Supercharge Your Innovation With Domain-Expert AI Agents!

A target application security detection method, device and electronic equipment

A target application, security detection technology, applied in the direction of platform integrity maintenance, program/content distribution protection, etc., can solve problems such as layout confusion, program logic changes, etc., to achieve the effect of effective security detection

Active Publication Date: 2021-02-02
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can solve the problem of layout confusion to a certain extent, but it is still helpless in the face of changes in program logic caused by control flow flattening confusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A target application security detection method, device and electronic equipment
  • A target application security detection method, device and electronic equipment
  • A target application security detection method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0064] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are to distinguish two entities with the same name but different parameters or parameters that are not the same, see "first" and "second" It is only for the convenience of expression, and should not be construed as a limitation on the embodiments of the present invention, which will not be described one by one in the subsequent embodiments.

[0065] In one aspect, the present invention provides a target application security detection method.

[0066] Such as figure 1 As shown, a target application security detection method provided by some optional embodiments of the present invention includes:

[0067] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a target application security detection method, device and electronic equipment, capable of performing accurate anti-aliasing processing and effective security detection on the target application. The method includes: decompiling the target application to generate an intermediate expression; extracting the key characteristic value of the confusing control flow relationship between multiple program blocks that make up the intermediate expression; Restoring the confusing control flow relationship to obtain the normal control flow relationship; optimizing the normal control flow relationship, and generating the corresponding executable program according to the optimized normal control flow relationship; testing the security performance of the executable program, and outputting the security testing result . The device includes a decompilation module, a feature extraction module, a restoration module, an optimization module and a detection module. The electronic device includes a memory, a processor, and a computer program stored on the memory and capable of running on the processor to implement the target application security detection method.

Description

technical field [0001] The present invention relates to the technical field of intelligent terminal software security, in particular to a target application security detection method, device and electronic equipment. Background technique [0002] With the rapid popularization of smart terminal devices, the number of application software applicable to smart terminals has also shown explosive growth. With the rapid growth of mobile applications, the number and types of malicious software have also begun to increase, and the subsequent security risks have also had a serious impact. Research has found that more and more malicious software has begun to use software obfuscation technology to escape the detection of existing security detection methods, most of which use the control flow flattening method as a blueprint to change the program control flow of its own software or Complications greatly increase the difficulty of deciphering. [0003] Some existing feasible anti-obfusc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14G06F21/56
CPCG06F21/14G06F21/56
Inventor 徐国爱郭燕慧阚泽亮
Owner BEIJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More