白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Static and dynamic security analysis of apps for mobile devices

專利號
US10867041B2
公開日期
2020-12-15
申請人
Palo Alto Networks, Inc.(US CA Santa Clara)
發(fā)明人
Zhi Xu; Xinran Wang; Huagang Xie
IPC分類
G06F21/56
技術(shù)領(lǐng)域
apk,malicious,analysis,malware,static,appliance,game.apk,in,engine,dynamic
地域: CA CA Santa Clara

摘要

Techniques for performing static and dynamic analysis on a mobile device application are disclosed. Static analysis is performed on a mobile device application using a static analysis engine. A set of static analysis results is generated. Dynamic analysis of the application is selectively customized based at least in part on a presence of a permission in the set of static analysis results. Dynamic analysis is performed using a dynamic analysis engine. A determination of whether the application is malicious is made based at least in part on the dynamic analysis.

說明書

As will be described in more detail below, system 300 is configured to perform a hybrid, two part analysis on mobile device applications. First, static analysis is performed, in part to check the capabilities of the application (e.g., its potential avenues for being malicious). Then, dynamic analysis is performed to check whether the application actually uses the capabilities maliciously. The hybrid approach helps improve the accuracy of mobile malware detection, while lowering the false positive rate of mislabeling benign application files as malware (e.g., due to harmless but poor programming techniques on the part of the application's author). A final verdict pertinent to the application can be made based on both the application's content (e.g., where the application includes a URL verified to be a malicious website), and on the context in which it behaves (e.g., whether the usage of a suspicious capability is made aware to an end user or is performed silently in the background).

In various embodiments, system 300 makes use of lists, databases, or other collections of known safe content and/or known bad content (collectively shown in FIG. 3 as collection 314). Collection 314 can be obtained in a variety of ways, including via a subscription service (e.g., provided by a third party) and/or as a result of other processing (e.g., performed by data appliance 102 and/or service 122). Examples of information included in collection 314 are: URLs of known malicious websites; URLs of known safe websites; signatures, hashes, and/or other identifiers of known malicious applications; and signatures, hashes, and/or other identifiers of known safe applications; and signatures, hashes, and/or other identifiers of known malicious files (e.g. Android exploits files).

Ingestion

權(quán)利要求

1
微信群二維碼
意見反饋