Method for tracking source code vulnerability correlation influence of Android system

A system source and loophole technology, applied in the direction of instruments, electrical digital data processing, platform integrity maintenance, etc., can solve problems such as incomplete update of system module functions, and achieve the effect of overcoming industrial utilization value, perfect system functions, and quick positioning.

Active Publication Date: 2015-12-23
青岛工业软件研究所
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of the deficiencies in the existing technology, the technical problem to be solved by the present invention is to provide a link point for tracing or finding system loopholes, which can make the patching of loopholes more comprehensive and perfect, and locate loopholes conveniently and quickly Correlation problem, solve the system module function update and repair the imperfect defect, the tracking method of the Android system source code vulnerability correlation impact

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for tracking source code vulnerability correlation influence of Android system
  • Method for tracking source code vulnerability correlation influence of Android system
  • Method for tracking source code vulnerability correlation influence of Android system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail;

[0033] like figure 1 , 2 , 3, and 4, a method for tracking the impact of Android system source code vulnerabilities, including the following steps:

[0034] 1. Generate components

[0035] (1) Artificially analyze and divide the Android source code into multiple layers and modules. Most of the structure of the Android system will not change greatly during the upgrade process, and can be divided into multiple modules, such as Application and kernel layers, and then divided into layers Multiple modules, folders and files under the module can be used as components, and there are software elements such as classes or functions under the file component;

[0036] (2), scan the Android source code directory, use the folders and files under each module as components, generate multiple corresponding components, and define a set of component rules;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for tracking the source code vulnerability correlation influence of an Android system. The method comprises the following steps that 1, components are generated, namely artificial analysis is performed, the Android source codes are divided into multiple levels of modules, and a set of component rules is defined; 2, software element storage, display and checking are performed, namely Android source code analysis is performed according to doxygen to display and check correlation relationship and detailed information; 3, locking and vulnerability mending are performed, namely the vulnerability correlation problem can be more conveniently and quickly positioned to enable system functions to be more perfect when an Android system manufacturer develops or upgrades a new product. The correlated information of correlative elements can be checked by means of the system, for example, all software elements correlated with vulnerabilities or module functions when the system product vulnerabilities are produced or the module functions are updated, comprehensive and accurate positioning is achieved, and more guarantee is provided for the safety and stability of the system.

Description

technical field [0001] The invention relates to the technical field of computer program loophole detection, in particular to a method for tracking the correlation impact of Android system source code loopholes. Background technique [0002] Android is a Linux-based free and open-source operating system primarily used on mobile devices such as smartphones and tablets. With the development of the electronic market in recent years, new mobile devices have been introduced, and newer applications have been released continuously, making it more and more convenient and fast for experiencers to live, study, socialize and other fields. Compared with other operating systems such as WindowsPhone and iOS, Android has great advantages and advantages. In terms of advantages, the Android platform is first of all its openness, and the developed platform allows any mobile terminal manufacturer to join Android. At the same time, Android has a very high market share because of its high cost ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 郭亮王风涛张鲲王超周涛郭培辉齐福强王振军
Owner 青岛工业软件研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products