Stack safety detection method and device and mobile equipment

A detection method and security technology, applied in the security field, can solve problems such as inaccurate detection of compilation protection

Active Publication Date: 2019-04-02
BEIJING BANGCLE TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the prior art, even if the compiled function is protected by the compiler stack, it does not mean that the stack after the compiler stack protection is absolutely safe. One of the reasons may be to protect the code during the process of compiling the stack protection. The protection code is only inserted and the verification code is set for a certain type of specific function, and the rest of the functions are safe by default (that is, no protection code is inserted and no verification code is set for the rest of the functions), so that the compilation protection can only be executed when a specific function is attacked. Perform accurate detection; if other functions are attacked, the compilation protection cannot accurately detect the attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stack safety detection method and device and mobile equipment
  • Stack safety detection method and device and mobile equipment
  • Stack safety detection method and device and mobile equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] In order to solve the problem in the prior art that the protection code only inserts the protection code for a certain type of specific function and checks the protection code in the process of compiling the stack protection, the rest of the functions are safe by default (that is, no protection code is inserted for the rest of the functions), resulting in only When a specific function is attacked, the attack can be accurately detected; if other functions are attacked, the method cannot accurately detect the attack. The embodiment of the present invention provides a stack security detection method.

[0033] The execution subject of the method may be a server used to detect the application installation package or a detection system (or detection program) running on the server; or, the execution subject of the detection method of the stack security may be a The client (or client) of the package, etc.

[0034] For the convenience of describing Embodiment 1 of the present ap...

Embodiment 2

[0071] In order to solve the problem existing in the prior art that the stack security cannot be accurately detected, an embodiment of the present invention provides a stack security detection device 20. The specific structural diagram of the device is as follows figure 2 Shown, comprise target file acquisition module 21, protection code acquisition module 22, judgment module 23 and determination module 24, the function of each module is as follows:

[0072] The target file obtaining module 21 is used to obtain the target file used to save the compilation information from the application installation package to be tested;

[0073] Preferably, in the implementation of the present invention, the target file acquisition module can include:

[0074] The source file acquisition unit is used to decompress the installation package of the application to be tested to obtain the source file of the application;

[0075] The target file obtaining unit is used to obtain the target file f...

Embodiment 3

[0087] Preferably, the embodiment of the present invention also provides a mobile device 300, including image 3 The shown processor 310, the memory 309, and the computer program stored in the memory 309 and operable on the processor 310, when the computer program is executed by the processor 310, realize the stack security described in the above-mentioned embodiments Each process of the detection method can achieve the same technical effect, and will not be repeated here to avoid repetition.

[0088] image 3 A schematic diagram of the hardware structure of a smart device for realizing various embodiments of the present invention, the smart device 300 includes but not limited to: a radio frequency unit 301, a network module 302, an audio output unit 303, an input unit 304, a sensor 305, a display unit 306, User input unit 307, interface unit 308, memory 309, processor 310, power supply 311 and other components. Those skilled in the art can understand that, image 3 The str...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a stack safety detection method, which is used for solving the problem that the stack safety cannot be accurately detected in the prior art. The method comprises the steps thata target file used for storing compilation information is acquired from a to-be-tested application installation package; obtaining a protection code inserted during compiling from the decompiled target file; judging whether a character matched with a preset first keyword exists in the protection code or not, wherein the preset first keyword represents to start a global compilation protection mode; and determining the security condition of the stack according to a matching result of the protection code and a preset first keyword. The invention also discloses a stack security detection device,a mobile terminal and a computer readable storage medium.

Description

technical field [0001] The present invention relates to the field of security technologies, in particular to a stack security detection method, device, mobile terminal and computer-readable storage medium. Background technique [0002] In the prior art, stack overflow is a relatively common security vulnerability in application installation packages. For example, when the stack overflows, the attacker will write data exceeding the length of the array in the stack area storing stack elements, making the stack The return address of the calling function is overwritten with data exceeding the length of the array, causing the calling function to jump to the malicious code or shellcode injected by the attacker (code or filling data used to obtain application permissions) for execution when the calling function returns, thereby causing the application to install The package is corrupted. [0003] In order to ensure the security of the application installation package, protection c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/57G06F8/53
CPCG06F8/53G06F21/563G06F21/565G06F21/577G06F2221/033
Inventor 阚志刚曹卫兵倪冬鹤徐磊刘义张志勇张陈陈陈彪
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products