Check patentability & draft patents in minutes with Patsnap Eureka AI!

A third-party library detection method and device

A detection method and technology of a square library, which are applied in computer security devices, program code conversion, instruments, etc., can solve the problems of low detection efficiency, large amount of calculation, source code confusion, etc., so as to improve detection efficiency, improve matching accuracy, The effect of reducing the amount of calculation

Active Publication Date: 2022-02-11
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to prevent decompilation and obtaining source code, general applications will confuse the source code, and the name of the third-party library called is changed, which is not conducive to detecting the third-party library and its security
[0003] The current third-party library detection methods, such as whitelist-based detection, cluster-based detection, and feature-matching-based detection, etc., require feature extraction and matching for the third-party library as a whole, which requires a large amount of calculation, and the large amount of features affects matching. Accuracy, detection efficiency is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A third-party library detection method and device
  • A third-party library detection method and device
  • A third-party library detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0056] It should be noted that, unless otherwise defined, the technical terms or scientific terms used in one or more embodiments of the present specification shall have ordinary meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar words used in one or more embodiments of the present specification do not indicate any order, quantity or importance, but are only used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items. Words such as "connected" or "con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

One or more embodiments of this specification provide a method and apparatus for detecting a third-party library, including: decompiling an application package to identify an obfuscated third-party library to be tested; determining the core logic used to represent the third-party library to be tested class; extract multiple instruction features from the core logic class to form a feature file; in response to the feature file and the standard library file of the standard library reaching a preset matching condition, the third-party library to be tested is the standard library. This specification can reduce the amount of calculation, improve the matching accuracy, and improve the detection efficiency.

Description

technical field [0001] One or more embodiments of this specification relate to the field of software technology, and in particular to a third-party library detection method and device. Background technique [0002] Third-party libraries are widely used to build new functions or integrate external services, and at the same time there is a security problem of attacking the host application. In order to prevent decompilation and obtaining source code, common applications will obfuscate the source code, and the name of the third-party library called is changed, which is not conducive to the detection of the third-party library and its security. [0003] The current third-party library detection methods, such as whitelist-based detection, cluster-based detection, and feature-matching-based detection, etc., require feature extraction and matching for the third-party library as a whole, which requires a large amount of calculation, and the large amount of features affects matching....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F8/53G06F21/56
CPCG06F8/53G06F21/566
Inventor 高飞文惠东秦素娟温巧燕李文敏
Owner BEIJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More