Apk security risk automatic static auditing system and method

A security risk, static technology, applied in the field of mobile information security, can solve the problems of large amount of log information, unaudited code normative, too much redundant information, etc., to reduce workload, review efficiency, and reduce workload. Effect

Pending Publication Date: 2017-07-07
SHENZHEN NENGSHI INFORMATION SECURITY
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, this review method needs to rely on the operating system log module and APP operation logs. The log information volume is large and there are too many redundant information. Therefore, a large number of complex analysis work is required to correctly analyze the malicious behavior of the APP. , this method also cannot audit the standardization of the code
On the other hand, it is necessary to run or simulate running the APP for a relatively long period of time to collect enough logs to audit the behavior of the APP in a more comprehensive way. Only in the running stage can the security problems of the APP be found. The audit granularity of the audit system is not fine enough. Inadequacies in audit security and flexibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apk security risk automatic static auditing system and method
  • Apk security risk automatic static auditing system and method
  • Apk security risk automatic static auditing system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described in detail below in conjunction with the drawings and specific embodiments.

[0041] The present invention proposes an Apk security risk automated static audit system and method. The method is based on FlowDroid static stain analysis. When FlowDroid stain analysis deals with access to object domains or arrays, objects and arrays are processed through reverse alias analysis Reference problem, the time complexity rises to O(n 2 ). This method introduces the memory object model and fuzzy branch analysis on this basis. The introduction of the memory object model reduces the time complexity of processing object fields or arrays to O(n), and asynchronously calls functions and the life cycle of Android applications Related functions are included in the audit scope to expand the audit coverage of the App; the introduction of fuzzy branch analysis solves the detection problems of unknown value branches, infinite loop branches and infin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an Apk security risk automatic static auditing system and method. The method comprises the steps that S101, an AndroidManifest.xml file, a classes.dex file and a resource file of an Apk are decompiled, and a basic function call graph is generated according to Dalvik byte codes and the AndroidManifest.xml file; S102, an asynchronous call function and a life cycle relevant function in an Android bank are both added into the basic function call graph to obtain a spread function call graph; S103, code paths in the spread function call graph are filtered to obtain a suspicious path set containing possible taint data propagation behaviors; and S104, a taint analyzer performs simulation execution on a byte code instruction of a function of each suspicious path in the suspicious path set, taint analysis is performed based on a memory object model, and taint data information and a taint data propagation behavior are accurately detected. Through the Apk security risk automatic static auditing system and method, security auditing analysis can be performed on an Apk application comprehensively, quickly and effectively, and high practicability is achieved.

Description

Technical field [0001] The invention relates to the technical field of mobile information security, in particular to an Apk security risk automated static audit system and method. Background technique [0002] With the development of the mobile Internet, more and more attention has been paid to the security of mobile terminals. In particular, the rapid development of the Android system has made the Android platform gradually become the world's largest mobile terminal platform. Its products cover set-top boxes, mobile phones, tablets, and various smart terminals, which affect people's lives from all angles. Moreover, the functions of these smart terminals are becoming more powerful, including voice calls, data services, and NFC near field communication. Android smart terminals have penetrated deeply into each of our lives, including payment services, life services, map services, entertainment services, personal information services and so on. In this case, the number of users of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/45
CPCG06F8/427G06F8/43G06F8/53
Inventor 符利华
Owner SHENZHEN NENGSHI INFORMATION SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products