首页>
外国专利>
computer-implemented method for identifying the Trojan horse of applications for the mobile environment (application), non-transitory computer-readable media and computer systems
computer-implemented method for identifying the Trojan horse of applications for the mobile environment (application), non-transitory computer-readable media and computer systems
Trojanized apps for mobile environments are identified. Multiple apps for a specific mobile environment are obtained from one or more external sources. Code and digital signers are extracted from the apps and stored. For each given specific one of the obtained apps, the code of the specific app is compared to the code of other obtained apps, to determine whether the specific app 1) contains at least a predetermined threshold amount of code in common with one of the other apps, and 2) contains additional code not contained therein. If so, the digital signer of the specific app is compared to the digital signer of the other app. If it is also the case that the digital signer of the specific app is not the same as the digital signer of the other app, the specific app is identified as being trojanized.
展开▼