Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-reinforcement fast detection method of Android platform cloning application program

A technology of application programs and detection methods, which is applied in the field of clone software detection and mobile security, can solve the problems of detection method failure, high time consumption, and inability to be widely used, and achieve the effect of improving detection speed and avoiding impact

Active Publication Date: 2018-01-23
HUNAN UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The clone detection methods described above have several drawbacks that prevent them from being widely used
Among them, the detection method based on code reuse relies on the analysis of code characteristics, and more and more cloning attackers use reinforcement technology to hide the DEX code files in the cloned program, making the detection method based on code reuse invalid; The method of interface features has a large time overhead when extracting interface features and performing similarity calculations, and has great limitations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-reinforcement fast detection method of Android platform cloning application program
  • Anti-reinforcement fast detection method of Android platform cloning application program
  • Anti-reinforcement fast detection method of Android platform cloning application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] like figure 1 Shown, the present invention comprises the following steps:

[0042] 1. Initialization: Construct a balanced binary tree index based on key vectors;

[0043] 2. Input the functional description of the target application, and use Stanford Parser to extract the keyword vector of the dynamic dimension;

[0044] 3. Use the greedy-based depth-first search algorithm to quickly search for similar applications in the index tree and add them to the candidate set;

[0045] 4. Perform decompression and various conversion operations on the applications in the obtained suspicious clone application collection, and obtain all XML format layout files in the / res / layout directory;

[0046] 5. Filter the layout files, and use a statistical method to filter out external layout files introduced by third-party libraries;

[0047] 6. Convert the filtered layout file into a layout tree of the corresponding structure, and load it into the memory;

[0048] 7. Perform merging o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-reinforcement fast detection method of an Android platform cloning application program. The method comprises a preprocessing stage and an accurate detection stage. At the preprocessing stage, keywords are extracted from function description of the application program by using the natural language processing technology so as to construct vectors, and suspicious cloning application program pairs with similar functions are quickly searched by using an improved searching method based on a balanced binary tree. At a formal detection stage, the invention provides an application program birthmark that is based on interface layout features and are completely independent from source codes, so that the influence of the reinforcement technology can be effectively defended, and finally the similarity between the suspicious cloning application program pairs can be accurately calculated by using a similarity calculation method based on a tree editing distance. By adoption of the anti-reinforcement fast detection method, the interference of the reinforcement technology can be effectively defended, meanwhile the fast detection of the cloning applications can be achieved, and thus the practicability is very high.

Description

technical field [0001] The invention relates to the fields of mobile security and clone software detection, in particular to a fast detection method for an anti-hardening Android platform clone application program. Background technique [0002] Android has gradually occupied a dominant position in the mobile market, but it has also attracted a large number of malicious attacks. Most of these malicious programs spread rapidly by cloning existing applications, which not only poses a threat to user security, but also affects the income of legitimate developers. At present, the detection methods for cloned applications on the Android platform can be divided into two categories: one is the detection method based on code reuse: through static analysis of the program code, a specific program birthmark, such as a program dependency graph, a program flow chart, etc., is constructed to complete The calculation of similarity; the other is the detection method based on interface simila...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
Inventor 林亚平吕方
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products