Android application vulnerability detection method and system based on function control flow

A technology of vulnerability detection and control flow, applied in the field of communication, can solve problems such as high system load, achieve the effect of shortening inspection time, reducing requirements of testers, and improving analysis efficiency

Active Publication Date: 2016-06-15
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to solve the high burden on the system caused by multiple simulated data flow runs in the existing analysis methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android application vulnerability detection method and system based on function control flow
  • Android application vulnerability detection method and system based on function control flow
  • Android application vulnerability detection method and system based on function control flow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The invention will be described in further detail below in conjunction with the accompanying drawings.

[0029] The explanation of terms involved in the present invention includes:

[0030] The function control flow graph refers to a linked list structure obtained through static analysis, which indicates the entry function of the program and the order in which the functions call each other, as well as the end exit of the program, which can be regarded as the function call operation sequence of each step of the program.

[0031] The test case generation method based on the function control flow chart of the present invention specifically includes:

[0032] Step 1: Apply static analysis technology to decompress the apk package to obtain the software source code, and analyze the source code. Due to the characteristics of Android software coding and its own system, it is necessary to analyze the ContentProvider, BroadcastReceiver, Service and The registration status of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an android application vulnerability detection method and system based on function control flow. The method includes the steps that on the basis of an existing static analysis method, an existing dynamic analysis method and a dynamic-static combination method, a function control flow diagram is obtained through once code analysis operation; an accurate dynamic analysis testing case is made according to the function control flow diagram, and dynamic testing is automatically conducted. In this way, the defect of high loads, caused when running of data flow is simulated multiple times in an existing analysis method, of a system is overcome. According to the android application vulnerability detection method and system, the testing cast is generated through the function control flow diagram, a testing system framework suitable for the method is provided, the defect that an existing analysis technology is low in analysis speed is overcome accordingly, and testing efficiency is improved.

Description

technical field [0001] The invention discloses an Android application vulnerability detection method and system based on a function control flow, and belongs to the technical field of communication. Background technique [0002] Smartphones have grown rapidly in recent years. Not only do daily life rely more and more on them to provide convenient and fast functions, but they have even penetrated into important industries such as government, education, medical care, and military affairs. The Internet has been widely used in various undertakings in our country. It has brought great changes to our life, work and study, greatly accelerated the development of society, enriched and facilitated people's lives. Because of this, Android is the target of many malware attacks. Moreover, these attacks are increasingly aimed at users' personal privacy data, such as geographic location, contacts, mobile phone numbers, mobile phone serial numbers, and text messages. An Android applicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36G06F21/56
CPCG06F11/3668G06F11/3684G06F21/563G06F21/566G06F2221/033
Inventor 孙知信叶萌宫婧骆冰清
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products