Unlock instant, AI-driven research and patent intelligence for your innovation.

Permission improvement vulnerability detection method and related device

A technology of privilege escalation and detection method, applied in the field of detection, can solve problems such as low efficiency and high difficulty, and achieve the effect of improving efficiency and user experience

Pending Publication Date: 2019-07-12
GUANGDONG UNIV OF TECH
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are already many detection methods for the detection of android application privilege escalation vulnerabilities, but many detection methods need to modify the source code of the android system and dynamically monitor the communication behavior between them when the application is running, which is more efficient than the static analysis method low, difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission improvement vulnerability detection method and related device
  • Permission improvement vulnerability detection method and related device
  • Permission improvement vulnerability detection method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0051] The detection of the common android application privilege escalation vulnerability needs to modify the source code of the android system and dynamically monitor the communication behavior between them when the application is running, which is less efficient and more difficult than the static analysis method. Based on the above-mentioned tec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a permission improvement vulnerability detection method. The permission improvement vulnerability detection method comprises the steps of obtaining a CClink comprising a sending component, a medium component and a receiving component; when the receiving component in the CCLink declines the permision attribute, judging whether the sending component declines the corresponding(uses-permision) attribute or not; if the (uses-permision) attribute is not declared, judging whether the media component has a (uses-permision) attribute corresponding to the (permision) attribute of the receiving component or not; if the media component has the (uses-permision) attribute, judging whether the media component has the (permision) attribute or not; and if the permissive attribute is not set for the media component, determining that the permission improvement problem exists. The authority is automatically detected to improve the vulnerability, manual interference is not needed,the efficiency is improved, the user experience is improved, and meanwhile, the invention further provides a device, electronic equipment and a computer readable storage medium which all have the above beneficial effects.

Description

technical field [0001] The present application relates to the technical field of detection, and in particular to a detection method, device, electronic equipment, and computer-readable storage medium for privilege escalation vulnerabilities. Background technique [0002] With the rapid development of the mobile Internet, the functions of smart mobile devices are becoming more and more powerful, which is profoundly affecting people's daily life. In daily life, people rely more and more on intelligent technology. Therefore, there is a large amount of personal information stored on smart devices. Due to the open source of android source code, the risks of the application components developed by it have attracted more and more attention. [0003] Intent is the main medium of inter-component communication (ICC) in android applications. ICC methods such as startActivity(intent), startService(intent), and sendBroadcast(intent) can start Activity and Service, or send broadcast messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 柳毅陈宇彤凌捷欧毓毅
Owner GUANGDONG UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More