Memory detecting device and method based on Android virtual container

A technology for virtual container and memory detection, applied in computer security devices, instruments, electronic digital data processing, etc., can solve the problems of false negatives, inability to traverse program branches, and high detection rate of ordinary applications, and achieve high detection rate. Effect

Active Publication Date: 2018-06-29
WUHAN ANTIY MOBILE SECURITY
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] As mobile devices become more and more intelligent, people are increasingly inseparable from mobile devices in their lives. While smart devices bring convenience to our lives, they also bring a lot of security problems. Malicious applications on mobile devices emerge in endlessly. , especially the number of malicious applications on the Android platform is growing faster and faster. At present, the detection methods for the Android platform are mainly divided into static detection and dynamic detection: static detection is mainly by comparing the static feature library, from the structural characteristics of the application, the fingerprint , code structure, specific instructions and other multi-dimensional static features to match malicious applications. The advantage of this detection method is that every branch of the program can be traversed during the detection process, and the detection rate of common applications is high. The application of static detection technology cannot detect malicious code because the real code of the application cannot be obtained.
Dynamic detection is mainly based on the behavior monitoring of the application at runtime, and detects the corresponding malicious behavior according to the relevant model of malicious behavior. This method generally needs to modify the system source code or implement it through hooks. The implementation process requires root privileges. , and dynamic detection may not be able to traverse all branches of the program, resulting in specific malicious behaviors not being triggered, which will eventually lead to false positives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory detecting device and method based on Android virtual container
  • Memory detecting device and method based on Android virtual container
  • Memory detecting device and method based on Android virtual container

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be further described below in conjunction with specific examples and accompanying drawings.

[0042] The present invention provides a memory detection device based on an Android virtual container, such as figure 1 As shown, it is located in a virtual container 00, and the virtual container 00 is located at the Android application layer and is isolated from the real system environment. This device includes:

[0043] The application acquisition module 01 is used to acquire and parse the apk file in the external memory.

[0044] The application loading module 02 is used to load and run the apk file. The application loading module 02 mainly includes a code loading module and a resource loading module; the code loading module is used to create Application and Activity to be tested; the resource loading module is used to load the application resources to be tested, wherein the resources include bitmap files , page layout file, or color file.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a memory detecting device based on an Android virtual container. The device is located in the virtual container, and the virtual container is located in an Android application layer and isolated from a real system environment. The device comprises an application acquisition module used for acquiring and analyzing the apk file in an external memory, an application loading module used for loading and running the apk file, a memory acquisition module used for obtaining the data structure of the apk file in the memory through a system function when the apk file is run, a memory detection module used for conducting malicious detection on the data structure and a result output module used for displaying the result of malicious detection. According the the device, the virtual container is achieved in the Android application layer, data structures of various classes in the memory are obtained from the virtual container to conduct malicious detection, root access is not needed, and detection can also be conducted on reinforced application.

Description

technical field [0001] The invention belongs to the technical field of mobile security, and in particular relates to an Android virtual container-based memory detection device and method. Background technique [0002] As mobile devices become more and more intelligent, people are increasingly inseparable from mobile devices in their lives. While smart devices bring convenience to our lives, they also bring a lot of security problems. Malicious applications on mobile devices emerge in endlessly. , especially the number of malicious applications on the Android platform is growing faster and faster. At present, the detection methods for the Android platform are mainly divided into static detection and dynamic detection: static detection is mainly by comparing the static feature library, from the structural characteristics of the application, the fingerprint , code structure, specific instructions and other multi-dimensional static features to match malicious applications. The a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/53G06F21/56
CPCG06F21/53G06F21/563
Inventor 李伏一袁海涛冯泽乔伟
Owner WUHAN ANTIY MOBILE SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products