Unlock instant, AI-driven research and patent intelligence for your innovation.

Multimedia message protocol failing mining method and system thereof

A vulnerability mining, MMS technology, applied in transmission systems, digital transmission systems, wireless network protocols, etc.

Inactive Publication Date: 2011-11-16
GRADUATE SCHOOL OF THE CHINESE ACAD OF SCI GSCAS
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In addition, the PC platform generally runs on an open TCP / IP network, which is very convenient for security vulnerability testing, while the MMS service network of smartphones is mainly based on mobile communication system, which is a closed network system, the MMS service gateway and MMS server are located in the operator's internal network, which cannot be used for testing, and the test environment under the mobile phone platform cannot be built through this network
Finally, the actual cost of sending MMS is relatively high, and it is often difficult to afford the cost of sending MMS during the process of mining MMS vulnerabilities, which is not economically cost-effective

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multimedia message protocol failing mining method and system thereof
  • Multimedia message protocol failing mining method and system thereof
  • Multimedia message protocol failing mining method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0046] 1. The specific implementation process of Fuzzing test

[0047] figure 1 The Fuzzing test implementation process adopted for the vulnerability mining of MMS service is given. First of all, the MMS protocol must be analyzed in detail to understand the types of MMS messages, the composition and meaning of the fields in each message. Please refer to the technical document Multimedia MessagingService Encapsulation Specification provided by the Open Mobile Alliance (OMA) for a detailed description of the MMS protocol format, and will not be repeated here. The second is to determine the vulnerable point to be tested, and construct the malformed data according to the vulnerable point. The malformed data is designed to be a legal MMS protocol data packet. The difference from the normal data packet is that one or more specified fields in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for discovering the vulnerabilities of a multimedia message protocol and a system of the method, which belongs to the technical filed of software engineering. The method comprises the following steps: firstly structuring a malformed data packet according to the to-be detected rothole of a multimedia message, secondly transmitting the structured malformed data packet to a target device which adopts the multimedia message protocol, thirdly adjudging whether the transmitted malformed data packet leads the abnormal response of the target device, fourthly confirming the vulnerabilities of a multimedia message protocol of the target device according to the transmitted malformed data packet which leads the abnormal response of the target device. The system of theinvention comprises a WAP gateway, an analogue multimedia information service center, an MMS information generator, the target device adopting the multimedia message protocol, and an analogue messageservice center. The invention can rapidly and effectively discover the vulnerabilities of a multimedia message protocol, in particular to an intelligent cell phone platform.

Description

technical field [0001] The invention relates to a protocol loophole mining method and system thereof, in particular to a multimedia message protocol loophole mining method and system thereof, belonging to the technical field of software engineering. Background technique [0002] Smart phones have become a popular personal electronic product in modern society. According to research forecasts, the smart phone market will continue to grow in the next few years, and global shipments will increase from 80.5 million in 2006 to 125 million in 2009 At that time, smart phones will grow to account for 16% of the global mobile phone market; on the other hand, smart phones have gradually enhanced their functions and are now able to perform complex applications such as Internet access, video on demand, stock trading, electronic meetings and document processing. However, what comes with it is that the mobile phone security problem is becoming more and more serious. At present, the number...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/06H04W4/14H04W24/04H04W24/06H04W80/12
CPCH04L63/1433H04L12/5895H04L51/38H04L69/03H04L29/06013H04L51/58
Inventor 张玉清杨丁宁宋杨徐鹏肖晖
Owner GRADUATE SCHOOL OF THE CHINESE ACAD OF SCI GSCAS