首页> 外国专利> Detecting a malicious application executing in an emulator based on a check made by the malicious application after making an API call

Detecting a malicious application executing in an emulator based on a check made by the malicious application after making an API call

机译:进行API调用后,根据恶意应用程序进行的检查来检测在模拟器中执行的恶意应用程序

摘要

Detecting a malicious application executing in an emulator based on a check made by the malicious application after making an API call. In one embodiment, a method may include executing an application in an emulator that emulates a real-world computing environment. The method may also include detecting, in the application, an API call configured to accept a parameter and return a variable return value to a return address in the application. The method may further include detecting, at the return address, a check to be performed on the variable return value returned by the API call. The method may also include, in response to the detecting of the check, determining that the application is malicious. The method may further include performing a security action on the malicious application to prevent the malicious application from executing in the real-world computing environment.
机译:在进行API调用后,根据恶意应用程序进行的检查来检测在模拟器中执行的恶意应用程序。在一个实施例中,一种方法可以包括在仿真现实世界计算环境的仿真器中执行应用。该方法还可以包括在应用程序中检测被配置为接受参数并将变量返回值返回到应用程序中的返回地址的API调用。该方法可以进一步包括在返回地址处检测要对由API调用返回的可变返回值执行的检查。该方法还可以包括:响应于检查的检测,确定应用程序是恶意的。该方法可以进一步包括对恶意应用程序执行安全动作,以防止恶意应用程序在现实世界计算环境中执行。

著录项

  • 公开/公告号US10621348B1

    专利类型

  • 公开/公告日2020-04-14

    原文格式PDF

  • 申请/专利权人 CA INC.;

    申请/专利号US201715678096

  • 发明设计人 MIRCEA CIUBOTARIU;PRITI NACHIKET MORE;

    申请日2017-08-15

  • 分类号G06F21/56;G06F21/53;

  • 国家 US

  • 入库时间 2022-08-21 11:30:36

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号