Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and client for identifying malicious advertising programs

A malicious advertisement and identification method technology, applied in the identification method, device and client field of malicious advertisement programs, can solve problems such as low analysis efficiency, inability to track and identify malicious programs, user data security threats, etc., and achieve the effect of data security protection

Active Publication Date: 2018-09-11
BEIJING CHEETAH MOBILE TECH CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of realizing the present invention, the inventor found that the prior art has at least the following problems: static analysis technology needs to analyze each program, so as to judge and analyze the program according to the extracted static character strings, package name features, etc. less efficient
Moreover, currently, the generation of malicious program package name features has been randomized, and the malicious program will be encrypted at the same time, and it is impossible to track and identify the variants of malicious programs simply through static analysis methods
Therefore, it is difficult for existing static analysis methods to quickly and effectively identify such malicious programs, resulting in a great threat to the security of user data caused by malicious programs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and client for identifying malicious advertising programs
  • Method, device and client for identifying malicious advertising programs
  • Method, device and client for identifying malicious advertising programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0022] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance. In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "connected" and "connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identification method and device of a malicious advertisement program and a client side. The method comprises the following steps: operating a program to be tested; obtaining at least one piece of object data generated in an operation process of the program to be tested; and matching at least one piece of object data with a preset malicious advertisement feature library to identify a malicious advertisement program type to which the program to be tested belongs. According to the method of the embodiment of the invention, program variants can be subjected to continuous tracking and classification and are free from the restriction of code obfuscation rival and program encryption, the type of the program to be tested is accurately judged so as to effectively intercept a malicious program to guarantee the data safety of a user.

Description

technical field [0001] The present invention relates to the field of terminal security, in particular to a method, device and client for identifying malicious advertising programs. Background technique [0002] With the popularization of Android and other operating systems in mobile terminals, malicious programs targeting Android and other operating systems show a trend of substantial growth. At the same time, malicious programs can also encrypt their own code, or randomly generate package name characteristics, making the variants of malicious programs extremely active, making it difficult to detect. Therefore, malicious programs and their variants must be effectively identified and judged to ensure the data security of mobile terminal users. At present, mobile terminals mainly analyze malicious programs through static analysis methods, that is, statically scan programs in mobile terminals, extract static character strings of programs, package name features of malicious pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/033
Inventor 林坚明赵闽
Owner BEIJING CHEETAH MOBILE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products