Method for detecting, removing and recovering malicious codes of Android repackaging malicious software
A malicious code and malicious software technology, applied in the field of malicious software, can solve the problems of stealing user privacy, lack of, and deduction.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0020] The specific steps of this embodiment are as follows:
[0021] 1) Establishing a feature library composed of fuzzy hash values for the malicious entry point classes of known malicious programs, specifically referring to: using disassembly technology to extract malicious code fragments in the form of underlying instructions. For Android applications, the instructions of the Dalvik virtual machine can be obtained by disassembling the executable file dex. When an entry point class is considered to be repackaged by a malicious program, the instruction fuzzy hash of this class is used as a feature.
[0022] The feature library uses the fuzzy hash of instructions, divides the instructions of this type into separate basic blocks according to the program control flow graph, and makes a hash value for the sequence of the opcode part of the instruction in each block, only for the instruction opcode The hash of can prevent instruction confusion or string confusion based on opera...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com