Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Privacy protection mobile malicious software detection method and system, storage medium and application

A malicious software and privacy protection technology, applied in the direction of platform integrity maintenance, instrumentation, electrical digital data processing, etc., can solve the problems of not considering the performance overhead of the mobile terminal, rarely protecting user privacy, high performance overhead of the mobile terminal, etc.

Active Publication Date: 2020-07-03
XIDIAN UNIV
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012](1) Existing technologies seldom consider privacy protection in cloud-based mobile malware detection
[0013](2) Existing technologies that consider privacy protection do not take into account the performance overhead of the mobile terminal, so the mobile terminal still requires high performance overhead
[0014](3) Existing technologies that consider privacy protection use cryptography-based schemes, so the detection efficiency is generally relatively low
[0015] Difficulty in solving the above technical problems: Deploying mobile malware detection to the cloud can reduce the performance overhead of the mobile terminal, while cloud detection will expose users’ private data, but rarely There are related programs to protect user privacy
Most of the current privacy protection schemes are based on cryptography schemes, so they generally have the disadvantage of low efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection mobile malicious software detection method and system, storage medium and application
  • Privacy protection mobile malicious software detection method and system, storage medium and application
  • Privacy protection mobile malicious software detection method and system, storage medium and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0111] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0112] Aiming at the problems existing in the prior art, the present invention provides a privacy protection mobile malware detection method, system, storage medium and application. The present invention will be described in detail below with reference to the accompanying drawings.

[0113] Such as figure 1 As shown, the privacy protection mobile malware detection method provided by the embodiment of the present invention includes the following steps:

[0114] S101: In the feature training phase, the semi-trusted part of the malware detection service provider MDSP runs the collected known malware and benign software in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of mobile malicious software detection, and discloses a mobile malicious software detection method and system with privacy protection, a storage medium andan application. In a feature training phase, a semi-trusted part of a malicious software detection service provider MDSP operates software with known attributes in a simulator, a malicious feature set MS and a normal feature set NS are obtained by analyzing data during operation, and a corresponding effective Bloom filter and a corresponding effective Sketch data structure are established for detection and use; the mobile device collects runtime data of the position attribute software, encrypts the runtime data and sends the encrypted runtime data to the MDSP; the MDSP loads the Bloom filter,the Sketch and the received encrypted data to a trusted part of the MDSP and then executes a detection program; collecting software with newly confirmed attributes, adding the software into the training set, and updating MS and NS. Mobile malware detection is allowed to be outsourced to cloud in an efficient mobile user privacy protection mode to achieve malware detection serving as service, andthe method is suitable for malware detection algorithms matched with various features.

Description

technical field [0001] The invention belongs to the technical field of mobile malware detection, and in particular relates to a privacy protection mobile malware detection method, system, storage medium and application. Background technique [0002] At present, the closest existing technology: Human society has entered the era of mobile Internet, and the era of Internet of Things is coming. Various mobile smart devices play an indispensable role in people's daily life. The mobile operating system can run applications provided by any third party to serve people's daily life. Mobile applications also involve various aspects of user privacy (such as living habits, medical data, and even property-related account passwords). The openness of mobile malware, which seriously threatens people's privacy and even property safety, has also developed rapidly. [0003] Current malware detection methods mainly include static analysis and dynamic analysis. Static analysis mainly analyzes ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 魏文涛闫峥王静雯
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products