Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A kind of Android vehicle terminal system vulnerability detection system and method

A vehicle-mounted terminal and vulnerability detection technology, applied in the field of vulnerability detection, can solve the problems of lack of vulnerability library maintenance, lack of versatility, incomplete detection results, etc., to achieve the effect of enhancing scalability and easy and convenient modification.

Active Publication Date: 2020-12-04
BEIJING UNIV OF POSTS & TELECOMM
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The current Android system vulnerability automatic detection tool detection process is very simple, lack of management of detection tasks, detection equipment and test cases, etc., so it causes unstable operation and poor compatibility on some Android system versions, because the Android platform itself also has Fragmentation is a serious problem, so existing tools cannot adapt to the ecological environment of the Android system
In addition, the existing Android system vulnerability detection tools support a small number of vulnerabilities and lack of maintenance of the vulnerability library, resulting in very incomplete detection results
[0012] The existing methods for researching Android system vulnerability detection are not universal because they only target a single vulnerability or a specific type of vulnerability, and cannot realize batch detection of vulnerabilities, with low automation and low efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of Android vehicle terminal system vulnerability detection system and method
  • A kind of Android vehicle terminal system vulnerability detection system and method
  • A kind of Android vehicle terminal system vulnerability detection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] Attached to the following Figure 1-4 The present invention will be described in further detail.

[0086] The tool is divided into three modules: Android vehicle terminal system vulnerability library module, Android vehicle terminal system vulnerability detection module, vehicle terminal system vulnerability detection report generation module. The system architecture diagram is as follows figure 1 shown.

[0087] 1) Vehicle terminal system vulnerability library module

[0088] (1) Vulnerability collection

[0089] Before building the vehicle terminal system vulnerability library, it is necessary to collect relevant typical vulnerabilities and study their vulnerability principles and other information. Vulnerabilities of typical operating systems are collected from three channels: related vehicle operating system vulnerabilities released by standard vulnerability libraries such as CVE and CNNVD, vulnerabilities collected from the Internet, and self-mining vulnerabili...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an Android vehicle-mounted terminal system vulnerability detection system and method. The detection system comprises a vehicle-mounted terminal system vulnerability library module, a vehicle-mounted terminal system vulnerability detection module and a vehicle-mounted terminal system vulnerability detection report generation module. The system can detect vulnerabilities existing in a connected Android vehicle-mounted terminal system and report a detection result to a user. Through investigation and analysis of an existing method and a detection tool, the Android vehicle-mounted terminal system vulnerability detection method is based on a Trade Federation test framework and is assisted by construction of a vehicle-mounted terminal system vulnerability test case, andfinally Android vehicle-mounted terminal system vulnerability detection is achieved. The vulnerability detection system can realize the functions of equipment management, test case management, test task scheduling execution and the like, and is favorable for helping timely discover and repair system vulnerabilities so as to improve the safety of a vehicle-mounted terminal operating system.

Description

technical field [0001] The invention relates to a vulnerability detection technology, belonging to the technical field of software security in information security, in particular to a vulnerability detection system and method of an Android vehicle-mounted terminal system. Background technique [0002] Since the Android vehicle terminal system is based on the Android system, and the system architecture is basically the same, the method of vulnerability detection on the Android system can also be transplanted to the vehicle terminal system. At present, the representative Android system vulnerability detection tools in China mainly include: VTS (Vendor Test Suite) and X-Ray, but there are also limitations of poor compatibility. [0003] X-Ray can detect unpatched vulnerabilities in Android devices, and X-Ray learns in detail about a class of vulnerabilities known as "privilege escalation." Malicious applications can exploit such vulnerabilities to gain root privileges on the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/56
CPCG06F21/566G06F21/577
Inventor 张淼徐国爱王晓婷孟庆儒
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products