Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sample security test method and device and equipment

A technology for security testing and samples, applied in the direction of platform integrity maintenance, etc., can solve the problem that the virus cannot be detected in time.

Inactive Publication Date: 2018-01-30
ALIBABA GRP HLDG LTD
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The embodiment of the present invention provides a sample safety testing method, device and equipment to at least solve the technical problem that the virus cannot be found in time due to the continuous upgrade and mutation of the virus in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sample security test method and device and equipment
  • Sample security test method and device and equipment
  • Sample security test method and device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] According to an embodiment of the present application, a sample safety testing device is also provided, figure 1 It is a schematic structural diagram of the safety testing equipment of the sample according to Implementation 1 of the present application, and the safety testing equipment of the sample includes:

[0052] The simulator 10 is used to simulate the operating environment in which the honeypot system operates.

[0053] In the above-mentioned devices in this application, the simulator can simulate from user-level behavior data and simulator architecture features, which can include forged user SMS records, contacts, browsers, device numbers, installed application packages, and filtered simulator-specific files And set the real machine properties, etc.

[0054] In an optional embodiment, the emulator can use the qemu emulator provided by Google to emulate the operating environment of the honeypot system.

[0055] What needs to be explained here is that using a si...

Embodiment 2

[0101] According to an embodiment of the present invention, a method embodiment of a sample testing method is also provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0102] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, image 3 It is a hardware structure block diagram of a computer terminal of a sample testing method in the embodiment of the present invention. Such as image 3 As shown, the computer terminal 30 may include one or more (only one is shown in the figure) processor 302 (the processor 302 ...

Embodiment 3

[0126] Under the above operating environment, this application also provides Figure 5 Safety test method for the samples shown. Figure 5 It is a flow chart of a sample safety testing method according to Embodiment 3 of the present invention.

[0127] Step S501, obtaining a pre-configured honeypot system, and the sample to be tested runs in the operating environment determined by the honeypot system.

[0128] In the above steps of the present application, the sample may be any one or more application programs or software in the preset sample library, and the sample library may be a database containing multiple application programs or software. For example, the sample database can be stored in the network storage area of ​​the network platform, and the sample to be tested can be extracted from the network storage area when performing sample testing.

[0129] There are many ways to acquire the sample database, and this application does not specifically limit it, but only prov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sample security test method and device and equipment. The method comprises the steps that a pre-constructed honey pot system is acquired, a to-be-tested sample is run in a running environment determined by the honey pot system; the honey pot system is triggered to send test data to the running environment running the sample; and if sample interception test data is monitored and malicious operation is performed on the test data, it is determined that the sample has a security vulnerability, wherein the malicious operation comprises the behavior of executing Trojan horse operation on the test data. Through the sample security test method and device and the equipment, the technical problem that viruses in the prior art cannot be discovered in time due to ceaseless upgrade and variation is solved.

Description

technical field [0001] The invention relates to the field of software safety testing, in particular to a sample safety testing method, device and equipment. Background technique [0002] Today, with the rapid development of the mobile Internet, mobile devices have brought many conveniences and changes to people's lives, but they are always facing different levels of security risks, among which viruses and Trojan horses are one of the most common and effective attack methods. In the past two years, the number of virus and Trojan horses on the mobile terminal has continued to increase. According to the latest statistics, there are as many as 1-2w new viruses every day. There is an urgent need for a dynamic analysis engine on the mobile terminal. [0003] Taking the currently popular virus file "Trojan horse" program as an example, it disguises itself to attract users to download and execute, and provides the Trojan horse host with a portal to open the seeded host, so that the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/53G06F21/55G06F21/56
Inventor 汪海肖天明
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products