Supercharge Your Innovation With Domain-Expert AI Agents!

OBEX protocol bug excavation method and system

A vulnerability mining and protocol technology, applied in the transmission system, wireless network protocol, telephone structure, etc., can solve difficult problems such as OBEX protocol security detection

Inactive Publication Date: 2010-09-01
GRADUATE SCHOOL OF THE CHINESE ACAD OF SCI GSCAS
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, at present, most of the driver development packages of the OBEX protocol on the personal computer platform are monopolized by large foreign IT commercial companies, and it is difficult for security researchers to use the computer platform to perform security detection on the OBEX protocol according to the traditional vulnerability mining method.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • OBEX protocol bug excavation method and system
  • OBEX protocol bug excavation method and system
  • OBEX protocol bug excavation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] For specific implementation methods, see Figure 9 . The first thing to work is the protocol communication module, which will list the current Bluetooth devices that can be tested for vulnerabilities for users to choose. During a complete test, the user can only select one target Bluetooth device for testing. After the user's selection, the program enters the substantive testing phase. The substantive testing phase is composed of multiple loops between the malformed data construction module, the protocol communication module and the security hole detection module. Each cycle completes the independent testing process of a certain type of vulnerability at a certain vulnerable point in the OBEX protocol.

[0072] The malformed data construction module is responsible for generating malformed data packets for the vulnerability of the OBEX protocol. Then, the protocol communication module is responsible for communicating with the target Bluetooth device, and transmits the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mining method of an OBEX protocol bug and the system thereof, which belongs to the technical field of software engineer. The method of the invention is following: firstly selecting a target device using the OBEX protocol communication and building the communication connection with the protocol; then according to the weak point structure deformed data package of the OBEX protocol, sending to the target device and receiving the responding data package of the target device; according to the received responding data package to judge the state of the target device and modulating the abnormal deformed data package for the target device, confirming the bug parameter of the OBEX protocol, the system of the invention comprises a deformed data structural module, a protocolcommunication module, a security bug detecting module. The invention makes up the blank of the OBEX protocol mining field domestically and effectively blocks the large scale economical damage for theOBEX protocol, which has a significant meaning for the national information security assurance.

Description

technical field [0001] The invention relates to a loophole mining method and system, in particular to an OBEX protocol loophole mining method and system thereof, and belongs to the technical field of software engineering. Background technique [0002] OBEX (Object Exchange) is an object exchange protocol, which is an application layer-oriented protocol for Bluetooth protocol stack, infrared protocol stack, etc. This protocol supports various applications such as file transfer, object push, synchronization, etc. Object exchange means. At present, the OBEX protocol has been widely used in data exchange among various devices such as notebook computers, mobile phones, personal digital assistants (PDAs), and digital cameras. With the rapid increase in the number of mobile personal terminals in my country, the security risks caused by the OBEX protocol loopholes have become one of the important security issues that need to be solved urgently. [0003] However, at present, most o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/02H04W80/00
CPCH04L67/04H04L29/0809H04L67/02H04L29/08108H04W80/12
Inventor 张玉清宋杨成厚富刘奇旭陈深龙
Owner GRADUATE SCHOOL OF THE CHINESE ACAD OF SCI GSCAS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More