Supercharge Your Innovation With Domain-Expert AI Agents!

Guide symbolic execution method and system based on A-Star and Android application

A symbol execution and bootstrap technology, applied in the field of Android applications, can solve the problems of path explosion, large useless test data, time-consuming and other problems, and achieve the effect of reducing the number of loops, reducing the symbol execution time, and reducing the time consumption.

Inactive Publication Date: 2018-10-19
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In summary, the problems in the prior art are: The depth-first traversal algorithm used in the traditional symbolic execution technology is prone to path explosion; a large amount of useless test data is generated, which consumes a lot of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Guide symbolic execution method and system based on A-Star and Android application
  • Guide symbolic execution method and system based on A-Star and Android application
  • Guide symbolic execution method and system based on A-Star and Android application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0044] In the present invention, the path constraint conditions related to the loopholes are obtained by the A* algorithm guiding the program to execute the dangerous area, the original library file is translated and divided into basic blocks by the assembly conversion method, and the symbol execution process is optimized by the basic block reuse method and the loop simplification method.

[0045] The application principle of the present invention will be described in detail below with reference to the accompanying drawings.

[0046] Such as figure 1 As shown, the A-Star-based guided symbol execution method provided by the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of computer vulnerability mining, and discloses a guide symbolic execution method and system based on A-Star and an android application. According to the method, a dangerous region is executed by an A-Star algorithm bootstrap to obtain vulnerability-related path constraints; native library files are translated and divided into basic blocks using an assembly transformation method; and the symbolic execution process is optimized using a basic block reuse method and a loop simplification method, so as to realize the rapid discovery and location of vulnerabilities in a native library of Android. The invention adopts the loop simplification method, and performs optimization in the path traversal process according to two conditions of a specified number of times of loops and an infinite loop, so as to reduce the number of times of loops and difficulty of solving the path constraint conditions. The invention adopts the basic block reuse method to store the analyzed basic block state, prevents the symbolic execution technology from repeatedly analyzing the basic blocks in the program, reduces the symbolic execution time, and improves the symbolic execution efficiency.

Description

Technical field [0001] The invention belongs to the technical field of computer vulnerability mining, and in particular relates to a guided symbol execution method and system based on A-Star (A* algorithm), and an Android application program. Background technique [0002] At present, the existing technology commonly used in the industry is as follows: In recent years, with the continuous development of the Android application market and the continuous development of vulnerability mining technology, the number of vulnerabilities has been increasing. Since Android officially entered the mass market in 2008, the number of vulnerabilities has been increasing. According to official data, a large number of Android system vulnerabilities broke out in 2014. The main reason is that the SSL protocol library appeared. Multiple vulnerabilities with a wide range of impacts have affected a large number of applications; 92% of the total number of vulnerabilities that year were such vulnerabilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F9/4401G06F9/445
CPCG06F9/4406G06F9/44521G06F21/577
Inventor 孙黎婉
Owner XIDIAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More