首页> 外国专利> computer-implemented method for identifying the Trojan horse of applications for the mobile environment (application), non-transitory computer-readable media and computer systems

computer-implemented method for identifying the Trojan horse of applications for the mobile environment (application), non-transitory computer-readable media and computer systems

机译:用于识别移动环境(应用程序),非暂时性计算机可读介质和计算机系统的应用程序的特洛伊木马的计算机实现方法

摘要

Trojanized apps for mobile environments are identified. Multiple apps for a specific mobile environment are obtained from one or more external sources. Code and digital signers are extracted from the apps and stored. For each given specific one of the obtained apps, the code of the specific app is compared to the code of other obtained apps, to determine whether the specific app 1) contains at least a predetermined threshold amount of code in common with one of the other apps, and 2) contains additional code not contained therein. If so, the digital signer of the specific app is compared to the digital signer of the other app. If it is also the case that the digital signer of the specific app is not the same as the digital signer of the other app, the specific app is identified as being trojanized.
机译:确定了用于移动环境的木马化应用程序。可从一个或多个外部来源获得针对特定移动环境的多个应用程序。从应用程序中提取并存储了代码和数字签名者。对于获得的应用程序中的每个给定特定应用程序,将特定应用程序的代码与其他获得的应用程序的代码进行比较,以确定特定应用程序1)是否包含至少一个与另一个应用程序相同的预定阈值代码应用,以及2)包含其中未包含的其他代码。如果是这样,则将特定应用程序的数字签名者与另一个应用程序的数字签名者进行比较。如果还存在特定应用程序的数字签名者与其他应用程序的数字签名者不同的情况,则该特定应用程序将被识别为木马。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号