A memory detection device and method based on android virtual container

A virtual container and memory detection technology, which is applied in computer security devices, instruments, calculations, etc., can solve the problems of false positives, failure to detect malicious code, and high detection rate of common applications, achieving a high detection rate effect

Active Publication Date: 2021-11-12
WUHAN ANTIY MOBILE SECURITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] As mobile devices become more and more intelligent, people are increasingly inseparable from mobile devices in their lives. While smart devices bring convenience to our lives, they also bring a lot of security problems. Malicious applications on mobile devices emerge in endlessly. , especially the number of malicious applications on the Android platform is growing faster and faster. At present, the detection methods for the Android platform are mainly divided into static detection and dynamic detection: static detection is mainly by comparing the static feature library, from the structural characteristics of the application, the fingerprint , code structure, specific instructions and other multi-dimensional static features to match malicious applications. The advantage of this detection method is that every branch of the program can be traversed during the detection process, and the detection rate of common applications is high. The application of static detection technology cannot detect malicious code because the real code of the application cannot be obtained.
Dynamic detection is mainly based on the behavior monitoring of the application at runtime, and detects the corresponding malicious behavior according to the relevant model of malicious behavior. This method generally needs to modify the system source code or implement it through hooks. The implementation process requires root privileges. , and dynamic detection may not be able to traverse all branches of the program, resulting in specific malicious behaviors not being triggered, which will eventually lead to false positives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A memory detection device and method based on android virtual container
  • A memory detection device and method based on android virtual container
  • A memory detection device and method based on android virtual container

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be further described below in conjunction with specific examples and accompanying drawings.

[0042] The present invention provides a memory detection device based on an Android virtual container, such as figure 1 As shown, it is located in a virtual container 00, and the virtual container 00 is located at the Android application layer and is isolated from the real system environment. This device includes:

[0043] The application acquisition module 01 is used to acquire and parse the apk file in the external memory.

[0044] The application loading module 02 is used to load and run the apk file. The application loading module 02 mainly includes a code loading module and a resource loading module; the code loading module is used to create Application and Activity to be tested; the resource loading module is used to load the application resources to be tested, wherein the resources include bitmap files , page layout file, or color file.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a memory detection device based on an Android virtual container, which is located in a virtual container. The virtual container is located at the Android application layer and is isolated from the real system environment. The device includes: an application acquisition module for acquiring and parsing external The apk file in the storage; the application loading module is used to load and run the apk file; the memory acquisition module is used to obtain the data structure of the apk file in the memory through the system function when the apk file is running; the memory detection module is used for The data structure is used for malicious detection; the result output module is used to display the result of malicious detection. The invention realizes a virtual container in the Android application layer, obtains various data structures in the memory of the application to be tested in the virtual container for malicious detection, and does not need root authority, and can also detect the reinforced application.

Description

technical field [0001] The invention belongs to the technical field of mobile security, and in particular relates to an Android virtual container-based memory detection device and method. Background technique [0002] As mobile devices become more and more intelligent, people are increasingly inseparable from mobile devices in their lives. While smart devices bring convenience to our lives, they also bring a lot of security problems. Malicious applications on mobile devices emerge in endlessly. , especially the number of malicious applications on the Android platform is growing faster and faster. At present, the detection methods for the Android platform are mainly divided into static detection and dynamic detection: static detection is mainly by comparing the static feature library, from the structural characteristics of the application, the fingerprint , code structure, specific instructions and other multi-dimensional static features to match malicious applications. The a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/53G06F21/56
CPCG06F21/53G06F21/563
Inventor 李伏一袁海涛冯泽乔伟
Owner WUHAN ANTIY MOBILE SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products