Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for judging abnormality of application program

An application program and abnormal technology, applied in the direction of instrumentation, error detection/correction, calculation, etc., can solve problems such as failure to find application program processing logic defects

Active Publication Date: 2020-10-23
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] The embodiment of the present invention provides a method and device for judging that an abnormality occurs in an application program, so as to at least solve the technical problem that the loophole mining method provided in the related art cannot find defects in the processing logic of the application program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for judging abnormality of application program
  • Method and device for judging abnormality of application program
  • Method and device for judging abnormality of application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] According to an embodiment of the present invention, a method embodiment for judging an abnormal occurrence of an application program is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions , and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0061] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a computer terminal according to a method for judging that an abnormality occurs in an application program according to an embodiment of the present invention. Such as figure 1 As shown, the co...

Embodiment 2

[0113] According to an embodiment of the present invention, a device embodiment for implementing the above method for judging that an application program is abnormal is also provided, Figure 5 It is a structural block diagram of a device for judging that an application program is abnormal according to an embodiment of the present invention. Such as Figure 5 As shown, the device includes: a first sending module 10, configured to send a control command to the host program of the application program under test during the process of the application program under test performing a playback operation on the multimedia file to be played, wherein the control command is used for Trigger the application program to be tested to interrupt the playback operation of the multimedia file to be played; the judging module 20 is used to judge whether the host program is abnormal after obtaining the control command, wherein the abnormality of the host program indicates that the application prog...

Embodiment 3

[0136] Embodiments of the present invention may provide a computer terminal, and the computer terminal may be any computer terminal device in a group of computer terminals. Optionally, in this embodiment, the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.

[0137] Optionally, in this embodiment, the foregoing computer terminal may be located in at least one network device among multiple network devices of the computer network.

[0138] Optionally, Figure 8 It is a structural block diagram of a computer terminal according to an embodiment of the present invention. Such as Figure 8 As shown, the computer terminal may include: one or more (only one is shown in the figure) processors and memory.

[0139] Wherein, the memory can be used to store software programs and modules, such as the program instructions / modules corresponding to the method and device for judging that an application program is abnormal in the embodiment of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for judging an anomaly of an application program. The method comprises the steps that in the process of executing playing operation on a to-be-played multimedia file by a to-be-tested application program, a control instruction is sent to a host program of the to-be-tested application program, wherein the control instruction is used for triggering interruption of the playing operation on the to-be-played multimedia file by the to-be-tested application program; and whether the host program has an anomaly after acquiring the control instruction is judged, wherein the anomaly of the host program indicates that the to-be-tested application program has an anomaly. Through the method and the device, the technical problem that defects of application programs in respect of processing logic cannot be discovered through vulnerability discovery modes provided in the relevant art is solved.

Description

technical field [0001] The invention relates to the field of computer software, in particular to a method and device for judging that an abnormality occurs in an application program. Background technique [0002] Vulnerabilities refer to some functional or security logic defects in the system, which can include all factors that cause threats and damage the security of the computer system. The flaws and deficiencies of the system can enable attackers to access or even destroy computer systems without authorization. [0003] Vulnerability mining refers to the exploration of unknown vulnerabilities and the comprehensive application of various technologies and tools to find potential vulnerabilities in computer systems as much as possible. [0004] Existing vulnerability mining can be divided into source code-based vulnerability mining and object code-based vulnerability mining according to different analysis objects. In addition, from the perspective of software testing in re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
CPCG06F11/3644G06F11/366
Inventor 刘晋成
Owner ALIBABA GRP HLDG LTD