Method and system for monitoring and analyzing mobile terminal malicious code behaviors

A malicious code and mobile terminal technology, which is applied in the field of mobile terminal malicious code behavior monitoring and analysis, can solve the problems of difficult automatic screening and the main malicious behavior of malicious programs, and achieves the effect of improving detection efficiency.

Inactive Publication Date: 2013-09-04
WUHAN ANTIY MOBILE SECURITY
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the strong mobility of mobile terminals and the closeness of hardware and operating systems, when sudden mobile terminal security incidents or new malicious code families appear, it is difficult for existing malicious code analysis technologies and systems to quickly identify malicious programs. major malicious behaviors, and it is difficult to automatically screen software programs containing malicious code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for monitoring and analyzing mobile terminal malicious code behaviors
  • Method and system for monitoring and analyzing mobile terminal malicious code behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention provides a method and system for monitoring and analyzing malicious code behaviors of mobile terminals, in order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and characteristics of the present invention The advantages can be more obvious and easy to understand, and the technical solution in the present invention will be further described in detail below in conjunction with the accompanying drawings:

[0043] The present invention firstly provides a method for monitoring and analyzing malicious code behavior of a mobile terminal, such as figure 1 shown, including:

[0044] S101 distributes the software program in the database to each terminal device;

[0045] S102 Install and run software programs in each terminal device, simulate common user operations to trigger malicious code sensitive behaviors, and set monitoring p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for monitoring and analyzing mobile terminal malicious code behaviors. The method comprises the steps that firstly software programs in a database are distributed to terminal devices; the software programs are installed on the terminal devices and operated, user commonly-used operation is stimulated to trigger malicious code sensitive behaviors, monitoring points are arranged in the terminal devices, and if the sensitive behaviors trigger the monitoring points, the sensitive behaviors are recorded, and then behavior logs are generated; the behavior logs in the terminal devices are collected; correlation analysis is conducted on the behavior logs which belong to the same software program, and the hazard degree of the software program is judged, therefore, mass software program samples can be rapidly processed, and dynamic behavior monitoring and analysis are conducted.

Description

technical field [0001] The invention relates to the technical field of mobile terminal security, in particular to a method and system for monitoring and analyzing malicious code behavior of a mobile terminal. Background technique [0002] With the increasing complexity, intelligence and networking of mobile terminals, the problems faced by mobile terminals in information security have gradually emerged. At present, the mobile terminal structure is relatively loose, there is no measure for unified management and authentication of internal devices, and there is a lack of effective security strategies in the design of the operating system. Mobile terminals will face various forms of threats when performing business applications, such as viruses, leakage of confidential information, illegal tampering of codes, and malicious replacement of key components. [0003] Due to the strong mobility of mobile terminals and the closeness of hardware and operating systems, when sudden mobi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
Inventor 刘汭祥潘宣辰乔伟
Owner WUHAN ANTIY MOBILE SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products