Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerability testing method and device based on vehicle-mounted terminal system

A terminal system, vehicle terminal technology, applied in the field of Internet information, can solve the problems of unstable operation process, serious fragmentation of Android system, poor compatibility, etc.

Active Publication Date: 2019-10-18
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] At present, the domestic mainstream Android system vulnerability automation testing tools have the problems of poor compatibility and unstable operation process on higher operating system versions; the number of vulnerabilities covered by these two tools is very small, and it is not conducive to expansion, and the detection information is very limited
Although foreign vulnerability detection tools can achieve the purpose of vulnerability detection, the fragmentation problem of the Android system is very serious, resulting in large errors in detection results
[0015] In addition, these tools are not fully suitable for the vulnerability detection of the vehicle terminal system because they are only for the vulnerability detection of the Android system and do not take into account the particularity of the vehicle terminal system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability testing method and device based on vehicle-mounted terminal system
  • Vulnerability testing method and device based on vehicle-mounted terminal system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the solutions of the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0030] In the prior art, the vulnerability detection is all aimed at the operating system, without taking into account the particularity of the vehicle terminal system. Therefore, the present invention provides a method and device for testing vulnerabilities based on the vehicle terminal system. The script and script execution environment are designed for each vulnerability of the vehicle terminal system, so the loopholes can be accurately triggered and the loopholes can be detected.

[0031] In one embodiment,

[0032] A schematic flow chart of a vulnerability testing method based on a vehicle-mounted terminal system provided by an embodiment of the present invention is as follows: figure 1 as shown,

[0033] First introduce how the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability testing method and device based on a vehicle-mounted terminal system. The vulnerability testing method specifically comprises the following steps: A, acquiring asystem architecture of a to-be-tested vehicle-mounted terminal system; B, acquiring a vulnerability verification script number of a vulnerability verification script library and corresponding vulnerability verification script execution environment information; vulnerability verification script execution result information containing various vulnerability verification script execution results is also obtained; C, preparing a test environment according to the vulnerability verification script execution environment information; wherein the vulnerability verification script execution environmentinformation comprises whether root permission needs to be obtained or not, a script execution terminal directory and whether execution permission needs to be given or not; D, loading a vulnerability verification script file under the corresponding system architecture according to the vulnerability verification script number; and E, executing the vulnerability verification script file to obtain a corresponding vulnerability verification script execution result, comparing the vulnerability verification script execution result with vulnerability verification script execution result information toobtain a vulnerability detection result, and storing the vulnerability detection result in a vulnerability detection result information base. By adopting the method and the device, the vulnerabilitycan be accurately triggered and detected.

Description

technical field [0001] The invention relates to the field of Internet information technology, in particular to a method and device for testing vulnerabilities based on a vehicle-mounted terminal system. Background technique [0002] In the era of the Internet of Vehicles, cars can be connected to smart terminals and the Internet through the vehicle terminal system to realize entertainment, navigation, traffic information and other services. Automotive terminal systems often use embedded Linux, QNX, Android, etc. as operating systems. Currently, mainstream automotive terminal systems are mainly developed by manufacturers based on the Android operating system. Therefore, for the vehicle terminal security detection method, you can refer to the Android system vulnerability detection method. [0003] At present, the common automated testing tools for system vulnerabilities in China include: VTS and X-Ray. [0004] Android VTS [0005] At the end of 2015, NowSecure released an ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 李政吴志敏李承泽吴昊范乐君肖佃艳王智勇
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT