Zero false alarm detection method for Android App vulnerabilities

A detection method and vulnerability technology, applied in the fields of instruments, electrical digital data processing, platform integrity maintenance, etc., can solve problems such as slow program execution, verification loopholes, and high false positive rate, so as to solve the problem of high false positive rate and improve accuracy. rate, the effect of reducing the number of

Pending Publication Date: 2020-10-30
北京九州正安科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of dynamic instrumentation is: the overhead of instrumentation occurs when the program is running, which makes the execution of the program very slow; and dynamic instrumentation is more difficult to achieve - it is not easy to rewrite the executable code at runtime. instructions while avoiding interference with the execution of the program itself
[0006] Most of the existing Android App vulnerability detection tools use static analysis and dynamic analysis techniques. Static analysis tools cannot verify vulnerabilities in the running state, and there is a high false positive rate; dynamic analysis tools can verify vulnerabilities, but the generated test cases are blind. high performance, low operating efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zero false alarm detection method for Android App vulnerabilities
  • Zero false alarm detection method for Android App vulnerabilities
  • Zero false alarm detection method for Android App vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Such as figure 1 Shown, the realization steps of the present invention are as follows:

[0020] 1. Analyze the experience and knowledge of Android App vulnerabilities, summarize the comprehensive description of detection and trigger vulnerabilities

[0021] The present invention summarizes the comprehensive description of detecting and triggering the vulnerability by analyzing the attack path of the vulnerability, the CVE report, the experience knowledge of the vulnerability such as the Android development document, and comprehensively describes the type of the vulnerability. The summarized information includes: (1) components, that is, objects with vulnerabilities in Android App; (2) attributes, that is, the necessary conditions for generating vulnerabilities; (3) entry functions, that can be rewritten by developers and accept external inputs belonging to (1 ) function set; (4) target function, a set of functions that can trigger vulnerabilities. They are usually sys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a zero false alarm detection method for Android App vulnerabilities, which comprises the following steps of: 1) analyzing experience knowledge (such as vulnerability attack paths, CVE reports and the like) of the Android App vulnerabilities, and summarizing, detecting and triggering comprehensive description of the vulnerabilities; 2) App feature extraction: statically searching vulnerability attributes and constructing field values required by a test case and a trigger; 3) performing exploration path constraints by using symbols, and filtering invalid field values in the step 2); 4) dynamically generating a test case and a trigger, and triggering the target App; 5) performing dynamic binary instrumentation on the entry function and the target function of the targetApp; 6), if the behavior of the target function is matched with the vulnerability behavior, judging that the vulnerability exists. According to the zero false alarm detection method, the informationfor detecting and triggering the vulnerability is summarized by analyzing the experience knowledge of the vulnerability; meanwhile, static analysis, symbolic execution and the dynamic binary instrumentation technology are combined for detecting and verifying the vulnerability, and the zero-false-alarm detection effect is achieved.

Description

technical field [0001] The invention relates to a zero-false-positive detection method for Android App vulnerabilities, which is mainly used in the development of Android App vulnerability detection systems. Background technique [0002] Static analysis technology: referred to as static analysis or static detection, is a white box testing technology. This detection technology does not need to be performed when the system is running, but only through lexical analysis, syntax analysis, data flow analysis and other operations on the source code of the application, and according to various analysis results to detect whether the source code of the target application is standardized, Whether there are security threats to the application, whether the reliability and maintainability of the application meet certain standards, and so on. The more commonly used static code analysis techniques include: lexical analysis and syntax analysis, control flow analysis and data flow analysis, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/562G06F21/566G06F21/577
Inventor 梁洪亮杨天琪姜琳
Owner 北京九州正安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products