Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malware detection method and malware detection system of mobile operating system

A mobile operating system and malware technology, which is applied in electrical digital data processing, instruments, platform integrity maintenance, etc., can solve problems such as downloading, consumption of large communication traffic, and the impact of feature value matching, and achieve the effect of improving detection efficiency.

Active Publication Date: 2014-06-04
BEIJING ZHIGU RUI TUO TECH
View PDF5 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This technology essentially belongs to the static detection of software. Its shortcoming is that when the malware is deformed or mixed with other components, the matching of feature values ​​will be greatly affected; in addition, feature scanning requires a real-time malicious code feature library support, mobile terminals need to consume a large amount of communication traffic to download the latest feature database data
This technology has a high detection rate for malware, and is especially suitable for polymorphic and deformed malware. However, due to the multi-branch characteristics in the software execution process, the virtual machine technology can only check the existence of malicious code in a part of the software process. No, it is not possible to detect malicious codes in the entire process of the software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malware detection method and malware detection system of mobile operating system
  • Malware detection method and malware detection system of mobile operating system
  • Malware detection method and malware detection system of mobile operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings (the same symbols in several drawings indicate the same elements) and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0044] Those skilled in the art can understand that terms such as "first" and "second" in the present invention are only used to distinguish different steps, equipment or modules, etc., neither represent any specific technical meaning, nor represent the inevitable relationship between them. logical order.

[0045] In the present invention, "entry function" refers to the initialization function and the trigger function in the software, and these two functions generally declare the objects used by the software and the system functions called.

[0046] In the present invention, "functional module" refers to ot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malware detection method of a mobile android operating system. The method includes the sensitive calling sequence generation step and the detection step, wherein in the sensitive calling sequence generation step, code analysis is performed on software for at least one entry function in software, and a sensitive system calling sequence is generated; in the detection step, the sensitive system calling sequence is matched according to a predefined malware feature library, and a malware detection result is obtained. According to the characteristic that current malware is achieved mainly depending on system calling, system calling used by the malware is effectively detected, thus, the problem existing in the detection technology in the prior art can be effectively solved, the essential behavior of the malware can be detected, and the detection efficiency of the malware is improved.

Description

technical field [0001] The invention relates to the field of mobile Internet security, in particular to a malware detection method and system for a mobile operating system. Background technique [0002] In recent years, the open source smart mobile operating system represented by Android (Android) has been widely used. At the same time, various malicious software attacks have appeared along with powerful smart mobile terminals. At present, there are thousands of malicious software targeting Android mobile terminals on the Internet, which mainly involve spam text messages, malicious chargebacks, stealing users' personal information, and many other aspects. Although in terms of the degree of harm and the scope of influence, the malware targeting Android mobile terminals cannot compare with the security risks of personal computers, but from the perspective of development, the promotion and popularization of mobile terminals in the social field will further deepen and expand. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/56G06F2221/033
Inventor 焦健
Owner BEIJING ZHIGU RUI TUO TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products