预 设条件。
在本发明的一个实施例中, 预设条件可包括: 通知信息的内容包含恶意词、 通知信息不 可清除、通知信息不具有推送来源或通知信息的内容包含风险字符串等。 具体地, 可根据恶 意词库判断通知信息的内容是否包含恶意词,根据通知信息的标记或属性判断该通知信息是 否可清除,根据通知信息的内容中是否包含对应的应用程序名称判断该通知信息是否具有推 送来源, 根据风险字符串库判断通知信息的内容是否包含风险字符串, 其中, 恶意词可包括 不良内容的词, 例如, 反政府、 淫秽词语等, 风险字符串可为频繁弹出通知信息且通知信息 的内容包含恶意词, 过滤掉正在下载、 安装成功等正常字符串后得到的字符串。
在本发明的一个实施例中, 判断通知信息不具有推送来源具体包括: 获取通知信息的内 容信息; 获取内容信息中预设个数的字符; 判断预设个数的字符中是否包括对应的应用程序 的名称; 以及如果不包括, 则确定通知信息不具有推送来源。 例如, 预设个数为 120, 从内 容信息中获取 120个字符, 判断该 120个字符中是否包括对应的应用程序的名称, 如果不包 括, 则可确定对应的通知信息不具有推送来源, 从而确定不具有推送来源的通知信息对应的 应用程序会弹出恶意广告, 使得识别结果更加地准确。
S205, 如果满足预设条件, 则确定应用程序弹出恶意广告。
具体地, 如果通知信息的内容满足预设条件, 则可确定对应的应用程序弹出恶意广告。 例如, 如果根据恶意词库判断通知信息的内容包含恶意词、根据通知信息的标记或属性判断 该通知信息不可清除、根据通知信息的内容中不包含对应的应用程序名称判断该通知信息不 具有推送来源或根据风险字符串库判断通知信息的内容包含风险字符串,则可确定对应的应 用程序会弹出恶意广告。
根据本发明实施例的移动终端中恶意广告的识别方法,如果通知信息的内容满足预设条 件, 或者通知信息的出现频次超过阀值, 则可确定对应的应用程序会弹出恶意广告, 提高了 准确率。
在本发明的一个实施例中, 为了提高准确性, 对监控通知栏获取的通知信息首选需要筛 选, 并记录符合条件的通知信息, 具体地, 在判断通知信息的出现频次是否超过阀值之前即 S203 之前还包括: 检测通知信息中是否包括白字符串; 如果包括白字符串, 则不记录对应 的通知信息; 如果不包括白字符串, 则进一步判断通知信息的内容长度是否为 0; 以及如果 内容长度不为 0, 则将应用程序弹出的通知信息的出现频次增加 1。
其中, 白字符串可以为正常系统通知信息的内容中的字符串, 例如, 正在下载、 安装成 功等。
具体地, 如果通知信息的内容长度为 0时, 则不记录对应的通知信息, 即没有获取到通 知栏中的文字信息, 此时通知信息可能为图片等, 如果通知信息的内容长度不为 0时, 则将 应用程序对应的通知信息的出现频次增加 1。 由此, 可获得通知信息的出现频次, 以便根据 通知信息的出现频次确定应用程序是否弹出恶意广告, 使得识别效果更加精确。
在本发明一个实施例中, 为了进一步提高准确率, 对监控通知栏获取的通知信息的栈名 和应用程序名称进行判断, 从而确定对应的应用程序是否弹出恶意广告, 具体地, 在判断通 知信息的出现次数超过阀值和 /或判断通知信息的内容满足预设条件之后即 S203和 /或 S205 之后还包括: 判断通知信息的栈名是否存在黑栈列表中; 如果存在黑栈列表中, 则进一步判 断通知信息的应用程序名称是否存在白签名名单中; 以及如果不存在白签名名单中, 则确定 应用程序弹出恶意广告。 其中, 黑栈可以为弹出过包含不良内容(例如, 反政府、 淫秽词语 等)广告 SDK ( Software Development Kit, 软件开发工具包)对应的程序栈的栈名, 白签名 名单可包括无弹出通知信息的应用程序名称、弹出正常的通知信息的应用程序名称等。由此, 进一步提高了识别结果的准确率。
在本发明的一个实施例中, 为了扩大风险字符串库的覆盖面, 在判断通知信息的出现频 次超过阀值之后即 S203之后还包括: 将通知信息的内容添加至风险字符串库中。 具体地, 当判断通知信息的出现频次超过阀值时, 可以将通知信息的内容添加至风险字符串库中。 由 此, 扩大了风险字符串库的覆盖面。
在本发明的一个实施例中, 为了扩大黑栈列表, 进一步提高识别效率, 移动终端中恶意 广告的识别方法还包括: 如果通知信息的内容中包括恶意词, 则将通知信息对应的栈名添加 至黑栈列表中。具体地, 根据预设条件判断应用程序对应的通知信息的内容中是否包括恶意 词, 如果包括恶意词, 即包括不良内容, 则可确定该应用程序弹出恶意广告, 并将此通知信 息对应的栈名添加至黑栈列表中。 由此, 扩大了黑栈列表, 进一步提高了识别效率。
在本发明的另一个实施例中,添加至黑栈列表中的通知信息对应的栈名长度需超过预设 长度, 并且该栈名中不包含特定字符串, 例如, ijinshan、 tencent等, 如果通知信息对应的 栈名包含特定字符串,则该栈名不是黑栈,即不能判断对应的应用程序弹出恶意广告。由此, 保证了黑栈列表的可靠性。
图 3是根据本发明又一个实施例的移动终端中恶意广告的识别方法的流程图。如果确定 应用程序弹出恶意广告, 则将应用程序和 /或对应的恶意广告发送至云端服务器。 具体地, 如图 3所示, 移动终端中恶意广告的识别方法包括以下步骤。
5301 , 获取移动终端中运行的应用程序。
5302, 监控移动终端的通知栏以确定应用程序对应的通知信息。
5303 , 判断通知信息的出现频次是否超过阈值, 如果通知信息的出现频次超过阀值, 则 继续执行 S305。
5304, 如果通知信息的出现频次未超过阈值, 则进一步判断通知信息的内容是否满足预 设条件。
5305, 如果满足预设条件, 则确定应用程序弹出恶意广告。
5306, 将应用程序和 /或对应的恶意广告发送至云端服务器。
具体地, 在确定应用程序弹出恶意广告之后, 可将应用程序、 对应的恶意广告、 对应的 通知信息等中的一种或多种通过网络连接发送至云端服务器, 以使得云端服务器获取可弹出 恶意广告的应用程序信息。 其中, 网络连接可为 2G ( Second Generation, 第二代移动通信技 术)、 3G Ord-Generation, 第三代移动通信技术)、 WiFi (wireless fidelity, 无线相容性认证)、 WiMax (Worldwide Interoperability for Microwave Access, 全球微波互耳关接入) 等。
根据本发明实施例的移动终端中恶意广告的识别方法, 如果确定应用程序弹出恶意广 告,则将应用程序、对应的恶意广告、对应的通知信息等中的一种或多种发送至云端服务器, 以使得云端服务器获取可弹出恶意广告的应用程序信息,当用户下载安装此可弹出恶意广告 的应用程序时,云端服务器可向对应的移动终端发送提醒消息以提醒用户,提升了用户体验。 为了实现上述实施例, 本发明还提出一种移动终端中恶意广告的识别装置。 图 4是根据本发明一个实施例的移动终端中恶意广告的识别装置的结构框图。如图 4所 示, 移动终端中恶意广告的识别装置包括: 获取模块 10、 监控模块 20和确定模块 30。
具体地, 获取模块 10用于获取移动终端中运行的应用程序。 在本发明的一个实施例中, 移动终端可以是手机、 平板电脑、 个人数字助理、 电子书等具有各种操作系统的硬件设备, 并且可以运行应用程序, 也具有网络连接的功能。
监控模块 20用于监控移动终端的通知栏以确定应用程序对应的通知信息。 其中, 通知 信息可包括应用程序的 md5值、 数字签名 md5值、 名称、 包名、 栈名、 信息内容等。
确定模块 30用于根据通知信息的出现频次和 /或通知信息的内容确定应用程序是否弹出 恶意广告。 更具体地, 确定模块 30可根据通知信息的出现频次和通知信息的内容确定应用 程序是否弹出恶意广告。 由此, 提供了识别应用程序会弹出恶意广告的准确率。 应当理解, 确定模块 30还可以选择通知信息的出现频次或者通知信息的内容确定应用程序是否弹出恶 意广告, 其中, 根据通知信息的出现频次和通知信息的内容确定应用程序是否弹出恶意广告 将在后续的实施例中详细叙述,根据通知信息的出现频次或者通知信息的内容确定应用程序 是否弹出恶意广告可以根据后续的实施例对应进行理解。
根据本发明实施例的移动终端中恶意广告的识别装置,可通过监控模块监控移动终端的 通知栏以确定应用程序对应的通知信息, 确定模块根据通知信息的出现频次和 /或通知信息 的内容确定应用程序是否弹出恶意广告, 能够准确地识别出可弹出恶意广告的应用程序, 有 效地弥补了通过提取代码特征匹配技术判断恶意广告的不足, 提高了恶意广告的识别效率。
在本发明的一个实施例中, 确定模块 30具体用于: 判断通知信息的出现频次是否超过 阀值, 并在通知信息的出现频次超过阀值时, 确定应用程序弹出恶意广告, 并在通知信息的 出现频次未超过阀值时, 进一步判断通知信息的内容是否满足预设条件, 以及在通知信息的 内容满足预设条件时, 确定应用程序弹出恶意广告。 其中, 阀值可以为系统默认设定的, 也 可以为移动终端用户自己设定的, 例如, 阀值为 5, 预设条件可包括: 通知信息的内容包括 恶意词、 通知信息不可清除、 通知信息不具有推送来源或通知信息内容包含风险字符串等, 具体地, 可根据恶意词库判断通知信息的内容是否包含恶意词, 根据通知信息的标记或属性 判断该通知信息是否可清除,根据通知信息的内容中是否包含对应的应用程序名称判断该通 知信息是否具有推送来源, 根据风险字符串判断通知信息的内容是否包含风险字符串, 恶意 词可包括不良内容的词, 例如, 反政府、 淫秽词语等, 风险字符串可为频繁弹出通知信息且 通知信息的内容包含恶意词, 过滤掉正在下载、 安装成功等正常字符串后得到的字符串。 由 此, 提高了识别结果的准确率。
为了使得识别结果更加地准确, 需判断通知信息是否具有推送来源, 在本发明的一个实 施例中, 确定模块 30还具体用于获取通知信息的内容信息, 并获取内容信息中预设个数的 字符, 并进一步判断预设个数的字符中是否包括对应的应用程序的名称, 以及在不包括对应 的应用程序的名称时, 确定通知信息不具有推送来源。 例如, 预设个数为 120, 从内容信息 中获取 120个字符, 判断该 120个字符中是否包括对应的应用程序的名称, 如果不包括, 则 确定模块 30可确定对应的通知信息不具有推送来源, 从而确定不具有推送来源的通知信息 对应的应用程序会弹出恶意广告, 使得识别结果更加地准确。
在本发明的一个实施例中, 确定模块 30还具体用于: 在判断通知信息的出现频次是否 超过阀值之前, 检测通知信息中是否包括白字符串, 并在包括白字符串时, 不记录对应的通 知信息, 并在不包括白字符串时, 进一步判断通知信息的内容长度是否为 0, 以及在内容长 度不为 0时, 将应用程序弹出的通知信息的出现频次增加 1。 其中, 白字符串可以为正常系 统通知信息的内容中的字符串, 例如, 正在下载、 安装成功等。
具体地, 如果通知信息的内容长度为 0时, 则确定模块 30不记录对应的通知信息, 即 没有获取到通知栏中的文字信息, 此时通知信息可能为图片等, 如果通知信息的内容长度不 为 0时, 则确定模块 30将应用程序对应的通知信息的出现频次增加 1。 由此, 可获得通知 信息的出现频次, 以便根据通知信息的出现频次确定应用程序是否弹出恶意广告, 使得识别 效果更加精确。
在本发明的一个实施例中, 确定模块 30还具体用于: 在判断通知信息的出现频次超过 阈值和 /或判断满足预设条件之后, 判断通知信息的栈名是否存在黑栈列表中, 并在存在黑 栈列表中时, 进一步判断通知信息的应用程序名称是否存在白签名名单中, 以及在不存在白 签名名单中时,确定应用程序弹出恶意广告。其中, 黑栈可以为弹出过包含不良内容(例如, 反政府、 淫秽词语等) 广告 SDK对应的程序栈的栈名, 白签名名单可包括无弹出通知信息 的应用程序名称、 弹出正常的通知信息的应用程序名称等。 由此, 进一步提高了识别结果的 准确率。
在本发明的一个实施例中, 确定模块 30还具体用于: 在判断通知信息的出现频次超过 阀值之后, 将通知信息的内容添加至风险字符串库中。 具体地, 当判断通知信息的出现频次 超过阀值时, 确定模块 30可将通知信息的内容添加至风险字符串库中。 由此, 扩大了风险 字符串的覆盖面。
在本发明的一个实施例中, 确定模块 30还具体用于: 在通知信息的内容中包括恶意词 时, 将通知信息对应的栈名添加至黑栈列表中。 具体地, 根据预设条件判断应用程序对应的 通知信息的内容中是否包括恶意词, 如果包括恶意词, 即包括不良内容, 确定模块 30可确 定该应用程序弹出恶意广告, 并将此通知信息对应的栈名添加至黑栈列表中。 由此, 扩大了 黑栈列表, 进一步提高了识别效率。 在本发明的另一个实施例中,添加至黑栈列表中的通知信息对应的栈名长度需超过预设 长度, 并且该栈名中不包含特定字符串, 例如, ijinshan、 tencent等, 如果通知信息对应的 栈名包含特定字符串,则该栈名不是黑栈,即不能判断对应的应用程序弹出恶意广告。由此, 保证了黑栈列表的可靠性。
图 5是根据本发明另一个实施例的移动终端中恶意广告的识别装置的结构框图。 如图 5 所示, 移动终端中恶意广告的识别装置包括: 获取模块 10、 监控模块 20、 确定模块 30和发 送模块 40。
具体地, 发送模块 40用于在确定应用程序弹出恶意广告时, 将应用程序和 /或对应的恶 意广告发送至云端服务器。 更具体地, 在确定应用程序弹出恶意广告之后, 发送模块 40可 将应用程序、对应的恶意广告、对应的通知信息等中的一种或多种通过网络连接发送至云端 服务器, 以使得云端服务器获取可弹出恶意广告的应用程序信息。 其中, 网络连接可为 2G、 3G、 WiFi、 WiMax等。
根据本发明实施例的移动终端中恶意广告的识别装置,可通过发送模块在确定应用程序 弹出恶意广告之后, 可将应用程序、 对应的恶意广告、对应的通知信息等中的一种或多种发 送至云端服务器, 以使得云端服务器获取可弹出恶意广告的应用程序信息, 当用户下载安装 此可弹出恶意广告的应用程序时, 云端服务器可向对应的移动终端发送提醒消息以提醒用 户, 提升了用户体验。
为了实现上述实施例, 本发明还提出一种移动终端。
一种移动终端, 包括: 外壳, 处理器和电路板; 电路板安置在外壳围成的空间内部, 处 理器设置在电路板上; 处理器用于:
运行应用程序, 并通过监控移动终端的通知栏以确定应用程序对应的通知信息, 以及根 据通知信息的出现频次和 /或通知信息的内容确定应用程序是否弹出恶意广告。 其中, 移动 终端可以是手机、 平板电脑、 个人数字助理、 电子书等具有各种操作系统的硬件设备, 并且 可以运行应用程序, 也具有网络连接的功能, 通知信息可包括应用程序的 md5值、 数字签 名 md5值、 名称、 包名、 栈名、 信息内容等。
具体地, 可根据通知信息的出现频次和通知信息的内容确定应用程序是否弹出恶意广 告。 由此, 提供了识别应用程序会弹出恶意广告的准确率。 应当理解, 还可以选择通知信息 的出现频次或者通知信息的内容确定应用程序是否弹出恶意广告, 其中, 根据通知信息的出 现频次和通知信息的内容确定应用程序是否弹出恶意广告将在后续的实施例中详细叙述,根 据通知信息的出现频次或者通知信息的内容确定应用程序是否弹出恶意广告可以根据后续 的实施例对应进行理解。
根据本发明实施例的移动终端,通过监控移动终端的通知栏以确定应用程序对应的通知 信息, 并根据通知信息的出现频次和 /或通知信息的内容确定应用程序是否弹出恶意广告, 能够准确地识别出可弹出恶意广告的应用程序,有效地弥补了通过提取代码特征匹配技术判 断恶意广告的不足, 提高了恶意广告的识别效率。
在本发明的一个实施例中,处理器还具体用于:判断通知信息的出现频次是否超过阀值, 并在通知信息的出现频次超过阈值时, 确定应用程序弹出恶意广告, 并在通知信息的出现频 次未超过阈值时, 进一步判断通知信息的内容是否满足预设条件, 以及在满足预设条件时, 确定应用程序弹出恶意广告。 其中, 阀值可以为系统默认设定的, 也可以为移动终端用户自 己设定的, 例如, 阀值为 5, 预设条件可包括: 通知信息的内容包括恶意词、 通知信息不可 清除、通知信息不具有推送来源或通知信息内容包含风险字符串等, 具体地, 可根据恶意词 库判断通知信息的内容是否包含恶意词,根据通知信息的标记或属性判断该通知信息是否可 清除,根据通知信息的内容中是否包含对应的应用程序名称判断该通知信息是否具有推送来 源,根据风险字符串判断通知信息的内容是否包含风险字符串,恶意词可包括不良内容的词, 例如, 反政府、 淫秽词语等, 风险字符串可为频繁弹出通知信息且通知信息的内容包含恶意 词, 过滤掉正在下载、 安装成功等正常字符串后得到的字符串。 由此, 提高了识别结果的准 确率。
为了使得识别结果更加地准确, 需判断通知信息是否具有推送来源, 在本发明的一个实 施例中,处理器还具体用于:获取通知信息的内容信息,并获取内容信息中预设个数的字符, 并进一步判断预设个数的字符中是否包括对应的应用程序的名称, 以及在不包括对应的应用 程序的名称时, 确定通知信息不具有推送来源。 例如, 预设个数为 120, 从内容信息中获取 120个字符, 判断该 120个字符中是否包括对应的应用程序的名称, 如果不包括, 则处理器 可确定对应的通知信息不具有推送来源,从而确定不具有推送来源的通知信息对应的应用程 序会弹出恶意广告, 使得识别结果更加地准确。
在本发明的一个实施例中, 处理器还具体用于: 在判断通知信息的出现频次是否超过阀 值之前,检测通知信息中是否包括白字符串,并在包括白字符串时,不记录对应的通知信息, 并在不包括白字符串时, 进一步判断通知信息的内容长度是否为 0, 以及在内容长度不为 0 时, 将应用程序弹出的通知信息的出现频次增加 1。 其中, 白字符串可以为正常系统通知信 息的内容中的字符串, 例如, 正在下载、 安装成功等。
具体地, 如果通知信息的内容长度为 0时, 则不记录对应的通知信息, 即没有获取到通 知栏中的文字信息, 此时通知信息可能为图片等, 如果通知信息的内容长度不为 0时, 则将 应用程序对应的通知信息的出现频次增加 1。 由此, 可获得通知信息的出现频次, 以便根据 通知信息的出现频次确定应用程序是否弹出恶意广告, 使得识别效果更加精确。
在本发明的一个实施例中, 处理器还具体用于: 在判断通知信息的出现频次超过阈值和 /或判断满足预设条件之后, 判断通知信息的栈名是否存在黑栈列表中, 并在存在黑栈列表 中时, 进一步判断通知信息的应用程序名称是否存在白签名名单中, 以及在不存在白签名名 单中时, 确定应用程序弹出恶意广告。 其中, 黑栈可以为弹出过包含不良内容(例如, 反政 府、 淫秽词语等) 广告 SDK对应的程序栈的栈名, 白签名名单可包括无弹出通知信息的应 用程序名称、 弹出正常的通知信息的应用程序名称等。 由此, 进一步提高了识别结果的准确 率。
在本发明的一个实施例中, 处理器还具体用于: 在判断通知信息的出现频次超过阀值之 后, 将通知信息的内容添加至风险字符串库中。 具体地, 当判断通知信息的出现频次超过阀 值时, 可将通知信息的内容添加至风险字符串库中。 由此, 扩大了风险字符串的覆盖面。
在本发明的一个实施例中, 处理器还具体用于: 在通知信息的内容中包括恶意词时, 将 通知信息对应的栈名添加至黑栈列表中。具体地, 根据预设条件判断应用程序对应的通知信 息的内容中是否包括恶意词, 如果包括恶意词, 即包括不良内容, 处理器可确定该应用程序 弹出恶意广告, 并将此通知信息对应的栈名添加至黑栈列表中。 由此, 扩大了黑栈列表, 进 一步提高了识别效率。
在本发明的另一个实施例中,添加至黑栈列表中的通知信息对应的栈名长度需超过预设 长度, 并且该栈名中不包含特定字符串, 例如, ijinshan、 tencent等, 如果通知信息对应的 栈名包含特定字符串,则该栈名不是黑栈,即不能判断对应的应用程序弹出恶意广告。由此, 保证了黑栈列表的可靠性。
在本发明的一个实施例中, 处理器还具体用于: 在确定应用程序弹出恶意广告时, 将应 用程序和 /或对应的恶意广告发送至云端服务器。 具体地, 在确定应用程序弹出恶意广告之 后, 处理器可将应用程序、 对应的恶意广告、 对应的通知信息等中的一种或多种通过网络连 接发送至云端服务器, 以使得云端服务器获取可弹出恶意广告的应用程序信息。其中, 网络 连接可为 2G、 3G、 WiFi、 WiMax等。 由此, 当用户下载安装此可弹出恶意广告的应用程序 时, 云端服务器可向对应的移动终端发送提醒消息以提醒用户, 提升了用户体验。
为了实现上述实施例, 本发明提出一种存储介质, 用于存储应用程序, 应用程序用于执 行本发明任一项实施例所述的移动终端中恶意广告的识别方法。
应当理解, 本发明的各部分可以用硬件、 软件、 固件或它们的组合来实现。 在上述实施 方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或固件 来实现。 例如, 如果用硬件来实现, 和在另一实施方式中一样, 可用本领域公知的下列技术 中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻 辑电路, 具有合适的组合逻辑门电路的专用集成电路, 可编程门阵列 (PGA), 现场可编程 门阵列 (FPGA) 等。 在本说明书的描述中,参考术语"一个实施例"、 "一些实施例"、 "示例"、 "具体示例"、 或 "一些示例"等的描述意指结合该实施例或示例描述的具体特征、 结构、 材料或者特点包 含于本发明的至少一个实施例或示例中。在本说明书中, 对上述术语的示意性表述不一定指 的是相同的实施例或示例。 而且, 描述的具体特征、 结构、 材料或者特点可以在任何的一个 或多个实施例或示例中以合适的方式结合。
在本发明各方法实施例中, 所述各步骤的序号并不能用于限定各步骤的先后顺序, 对于 本领域普通技术人员来讲, 在不付出创造性劳动的前提下, 对各步骤的先后变化也在本发明 的保护范围之内。
尽管已经示出和描述了本发明的实施例, 本领域的普通技术人员可以理解: 在不脱离本 发明的原理和宗旨的情况下可以对这些实施例进行多种变化、 修改、 替换和变型, 本发明的 范围由权利要求及其等同物限定。

Claims

权 利 要 求 书
1、 一种移动终端中恶意广告的识别方法, 其特征在于, 包括:
获取移动终端中运行的应用程序;
监控所述移动终端的通知栏以确定所述应用程序对应的通知信息; 以及
根据所述通知信息的出现频次和 /或所述通知信息的内容确定所述应用程序是否弹 出恶思广告
2、 如权利要求 1 所述的方法, 其特征在于, 所述根据所述通知信息的出现频次和 所述通知信息的内容确定所述应用程序是否弹出恶意广告, 具体包括:
判断所述通知信息的出现频次是否超过阈值;
如果所述通知信息的出现频次超过阈值, 则确定所述应用程序弹出恶意广告; 如果所述通知信息的出现频次未超过阈值, 则进一步判断所述通知信息的内容是否 满足预设条件; 以及
如果满足预设条件, 则确定所述应用程序弹出恶意广告。
3、 如权利要求 2所述的方法, 其特征在于, 在判断所述通知信息的出现频次超过 阈值和 /或判断满足预设条件之后还包括:
判断所述通知信息的栈名是否存在黑栈列表中;
如果存在黑栈列表中, 则进一步判断所述通知信息的应用程序名称是否存在白签名 名单中; 以及
如果不存在白签名名单中, 则确定所述应用程序弹出恶意广告。
4、 如权利要求 2所述的方法, 其特征在于, 在所述判断所述通知信息的出现频次 是否超过阈值之前还包括:
检测所述通知信息中是否包括白字符串;
如果包括白字符串, 则不记录对应的所述通知信息;
如果不包括白字符串, 则进一步判断所述通知信息的内容长度是否为 0; 以及 如果内容长度不为 0, 则将所述应用程序弹出的通知信息的出现频次增加 1。
5、 如权利要求 2-4 任一项所述的方法, 其特征在于, 所述预设条件包括: 所述通 知信息的内容包含恶意词、 所述通知信息不可清除、 所述通知信息不具有推送来源或所 述通知信息的内容包含风险字符串。
6、 如权利要求 5所述的方法, 其特征在于, 在所述判断所述通知信息的出现频次 超过阈值之后还包括:
将所述通知信息的内容添加至风险字符串库中。
7、 如权利要求 5所述的方法, 其特征在于, 还包括:
如果所述通知信息的内容中包括所述恶意词, 则将所述通知信息对应的栈名添加至 所述黑栈列表中。
8、 如权利要求 5所述的方法, 其特征在于, 按照以下步骤确定所述通知信息不具 有推送来源:
获取所述通知信息的内容信息;
获取所述内容信息中预设个数的字符;
判断所述预设个数的字符中是否包括对应的所述应用程序的名称; 以及
如果不包括, 则确定所述通知信息不具有所述推送来源。
9、 如权利要求 1-8任一项所述的方法, 其特征在于, 还包括:
如果确定所述应用程序弹出恶意广告,则将所述应用程序和 /或对应的所述恶意广告 发送至云端服务器。
10、 一种移动终端中恶意广告的识别装置, 其特征在于, 包括:
获取模块, 用于获取移动终端中运行的应用程序;
监控模块, 用于监控所述移动终端的通知栏以确定所述应用程序对应的通知信息; 以及
确定模块,用于根据所述通知信息的出现频次和 /或所述通知信息的内容确定所述应 用程序是否弹出恶意广告。
11、 如权利要求 10所述的装置, 其特征在于, 所述确定模块具体用于: 判断所述 通知信息的出现频次是否超过阈值, 并在所述通知信息的出现频次超过阈值时, 确定所 述应用程序弹出恶意广告, 并在所述通知信息的出现频次未超过阀值时, 进一步判断所 述通知信息的内容是否满足预设条件, 以及在所述通知信息的内容满足预设条件, 确定 所述应用程序弹出恶意广告。
12、 如权利要求 11 所述的装置, 其特征在于, 所述确定模块还具体用于: 在判断 所述通知信息的出现频次超过阈值和 /或判断满足预设条件之后,判断所述通知信息的栈 名是否存在黑栈列表中, 并在存在黑栈列表中时, 进一步判断所述通知信息的应用程序 名称是否存在白签名名单中, 以及在不存在白签名名单中时, 确定所述应用程序弹出恶 意广告
13、 如权利要求 11 所述的装置, 其特征在于, 所述确定模块还具体用于: 在判断 所述通知信息的出现频次是否超过阀值之前, 检测所述通知信息中是否包括白字符串, 并在包括白字符串时, 不记录对应的所述通知信息, 并在不包括白字符串时, 进一步判 断所述通知信息的内容长度是否为 0, 以及在内容长度不为 0时, 将所述应用程序弹出 的通知信息的出现频次增加 1。
14、 如权利要求 11-13任一项所述的装置, 其特征在于, 所述预设条件包括: 所述 通知信息的内容包含恶意词、 所述通知信息不可清除、 所述通知信息不具有推送来源或 所述通知信息的内容包含风险字符串。
15、 如权利要求 14所述的装置, 其特征在于, 所述确定模块还具体用于: 在判断 所述通知信息的出现频次超过阀值之后, 将所述通知信息的内容添加至风险字符串库 中。
16、 如权利要求 14所述的装置, 其特征在于, 所述确定模块还具体用于: 在所述 通知信息的内容中包括所述恶意词时, 将所述通知信息对应的栈名添加至所述黑栈列表 中。
17、 如权利要求 14所述的装置, 其特征在于, 所述确定模块还具体用于: 获取所 述通知信息的内容信息, 并获取所述内容信息中预设个数的字符, 并进一步判断所述预 设个数的字符中是否包括对应的所述应用程序的名称, 以及在不包括对应的所述应用程 序的名称时, 确定所述通知信息不具有所述推送来源。
18、 如权利要求 10-17任一项所述的装置, 其特征在于, 还包括:
发送模块,用于在确定所述应用程序弹出恶意广告时,将所述应用程序和 /或对应的 所述恶意广告发送至云端服务器。
19、 一种移动终端, 其特征在于, 包括: 外壳, 处理器和电路板;
所述电路板安置在所述外壳围成的空间内部, 所述处理器设置在所述电路板上; 所述处理器用于:
运行应用程序;
通过监控所述移动终端的通知栏以确定所述应用程序对应的通知信息; 以及 根据所述通知信息的出现频次和 /或所述通知信息的内容确定所述应用程序是 否弹出恶意广告。
20、 如权利要求 19所述的移动终端, 其特征在于, 所述处理器还具体用于: 判断 所述通知信息的出现频次是否超过阀值, 并在所述通知信息的出现频次超过阈值时, 确 定所述应用程序弹出恶意广告, 并在所述通知信息的出现频次未超过阈值时, 进一步判 断所述通知信息的内容是否满足预设条件, 以及在满足预设条件, 确定所述应用程序弹 出恶思广告
21、 如权利要求 20所述的移动终端, 其特征在于, 所述处理器还具体用于: 在判 断所述通知信息的出现频次超过阈值和 /或判断满足预设条件之后,判断所述通知信息的 栈名是否存在黑栈列表中, 并在存在黑栈列表中时, 进一步判断所述通知信息的应用程 序名称是否存在白签名名单中, 以及在不存在白签名名单中时, 确定所述应用程序弹出 恶思广告
22、 如权利要求 20所述的移动终端, 其特征在于, 所述处理器还具体用于: 在判 断所述通知信息的出现频次是否超过阀值之前, 检测所述通知信息中是否包括白字符 串, 并在包括白字符串时, 不记录对应的所述通知信息, 并在不包括白字符串时, 进一 步判断所述通知信息的内容长度是否为 0, 以及在内容长度不为 0时, 将所述应用程序 弹出的通知信息的出现频次增加 1。
23、 如权利要求 20-22所述的移动终端, 其特征在于, 所述预设条件包括: 所述通 知信息的内容包含恶意词、 所述通知信息不可清除、 所述通知信息不具有推送来源或所 述通知信息的内容包含风险字符串。
24、 如权利要求 23所述的移动终端, 其特征在于, 所述处理器还具体用于: 在判 断所述通知信息的出现频次超过阀值之后, 将所述通知信息的内容添加至风险字符串库 中。
25、 如权利要求 23所述的移动终端, 其特征在于, 所述处理器还具体用于: 在所 述通知信息的内容中包括所述恶意词时, 将所述通知信息对应的栈名添加至所述黑栈列 表中。
26、 如权利要求 23所述的移动终端, 其特征在于, 所述处理器还具体用于: 获取 所述通知信息的内容信息, 并获取所述内容信息中预设个数的字符, 并进一步判断所述 预设个数的字符中是否包括对应的所述应用程序的名称, 以及在不包括对应的所述应用 程序的名称时, 确定所述通知信息不具有所述推送来源。
27、 如权利要求 19-26所述的移动终端, 其特征在于, 所述处理器还用于: 在确定 所述应用程序弹出恶意广告时,将所述应用程序和 /或对应的所述恶意广告发送至云端服 务器。
28、 一种存储介质, 其特征在于, 用于存储应用程序, 所述应用程序用于执行权利 要求 1至 9中任一项所述的移动终端中恶意广告的识别方法。
PCT/CN2014/083450 2013-07-31 2014-07-31 移动终端中恶意广告的识别方法、装置和移动终端 WO2015014299A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310329831.9 2013-07-31
CN201310329831.9A CN104346569B (zh) 2013-07-31 2013-07-31 移动终端中恶意广告的识别方法、装置和移动终端

Publications (1)

Publication Number Publication Date
WO2015014299A1 true WO2015014299A1 (zh) 2015-02-05

Family

ID=52431016

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/083450 WO2015014299A1 (zh) 2013-07-31 2014-07-31 移动终端中恶意广告的识别方法、装置和移动终端

Country Status (2)

Country Link
CN (1) CN104346569B (zh)
WO (1) WO2015014299A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10567430B2 (en) 2016-12-09 2020-02-18 International Business Machines Corporation Protecting against notification based phishing attacks
US11128644B2 (en) * 2019-03-19 2021-09-21 Five Media Marketing Limited Automatic security scanning of advertisements during runtime of software applications
CN115640576A (zh) * 2022-12-13 2023-01-24 荣耀终端有限公司 恶意应用识别方法、终端设备及可读存储介质

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615491B (zh) * 2015-02-13 2018-04-27 联想(北京)有限公司 一种消息处理方法及电子设备
CN104994080B (zh) * 2015-06-12 2020-06-23 联想(北京)有限公司 信息处理方法、系统及电子设备
CN105354492B (zh) * 2015-10-16 2018-07-17 珠海格力电器股份有限公司 移动通讯终端及其消息通知控制方法和装置
CN106776610B (zh) * 2015-11-19 2020-04-17 珠海豹趣科技有限公司 一种广告弹窗拦截方法及装置
CN107046516B (zh) * 2016-02-05 2020-04-14 上海行邑信息科技有限公司 一种识别移动终端身份的风控控制方法及装置
CN107562474A (zh) * 2017-08-29 2018-01-09 努比亚技术有限公司 一种应用程序的界面过滤方法、终端及计算机可读存储介质
US10467408B1 (en) 2019-03-19 2019-11-05 Five Media Marketing Limited Automatic security scanning of advertisements during runtime of software applications
US10678923B1 (en) 2019-07-10 2020-06-09 Five Media Marketing Limited Security management of advertisements at online advertising networks and online advertising exchanges
CN111597554A (zh) * 2020-05-07 2020-08-28 上海二三四五网络科技有限公司 一种基于浏览器对可疑软件进行检测的控制方法及装置
CN114253438A (zh) * 2020-09-22 2022-03-29 中兴通讯股份有限公司 通知信息处理方法、终端设备及存储介质
CN116709339A (zh) * 2022-10-09 2023-09-05 荣耀终端有限公司 一种应用通知消息的检测方法及电子设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120159620A1 (en) * 2010-12-21 2012-06-21 Microsoft Corporation Scareware Detection
CN102801855A (zh) * 2012-07-19 2012-11-28 广东欧珀移动通信有限公司 一种快速清理并屏蔽垃圾通知的方法
US8356352B1 (en) * 2008-06-16 2013-01-15 Symantec Corporation Security scanner for user-generated web content
CN103020528A (zh) * 2012-12-24 2013-04-03 珠海市君天电子科技有限公司 一种应用程序的恶意行为的显示方法和装置
CN103065090A (zh) * 2012-12-20 2013-04-24 广东欧珀移动通信有限公司 一种应用程序恶意广告拦截方法及装置
CN103116722A (zh) * 2013-02-06 2013-05-22 北京奇虎科技有限公司 一种通知栏消息的处理方法、装置和系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102395128B (zh) * 2011-06-30 2015-12-09 北京邮电大学 一种移动智能终端的恶意信息发送防御方法及其系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8356352B1 (en) * 2008-06-16 2013-01-15 Symantec Corporation Security scanner for user-generated web content
US20120159620A1 (en) * 2010-12-21 2012-06-21 Microsoft Corporation Scareware Detection
CN102801855A (zh) * 2012-07-19 2012-11-28 广东欧珀移动通信有限公司 一种快速清理并屏蔽垃圾通知的方法
CN103065090A (zh) * 2012-12-20 2013-04-24 广东欧珀移动通信有限公司 一种应用程序恶意广告拦截方法及装置
CN103020528A (zh) * 2012-12-24 2013-04-03 珠海市君天电子科技有限公司 一种应用程序的恶意行为的显示方法和装置
CN103116722A (zh) * 2013-02-06 2013-05-22 北京奇虎科技有限公司 一种通知栏消息的处理方法、装置和系统

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10567430B2 (en) 2016-12-09 2020-02-18 International Business Machines Corporation Protecting against notification based phishing attacks
US10904287B2 (en) 2016-12-09 2021-01-26 International Business Machines Corporation Protecting against notification based phishing attacks
US11128644B2 (en) * 2019-03-19 2021-09-21 Five Media Marketing Limited Automatic security scanning of advertisements during runtime of software applications
CN115640576A (zh) * 2022-12-13 2023-01-24 荣耀终端有限公司 恶意应用识别方法、终端设备及可读存储介质

Also Published As

Publication number Publication date
CN104346569B (zh) 2019-02-22
CN104346569A (zh) 2015-02-11

Similar Documents

Publication Publication Date Title
WO2015014299A1 (zh) 移动终端中恶意广告的识别方法、装置和移动终端
US10169585B1 (en) System and methods for advanced malware detection through placement of transition events
US9100426B1 (en) Systems and methods for warning mobile device users about potentially malicious near field communication tags
CN103473346B (zh) 一种基于应用程序编程接口的安卓重打包应用检测方法
WO2015120752A1 (zh) 网络威胁处理方法及设备
WO2017219589A1 (zh) 程序崩溃消息的处理方法及系统
US8646074B1 (en) Systems and methods for enabling otherwise unprotected computing devices to assess the reputations of wireless access points
WO2013139215A1 (zh) 病毒apk的识别方法及装置
US9355250B2 (en) Method and system for rapidly scanning files
CN103839005A (zh) 移动操作系统的恶意软件检测方法和恶意软件检测系统
US9747449B2 (en) Method and device for preventing application in an operating system from being uninstalled
CN108134816B (zh) 对远程设备上的数据的访问
WO2017012241A1 (zh) 文件的检测方法、装置、设备及非易失性计算机存储介质
WO2015058574A1 (zh) 实现扩展应用程序的推送通知的方法及装置
CN109656440B (zh) 应用程序图标显示方法、设备及介质
WO2014190802A1 (en) Method,system and terminal device for scanning virus
WO2018233155A1 (zh) 即时通信方法及装置
CN107395650B (zh) 基于沙箱检测文件识别木马回连方法及装置
US20200183789A1 (en) Installation file processing method and device, and server
EP3780700B1 (en) Power consumption anomaly prompting method, server, and terminal
CN106020917B (zh) 一种软件安装方法及装置、用户终端
CN109347819A (zh) 一种病毒邮件检测方法、系统及电子设备和存储介质
CN103369555A (zh) 一种用于检测手机病毒的方法和装置
US11409871B1 (en) Universal tracing of side-channel processes in computing environments
CN110574034A (zh) 基于端点遥测的样本特定的沙箱配置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14832566

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 31/05/2016)

122 Ep: pct application non-entry in european phase

Ref document number: 14832566

Country of ref document: EP

Kind code of ref document: A1