Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application attack detection method and device

An application and attack detection technology, applied in the computer field, can solve the problems of inability to implement program reinforcement methods for batch maintenance, inability to accurately monitor application attacks, waste of system resources, etc., to achieve easy batch maintenance, simple and flexible implementation process, and guarantee security. Effect

Active Publication Date: 2019-08-16
JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the inventor found in the process of implementing the present invention that the above-mentioned methods in the prior art have at least the following defects: the program reinforcement method provided in the prior art is usually a code obfuscation method such as adding flowery instructions in the program, however, This kind of hardening method often causes program expansion, wastes system resources, and cannot accurately monitor the attack on the application program; moreover, the existing program hardening method is completed by the compiler installed in the developer terminal during the compilation process , so that the batch maintenance of the program hardening method cannot be realized, and the maintenance cost is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application attack detection method and device
  • Application attack detection method and device
  • Application attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0026] figure 1 A schematic flowchart of a method for detecting an application program attack according to an embodiment of the present invention is shown. Wherein, the program hardening method based on the application installation package provided in this embodiment can be applied to IOS and / or MachOS systems. Such as figure 1 As shown, the method includes:

[0027] Step S110, extract binary files from the application installat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application attack detection method and device, and is characterized in that the method comprises the steps: extracting a binary file from an application installation package; generating a check value according to the information corresponding to the specific position in the binary file; when the application program runs, obtaining information corresponding to a specificposition in the current application program, and comparing the information corresponding to the specific position in the current application program with the check value; and determining whether theapplication program is attacked or not according to a comparison result. According to the scheme, the information corresponding to the specific position in the binary file is used as the check value;the application program attack is monitored according to the check value, so that whether the application program is attacked or not can be quickly and accurately determined, the application program is prevented from being dynamically attacked, the reverse difficulty of the application program is greatly improved, the security of the application program is ensured, and code expansion of the application program is not easily caused; moreover, the implementation process is simple and flexible, batch maintenance is easy, and the maintenance cost is low.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an application program attack detection method and device. Background technique [0002] With the continuous development of science and technology and society, the number of various applications is also increasing rapidly. However, program reverse developers or program reverse products can easily crack and attack the application program by decompiling and debugging the application program, thereby threatening the security of the application program. [0003] At present, in order to prevent reverse cracking and attacks on application programs, there are many products and methods for strengthening application programs in the prior art. However, the inventor found in the process of implementing the present invention that the above-mentioned methods in the prior art have at least the following defects: the program reinforcement method provided in the prior art is usually a code ob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/14
CPCG06F21/14G06F21/55
Inventor 汪德嘉华保健邵根波钱潇龄孟啸龙郑小敏
Owner JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products