CN106778247A - The method and device that application program is dynamically analyzed - Google Patents

The method and device that application program is dynamically analyzed Download PDF

Info

Publication number
CN106778247A
CN106778247A CN201611160804.3A CN201611160804A CN106778247A CN 106778247 A CN106778247 A CN 106778247A CN 201611160804 A CN201611160804 A CN 201611160804A CN 106778247 A CN106778247 A CN 106778247A
Authority
CN
China
Prior art keywords
installation package
package file
behavioral data
analyzed
analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611160804.3A
Other languages
Chinese (zh)
Other versions
CN106778247B (en
Inventor
汪德嘉
华保健
樊淇梁
宋超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU PAY EGIS TECHNOLOGY Co.,Ltd.
JIANGSU TONGFUDUN INFORMATION SECURITY TECHNOLOGY Co.,Ltd.
Original Assignee
Jiangsu Payegis Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Payegis Technology Co Ltd filed Critical Jiangsu Payegis Technology Co Ltd
Priority to CN201611160804.3A priority Critical patent/CN106778247B/en
Publication of CN106778247A publication Critical patent/CN106778247A/en
Application granted granted Critical
Publication of CN106778247B publication Critical patent/CN106778247B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Stored Programmes (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses the method and device that a kind of application program is dynamically analyzed.Wherein, method includes:Obtain the installation package file of application program to be analyzed;Installation package file is put into sandbox and is run, collect the behavioral data that installation package file is produced in the process of running;Behavioral data is analyzed, analysis result is obtained such that it is able to is comprehensively monitored and is analyzed the operation action of application program, and allow user to decide whether to be adjusted application program according to analysis result.

Description

The method and device that application program is dynamically analyzed
Technical field
The present invention relates to Internet technical field, and in particular to the method and device that a kind of application program is dynamically analyzed.
Background technology
With a large amount of popularizations of application program, application program miscellaneous is occurred in that in application market, in order to protect use The interests at family, it is necessary to detect the behavior of these application programs whether in accordance with rule.However, in face of the application of magnanimity, it is how high Effect, the accurately behavior and making of detection application program have rationally been judged into urgent demand.
For these application programs, domestic security firm have developed corresponding product, but these manufacturers are pin To certain specific aspect, such as:Detect malice application, detect whether the application program reinforces, but not yet have for should The dynamic detection scheme analyzed with program behavior, therefore, a kind of behavior to application program is lacked in the prior art and enters Mobile state The method of analysis.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on State the device that the method and corresponding application program of the application program dynamic analysis of problem are dynamically analyzed.
According to an aspect of the invention, there is provided a kind of method of the dynamic analysis of application program, method includes:
Obtain the installation package file of application program to be analyzed;
Installation package file is put into sandbox and is run, collect the behavioral data that installation package file is produced in the process of running;
Behavioral data is analyzed, analysis result is obtained.
According to another aspect of the present invention, there is provided a kind of device that application program is dynamically analyzed, device includes:
Acquisition module, the installation package file for obtaining application program to be analyzed;
Behavioral data collection module, runs for installation package file to be put into sandbox, collects installation package file in operation During produce behavioral data;
Analysis module, for being analyzed to behavioral data, obtains analysis result.
According to the scheme that the present invention is provided, after the installation package file for obtaining application program to be analyzed, by installation kit text Part is run in being put into sandbox, collects the behavioral data that installation package file is produced in the process of running, and behavioral data is analyzed, Obtain analysis result such that it is able to comprehensively monitor and analyze the operation action of application program, and allow user according to analysis Result decides whether to be adjusted application program.
Described above is only the general introduction of technical solution of the present invention, in order to better understand technological means of the invention, And can be practiced according to the content of specification, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by specific embodiment of the invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows the schematic flow sheet of the method that application program according to an embodiment of the invention is dynamically analyzed;
Fig. 2 shows the schematic flow sheet of the method that application program in accordance with another embodiment of the present invention is dynamically analyzed;
Fig. 3 shows the structural representation of the device that application program according to an embodiment of the invention is dynamically analyzed;
Fig. 4 shows the structural representation of the device that application program in accordance with another embodiment of the present invention is dynamically analyzed.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.Conversely, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Fig. 1 shows the schematic flow sheet of the method that application program according to an embodiment of the invention is dynamically analyzed.Such as Shown in Fig. 1, the method is comprised the following steps:
Step S100, obtains the installation package file of application program to be analyzed.
In embodiments of the present invention, the installation package file of application program to be analyzed can be the installation kit of client upload File, it is also possible to the installation package file of application program downloaded from website or local, for example, the developer of application program exists After developing new application program, before application program is listed, the entrance of the upper transmitting file that can be provided by client, The installation package file of application program is uploaded, carrying out behavior with the installation package file to application program dynamically analyzes;Certainly, it is common to use Family is after the installation package file for having downloaded certain application program from application shop etc., it is also possible to by client provided it is upper The entrance of transmitting file, uploads the installation package file of application program, and carrying out behavior with the installation package file to application program dynamically divides Analysis.
Step S101, installation package file is put into sandbox and is run, and collects what installation package file was produced in the process of running Behavioral data.
After installation package file is got, it is possible to which installation package file is put into sandbox, operation should in sandbox Installation package file, and in installation package file running produce behavioral data be collected, as subsequent analysis point Analysis object.Here installation package file is run in sandbox can be avoided producing influence to real system.
Step S102, is analyzed to behavioral data, obtains analysis result.
After the behavioral data produced in installation package file running is collected into, the behavioral data to being collected into is carried out Analysis, wherein, behavioral data is analyzed specially:Data behavior is carried out sensitive behavior analysis, malicious act analysis, OK It is trend analysis, privilege analysis and/or behavior classification analysis.Wherein, sensitive behavior analysis can be used for analyzing installation package file Whether sensitive data is operated during operation, for example, reading sensitive data;Malicious act analysis can be used for analyzing installation kit Whether the behaviors such as fraud is had during running paper;Which authority privilege analysis are related to when referring to that analysis installation package file is run, For example, modification, deletion etc..Certainly, however it is not limited to above-mentioned analysis, those skilled in the art can according to actual needs carry out other Behavioural analysis.
According to the method that the above embodiment of the present invention is provided, after the installation package file for obtaining application program to be analyzed, Installation package file is put into sandbox and is run, the behavioral data that installation package file is produced in the process of running is collected, to behavior number According to being analyzed, analysis result is obtained such that it is able to the comprehensive operation action of monitoring and analysis application program, and make the user can Decide whether to be adjusted application program with according to analysis result.
Fig. 2 shows the schematic flow sheet of the method that application program in accordance with another embodiment of the present invention is dynamically analyzed. As shown in Fig. 2 the method is comprised the following steps:
Step S200, obtains the installation package file of application program to be analyzed.
In embodiments of the present invention, the installation package file of application program to be analyzed can be the installation kit of client upload File, it is also possible to the installation package file of application program downloaded from website or local, for example, the developer of application program exists After developing new application program, before application program is listed, the entrance of the upper transmitting file that can be provided by client, The installation package file of application program is uploaded, carrying out behavior with the installation package file to application program dynamically analyzes;Certainly, it is common to use Family is after the installation package file for having downloaded certain application program from application shop etc., it is also possible to by client provided it is upper The entrance of transmitting file, uploads the installation package file of application program, and carrying out behavior with the installation package file to application program dynamically divides Analysis.Here application program can be mobile applications or non-mobile application.
Step S201, judges whether installation package file is processed by shell adding, if so, then performing step S202;If it is not, then holding Row step S203.
After the completion of application development, shell adding treatment may be carried out to the installation package file of application program, this is mainly Attacked to resist reverse-engineering and code injection.But also because installation package file is being carried out program behavior analysis by shell adding During bring great difficulty, therefore after installation package file is got, in addition it is also necessary to whether judge installation package file Processed by shell adding.
In general reinforce in the installation package file that Scheme of Strengthening is to determine and that it is reinforced in process that manufacturer uses Mark with the reinforcing manufacturer, therefore, it can carry out script dissection process by installation package file, judge installation package file In whether determine whether installation package file is processed by shell adding comprising reinforcing identification of the manufacturer and Scheme of Strengthening.
Step S202, heat treatment is carried out to installation package file.
After judging that installation package file is processed by shell adding, heat treatment can be carried out to installation package file, so as to In follow-up analyzing and processing, specific hulling method is not described in detail here.
Step S203, pitching pile treatment is carried out to installation package file.
After heat treatment is carried out to installation package file, or, judge that installation package file processes it without shell adding Afterwards, pitching pile treatment can also be carried out to installation package file, one section of code or node etc. is inserted in the code of installation package file, When installation package file is run, to obtain corresponding behavioral data.It should be noted that the step is optional, in some implementations In example, pitching pile treatment can not be carried out to installation package file.
Step S204, installation package file is put into sandbox and is run, and is collected using stain analysis and/or Hook Technique and passed through The behavioral data produced during application simulation device operation installation package file after kernel light-weight technologg.
Application simulation device is provided with sandbox, for running installation package file, application simulation device is interior in the embodiment of the present invention Core is, by light-weight technologg, to be enhanced by the speed of service of the application simulation device after light-weight technologg, but also carry Height obtains the accuracy rate of behavioral data.
In addition, the embodiment of the present invention can be by the application mould after code coverage technology is activated through kernel light-weight technologg Intend device automatic running installation package file, and without manually controlling application simulation device, be input into corresponding operation, realize installation The full-automation of APMB package operation.In installation package file running, it is possible to use stain is analyzed and/or hook (Hook) skill Art come collect by after kernel light-weight technologg application simulation device operation installation package file during produce behavioral data.Its In, stain analysis refers to for an installation package file, to define a starting point and an end point forms polluted sequence, by with Track polluted sequence carries out stain analysis, and whether analysis installation package file is contaminated.Hook Technique can be run to installation package file When specifies behavior be monitored, collect installation package file running in produce behavioral data.
Behavioral data includes one or more in data below:Running log, operation sectional drawing, transmission data.Illustrate It is bright, can be with generating run daily record when File read operation and file write operations.
Step S205, behavioral data is input in the behavioral data model for pre-setting, and behavioral data is analyzed, Obtain analysis result.
After the behavioral data produced in installation package file running is collected into, behavioral data can be input to pre- In the behavioral data model for first setting, the behavioral data to being collected into is analyzed, specifically, by that will be collected into behavioral data Compare with the behavioural characteristic in behavioral data model, corresponding analysis result can be obtained.Wherein, behavioral data is carried out Analysis is specially:Data behavior is carried out sensitive behavior analysis, malicious act analysis, behavior trend analysis, privilege analysis and/or Behavior classification analysis.Wherein, whether sensitive behavior analysis can be used for being carried out sensitive data when analysis installation package file is run Operation, for example, reading sensitive data;Whether malicious act analysis can be used for having fraud when analysis installation package file is run Deng behavior;Which authority privilege analysis are related to when referring to that analysis installation package file is run, for example, modification, deletion etc..Certainly, and Above-mentioned analysis is not limited to, those skilled in the art can according to actual needs carry out other behavioural analyses.
Behavioral data model is to be trained what is obtained by the behavioural characteristic in application feature database, and behavioural characteristic refers to The behavioral data of behavior type is had determined that, is referred specifically to, certain behavioral data is malicious act data or non-malicious behavioral data, quick Sense behavioral data or nonsensitive data etc..
Behavioral data model of the invention is obtained by batch mode of learning or incremental learning pattern drill.Batch is learned Habit pattern refers to that the behavioral data collected before preset time period is to the preset time period is trained, so as to default at each Time period obtains a behavior data model, and wherein preset time period can be one hour or one day, and those skilled in the art can be with According to being configured the need for practical application, it is not especially limited herein;Incremental learning pattern refers to collection behavioral data, to collecting Behavioral data be trained, and the result of training is learnt to the behavioral data mould obtained before preset time period by interface Type, so as to obtain new behavioral data model in each preset time period.To can be collected in real time using incremental learning pattern Behavioral data study to behavioral data model, reduce the workload of machine learning training, and can quickly obtain behavior Data model.
In a kind of optional embodiment of the invention, behavioral data can also be divided by pattern matching mode Analysis, obtains analysis result, wherein it is possible to corresponding pattern is pre-set, for example, malicious patterns, sensitive mode etc., also, The matched rule of each pattern is preset, after behavioral data is obtained, behavioral data is carried out using the matched rule of each pattern Analysis, obtains analysis result.
After analysis result is obtained, analysis result can be showed user, for user according to analysis result to application The installation package file of program is processed;Additionally, analysis result can be stored in applies feature database, as behavioral data model Or the training data source of pattern match.
According to the method that the above embodiment of the present invention is provided, after the installation package file for obtaining application program to be analyzed, Judge whether installation package file is processed by shell adding, if so, then carrying out heat treatment to installation package file, be easy to later collection row It is data, pitching pile treatment is carried out to installation package file, can targetedly collect behavioral data, installation package file is put into sand Run in case, collect the behavioral data that installation package file is produced in the process of running, the behavioral data that will be collected into is input to pre- In the behavioral data model for first setting, behavioral data is analyzed, obtains analysis result such that it is able to comprehensively monitored and divide The operation action of application program is analysed, and allows user to decide whether to be adjusted application program according to analysis result.
Fig. 3 shows the structural representation of the device that application program according to an embodiment of the invention is dynamically analyzed.Such as Shown in Fig. 3, the device includes:Acquisition module 310, behavioral data collection module 320 and analysis module 330.
Acquisition module 310, the installation package file for obtaining application program to be analyzed.
In embodiments of the present invention, the installation package file of application program to be analyzed can be the installation kit of client upload File, it is also possible to the installation package file of application program downloaded from website or local, for example, the developer of application program exists After developing new application program, before application program is listed, the entrance of the upper transmitting file that can be provided by client, The installation package file of application program is uploaded, carrying out behavior with the installation package file to application program dynamically analyzes;Certainly, it is common to use Family is after the installation package file for having downloaded certain application program from application shop etc., it is also possible to by client provided it is upper The entrance of transmitting file, uploads the installation package file of application program, and carrying out behavior with the installation package file to application program dynamically divides Analysis.
Behavioral data collection module 320, runs for installation package file to be put into sandbox, collects installation package file in fortune The behavioral data produced during row.
After installation package file is got, it is possible to which installation package file is put into sandbox, operation should in sandbox Installation package file, and in installation package file running produce behavioral data be collected, as subsequent analysis point Analysis object.Here installation package file is run in sandbox can be avoided producing influence to real system.
Analysis module 330, for being analyzed to behavioral data, obtains analysis result.
According to the device that the above embodiment of the present invention is provided, after the installation package file for obtaining application program to be analyzed, Installation package file is put into sandbox and is run, the behavioral data that installation package file is produced in the process of running is collected, to behavior number According to being analyzed, analysis result is obtained such that it is able to the comprehensive operation action of monitoring and analysis application program, and make the user can Decide whether to be adjusted application program with according to analysis result.
Fig. 4 shows the structural representation of the device that application program in accordance with another embodiment of the present invention is dynamically analyzed. As shown in figure 4, the device includes:Acquisition module 410, behavioral data collection module 420 and analysis module 430.
Acquisition module 410, the installation package file for obtaining application program to be analyzed.Wherein, application program is movement Application program or non-mobile application.
Behavioral data collection module 420, runs for installation package file to be put into sandbox, using stain analysis and/or Hook Technique collects the behavior number produced during the application simulation device operation installation package file after kernel light-weight technologg According to.
Wherein, behavioral data includes one or more in data below:Running log, operation sectional drawing, transmission data.
Specifically, behavioral data collection module 420 includes:Trigger element 421, is passed through for being triggered by code coverage technology The application simulation device automatic running installation package file crossed after kernel light-weight technologg.
Behavioral data collector unit 422, for collecting operation installation package file mistake using stain analysis and/or Hook Technique The behavioral data produced in journey.
Analysis module 430, for being analyzed to behavioral data, obtains analysis result.
Wherein, analysis module 430 specifically for:Sensitive behavior analysis, malicious act analysis, behavior are carried out to behavioral data Trend analysis, privilege analysis and/or behavior classification analysis.
Additionally, analysis module 430 is further used for:Behavioral data is input in the behavioral data model for pre-setting, Behavioral data is analyzed, analysis result is obtained, wherein, behavioral data model is that the behavioural characteristic in application feature database is entered Row training is obtained.
Or, analysis module 430 is further used for:Behavioral data is analyzed by pattern matching mode, is divided Analysis result.
Additionally, device also includes:Heat treatment module 440, for judging whether installation package file is processed by shell adding, In the case of judging that installation package file is processed by shell adding, heat treatment is carried out to installation package file.
Specifically, heat treatment module 440 is further used for:Script dissection process is carried out to installation package file, peace is judged Whether comprising reinforcing identification of the manufacturer and Scheme of Strengthening in dress APMB package.
After the completion of application development, it is also possible to shell adding treatment can be carried out to the installation package file of application program, this is main It is to be attacked to resist reverse-engineering and code injection.But also because installation package file is given by shell adding is carrying out program behavior point Great difficulty is brought during analysis, therefore after installation package file is got, in addition it is also necessary to judge that installation package file is It is no to be processed by shell adding.
In general reinforce in the installation package file that Scheme of Strengthening is to determine and that it is reinforced in process that manufacturer uses Mark with the reinforcing manufacturer, therefore, it can carry out script dissection process by installation package file, judge installation package file In whether determine whether installation package file is processed by shell adding comprising reinforcing identification of the manufacturer and Scheme of Strengthening.
The device also includes:Pitching pile processing module 450, for carrying out pitching pile treatment to installation package file.
After heat treatment is carried out to installation package file, or, judge that installation package file processes it without shell adding Afterwards, pitching pile treatment can also be carried out to installation package file, one section of code or node etc. is inserted in the code of installation package file, When installation package file is run, to obtain corresponding behavioral data.
According to the device that the above embodiment of the present invention is provided, after the installation package file for obtaining application program to be analyzed, Judge whether installation package file is processed by shell adding, if so, then carrying out heat treatment to installation package file, be easy to later collection row It is data, pitching pile treatment is carried out to installation package file, can targetedly collect behavioral data, installation package file is put into sand Run in case, collect the behavioral data that installation package file is produced in the process of running, behavioral data is input to behavioral data mould In type, behavioral data is analyzed, obtains analysis result such that it is able to comprehensively monitor and analyze the operation row of application program For, and allow user to decide whether to be adjusted application program according to analysis result.
So far, although those skilled in the art will appreciate that detailed herein have shown and described multiple of the invention and show Example property embodiment, but, without departing from the spirit and scope of the present invention, still can be directly true according to disclosure of invention Determine or derive many other variations or modifications for meeting the principle of the invention.Therefore, the scope of the present invention is it should be understood that and recognize It is set to and covers all these other variations or modifications.
It will be appreciated by those skilled in the art that embodiments of the present invention can be implemented as a kind of system, device, equipment, Method or computer program product.Additionally, the present invention is not also directed to any certain programmed language, it should be appreciated that can be using each The content that programming language realizes present invention description is planted, and the description done to language-specific above is of the invention in order to disclose Preferred forms.
Although it should be noted that describing some of the device that application program is dynamically analyzed in superincumbent explanation in detail Module, but what this division was merely exemplary, it is not enforceable.It will be understood to those skilled in the art that actual On, the module in embodiment can adaptively be changed, by the multiple block combiners in embodiment an into module, Also can be by a Module Division into multiple modules.
Additionally, although describing the present invention with particular order in the accompanying drawings implements operation, this is not required that or secretly Showing must perform these operations according to the particular order, or the operation having to carry out shown in whole could realize desired knot Really.Some steps can be omitted, multiple steps are merged into a step performs, or a step is divided into multiple steps and held OK.
To sum up, the method and device dynamically analyzed using application program of the invention, is obtaining application program to be analyzed Installation package file after, installation package file is put into sandbox and is run, collect the row that installation package file is produced in the process of running It is data, behavioral data is analyzed, obtain analysis result such that it is able to comprehensively monitoring and the operation of analysis application program Behavior, and allow user to decide whether to be adjusted application program according to analysis result.
The method of the present invention and specific implementation method are described in detail above, and give corresponding implementation Example.Certainly, in addition to the implementation, the present invention can also have other embodiment, all use equivalents or equivalent transformation shape Into technical scheme, all fall within invention which is intended to be protected.
The invention discloses:A kind of method that A1, application program are dynamically analyzed, wherein, methods described includes:
Obtain the installation package file of application program to be analyzed;
The installation package file is put into sandbox and is run, collect the row that the installation package file is produced in the process of running It is data;
The behavioral data is analyzed, analysis result is obtained.
A2, the method according to A1, wherein, it is described to collect the behavior that the installation package file is produced in the process of running Data are further included:
Collect described by the application simulation device operation after kernel light-weight technologg using stain analysis and/or Hook Technique The behavioral data produced during installation package file.
A3, the method according to A2, wherein, it is described described by the application simulation device operation after kernel light-weight technologg Installation package file is specially:Application simulation device automatic running after code coverage technology is activated through kernel light-weight technologg The installation package file.
A4, the method according to any one of A1-A3, wherein, run it in the installation package file is put into sandbox Before, methods described also includes:
Judge whether the installation package file is processed by shell adding;
If so, then carrying out heat treatment to the installation package file.
A5, the method according to A4, wherein, it is described to judge whether the installation package file processes further by shell adding Including:
Script dissection process is carried out to the installation package file, judges whether include reinforcing manufacturer in the installation package file Mark and Scheme of Strengthening.
A6, the method according to A4, wherein, after heat treatment is carried out to the installation package file, methods described is also Including:
Pitching pile treatment is carried out to the installation package file.
A7, the method according to any one of A1-A3, wherein, described being analyzed to the behavioral data specifically includes: Sensitive behavior analysis, malicious act analysis, behavior trend analysis, privilege analysis and/or behavior point are carried out to the behavioral data Alanysis.
A8, the method according to any one of A1-A3, wherein, it is described that the behavioral data is analyzed, analyzed Result is further included:
The behavioral data is input in the behavioral data model for pre-setting, the behavioral data is analyzed, Analysis result is obtained, wherein, the behavioral data model is to be trained what is obtained to the behavioural characteristic in application feature database.
A9, the method according to any one of A1-A3, wherein, it is described that the behavioral data is analyzed, analyzed Result is further included:
The behavioral data is analyzed by pattern matching mode, obtains analysis result.
A10, the method according to any one of A1-A3, wherein, the behavioral data include data below in one kind or It is various:Running log, operation sectional drawing, transmission data.
A11, the method according to any one of A1-A3, wherein, the application program is mobile applications or non-moving Application program.
The invention also discloses:The device that B12, a kind of application program are dynamically analyzed, wherein, described device includes:
Acquisition module, the installation package file for obtaining application program to be analyzed;
Behavioral data collection module, runs for the installation package file to be put into sandbox, collects the installation kit text The behavioral data that part is produced in the process of running;
Analysis module, for being analyzed to the behavioral data, obtains analysis result.
B13, the device according to B12, wherein, the behavioral data collection module is further used for:Using stain point Analysis and/or Hook Technique are collected and produced during the application simulation device after kernel light-weight technologg runs the installation package file Raw behavioral data.
B14, the device according to B13, wherein, the behavioral data collection module includes:Trigger element, for passing through Code coverage technology is activated through installation package file described in the application simulation device automatic running after kernel light-weight technologg;
Behavioral data collector unit, for collecting the operation installation package file using stain analysis and/or Hook Technique During produce behavioral data.
B15, the device according to any one of B12-B14, wherein, described device also includes:Heat treatment module, is used for Judge whether the installation package file is processed by shell adding, judging the situation that the installation package file is processed by shell adding Under, heat treatment is carried out to the installation package file.
B16, the device according to B15, wherein, the heat treatment module is further used for:To installation kit text Whether part carries out script dissection process, judges include reinforcing identification of the manufacturer and Scheme of Strengthening in the installation package file.
B17, the device according to B15, wherein, described device also includes:Pitching pile processing module, for the installation APMB package carries out pitching pile treatment.
B18, the device according to any one of B12-B14, wherein, the analysis module specifically for:To the behavior Data carry out sensitive behavior analysis, malicious act analysis, behavior trend analysis, privilege analysis and/or behavior classification analysis.
B19, the device according to any one of B12-B14, wherein, the analysis module is further used for:By the row In for data input to the behavioral data model for pre-setting, the behavioral data is analyzed, obtains analysis result, its In, the behavioral data model is to be trained what is obtained to the behavioural characteristic in application feature database.
B20, the device according to any one of B12-B14, wherein, the analysis module is further used for:By pattern Matching way is analyzed to the behavioral data, obtains analysis result.
B21, the device according to any one of B12-B14, wherein, the behavioral data includes the one kind in data below Or it is various:Running log, operation sectional drawing, transmission data.
B22, the device according to any one of B12-B14, wherein, the application program is mobile applications or non-shifting Dynamic application program.

Claims (10)

1. a kind of method that application program is dynamically analyzed, it is characterised in that methods described includes:
Obtain the installation package file of application program to be analyzed;
The installation package file is put into sandbox and is run, collect the behavior number that the installation package file is produced in the process of running According to;
The behavioral data is analyzed, analysis result is obtained.
2. method according to claim 1, it is characterised in that the collection installation package file is produced in the process of running Raw behavioral data is further included:
Collected using stain analysis and/or Hook Technique and run the installation by the application simulation device after kernel light-weight technologg The behavioral data produced during APMB package.
3. method according to claim 2, it is characterised in that the application simulation device by after kernel light-weight technologg The installation package file is run to be specially:Application simulation device after code coverage technology is activated through kernel light-weight technologg Installation package file described in automatic running.
4. the method according to claim any one of 1-3, it is characterised in that be put into sandbox by the installation package file Before operation, methods described also includes:
Judge whether the installation package file is processed by shell adding;
If so, then carrying out heat treatment to the installation package file.
5. method according to claim 4, it is characterised in that it is described judge the installation package file whether by shell adding at Reason is further included:
Script dissection process is carried out to the installation package file, judges whether include reinforcing identification of the manufacturer in the installation package file And Scheme of Strengthening.
6. method according to claim 4, it is characterised in that after heat treatment is carried out to the installation package file, institute Stating method also includes:
Pitching pile treatment is carried out to the installation package file.
7. the method according to claim any one of 1-3, it is characterised in that described that tool is analyzed to the behavioral data Body includes:The behavioral data is carried out sensitive behavior analysis, malicious act analysis, behavior trend analysis, privilege analysis and/or Behavior classification analysis.
8. the method according to claim any one of 1-3, it is characterised in that described to be analyzed to the behavioral data, Analysis result is obtained to further include:
The behavioral data is input in the behavioral data model for pre-setting, the behavioral data is analyzed, obtained Analysis result, wherein, the behavioral data model is to be trained what is obtained to the behavioural characteristic in application feature database.
9. the method according to claim any one of 1-3, it is characterised in that described to be analyzed to the behavioral data, Analysis result is obtained to further include:
The behavioral data is analyzed by pattern matching mode, obtains analysis result.
10. the device that a kind of application program is dynamically analyzed, it is characterised in that described device includes:
Acquisition module, the installation package file for obtaining application program to be analyzed;
Behavioral data collection module, runs for the installation package file to be put into sandbox, collects the installation package file and exists The behavioral data produced in running;
Analysis module, for being analyzed to the behavioral data, obtains analysis result.
CN201611160804.3A 2016-12-15 2016-12-15 Method and device for dynamically analyzing application program Active CN106778247B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611160804.3A CN106778247B (en) 2016-12-15 2016-12-15 Method and device for dynamically analyzing application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611160804.3A CN106778247B (en) 2016-12-15 2016-12-15 Method and device for dynamically analyzing application program

Publications (2)

Publication Number Publication Date
CN106778247A true CN106778247A (en) 2017-05-31
CN106778247B CN106778247B (en) 2020-09-08

Family

ID=58887552

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611160804.3A Active CN106778247B (en) 2016-12-15 2016-12-15 Method and device for dynamically analyzing application program

Country Status (1)

Country Link
CN (1) CN106778247B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108009424A (en) * 2017-11-22 2018-05-08 北京奇虎科技有限公司 Virus behavior detection method, apparatus and system
CN108021806A (en) * 2017-11-24 2018-05-11 北京奇虎科技有限公司 A kind of recognition methods of malice installation kit and device
CN108920943A (en) * 2018-05-08 2018-11-30 国家计算机网络与信息安全管理中心 The method and device of installation binding behavior is detected for application software
CN109492355A (en) * 2018-11-07 2019-03-19 中国科学院信息工程研究所 A kind of software analysis resistant method and system based on deep learning
CN109740351A (en) * 2018-12-28 2019-05-10 广东电网有限责任公司 A kind of leak detection method, device and the equipment of embedded firmware
WO2020019524A1 (en) * 2018-07-27 2020-01-30 平安科技(深圳)有限公司 Data processing method and device
CN111079146A (en) * 2019-12-10 2020-04-28 苏州浪潮智能科技有限公司 Malicious software processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751052A (en) * 2013-12-30 2015-07-01 南京理工大学常熟研究院有限公司 Dynamic behavior analysis method for mobile intelligent terminal software based on support vector machine algorithm
CN105160251A (en) * 2015-07-06 2015-12-16 国家计算机网络与信息安全管理中心 Analysis method and device of APK (Android Packet) application software behavior
CN105959372A (en) * 2016-05-06 2016-09-21 华南理工大学 Internet user data analysis method based on mobile application
CN106022130A (en) * 2016-05-20 2016-10-12 中国科学院信息工程研究所 Shelling method and device for reinforced application program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751052A (en) * 2013-12-30 2015-07-01 南京理工大学常熟研究院有限公司 Dynamic behavior analysis method for mobile intelligent terminal software based on support vector machine algorithm
CN105160251A (en) * 2015-07-06 2015-12-16 国家计算机网络与信息安全管理中心 Analysis method and device of APK (Android Packet) application software behavior
CN105959372A (en) * 2016-05-06 2016-09-21 华南理工大学 Internet user data analysis method based on mobile application
CN106022130A (en) * 2016-05-20 2016-10-12 中国科学院信息工程研究所 Shelling method and device for reinforced application program

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108009424A (en) * 2017-11-22 2018-05-08 北京奇虎科技有限公司 Virus behavior detection method, apparatus and system
CN108021806A (en) * 2017-11-24 2018-05-11 北京奇虎科技有限公司 A kind of recognition methods of malice installation kit and device
CN108021806B (en) * 2017-11-24 2021-10-22 北京奇虎科技有限公司 Malicious installation package identification method and device
CN108920943A (en) * 2018-05-08 2018-11-30 国家计算机网络与信息安全管理中心 The method and device of installation binding behavior is detected for application software
WO2020019524A1 (en) * 2018-07-27 2020-01-30 平安科技(深圳)有限公司 Data processing method and device
CN109492355A (en) * 2018-11-07 2019-03-19 中国科学院信息工程研究所 A kind of software analysis resistant method and system based on deep learning
CN109740351A (en) * 2018-12-28 2019-05-10 广东电网有限责任公司 A kind of leak detection method, device and the equipment of embedded firmware
CN111079146A (en) * 2019-12-10 2020-04-28 苏州浪潮智能科技有限公司 Malicious software processing method and device

Also Published As

Publication number Publication date
CN106778247B (en) 2020-09-08

Similar Documents

Publication Publication Date Title
CN106778247A (en) The method and device that application program is dynamically analyzed
CN105184160B (en) A kind of method of the Android phone platform application program malicious act detection based on API object reference relational graphs
CN108021806B (en) Malicious installation package identification method and device
CN107360137A (en) Construction method and device for the neural network model of identifying code identification
US20180357201A1 (en) Ability-providing-data generation apparatus
CN101976187B (en) Stack tracing method and device in decompilation process and decompiler
CN106095654A (en) Performance verification device, the system with performance verification device and method
CN105701016B (en) A kind of test method for exception handling code
CN104715190A (en) Method and system for monitoring program execution path on basis of deep learning
CN110298007A (en) User behavior statistical method, device, electronic equipment and computer readable storage medium
CN111914814A (en) Wheat rust detection method and device and computer equipment
CN111460452A (en) Android malicious software detection method based on frequency fingerprint extraction
CN105487973B (en) The abnormal processor abnormality test method of continuous prize procedure
Agustian et al. Implementation of Machine Learning Using Google's Teachable Machine Based on Android
KR102418212B1 (en) Architecture-independent similarity measuring method for program function
Talasila et al. Black gram disease classification using a novel deep convolutional neural network
CN109743200B (en) Resource feature-based cloud computing platform computing task cost prediction method and system
CN110347570A (en) A kind of Code automatic build tool analysis method under IDE environment
CN114285587A (en) Domain name identification method and device and domain name classification model acquisition method and device
Volna et al. Pattern recognition and classification in time series data
CN102929614A (en) Adjustable object program characteristic extracting method for detecting loophole
Rafaila et al. Design of experiments for effective pre-silicon verification of automotive electronics
CN107317811A (en) A kind of simulation PLC implementation method
Sasaki et al. Evaluation of Flexibility to Changes Focusing on the Variable Structures in Legacy Software
CN117539367B (en) Image recognition tracking method based on interactive intelligent experiment teaching system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200728

Address after: 215028 No. 88 Dongchang Road, Suzhou Industrial Park, Jiangsu Province

Applicant after: JIANGSU PAY EGIS TECHNOLOGY Co.,Ltd.

Applicant after: JIANGSU TONGFUDUN INFORMATION SECURITY TECHNOLOGY Co.,Ltd.

Address before: Suzhou City, Jiangsu province 215021 East Road, Suzhou Industrial Park, No. 88 building 2.5 Industrial Park building C2 4F

Applicant before: JIANGSU PAY EGIS TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant