Vulnerability detection method and device for application program, equipment, storage medium and program

An application and vulnerability detection technology, applied in the computer field, can solve problems such as difficult to understand and difficult to detect security vulnerabilities, and achieve the effect of high efficiency, easy location and high accuracy of problem location and repair.

Pending Publication Date: 2022-04-29
奇安盘古(上海)信息技术有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, decompiled codes such as assembly classes obtained through reverse tools are not easy to understand, and it is difficult to detect security vulnerabilities based on such decompiled codes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device for application program, equipment, storage medium and program
  • Vulnerability detection method and device for application program, equipment, storage medium and program
  • Vulnerability detection method and device for application program, equipment, storage medium and program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] To make the object, technical solution and advantages of embodiments of the present invention more clear, the following will be combined with the accompanying drawings in the embodiments of the present invention, the technical solutions in the embodiments of the present invention are clearly and completely described, obviously, the embodiments described are part of the embodiments of the present invention, not all embodiments. Based on embodiments in the present invention, all other embodiments obtained by those of ordinary skill in the art without making creative labor, are within the scope of protection of the present invention.

[0046] The method of embodiments of the present invention may be applied to the application of the application of security vulnerabilities in the detection of the scene, the application for example to the Android application as an example to illustrate.

[0047]Vulnerability detection method of an application of an embodiment of the present inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide an application vulnerability detection method and apparatus, a device, a storage medium and a program. The method comprises the following steps: acquiring an executable file from an installation package of a to-be-detected application program, and decompiling the executable file to obtain a decompiled file; obtaining a plurality of elements in the decompiled file, establishing an index table based on the positions of the plurality of elements in the decompiled file, and establishing an incidence relation table based on the relation among the plurality of elements; generating a first abstract syntax tree taking a target element as a starting node according to the index table and the incidence relation table; and according to a plurality of groups of preset detection rules and the relationship among the nodes of the first abstract syntax tree, determining whether a vulnerability exists in the application program or not. According to the scheme, through the decompilation file, the index, the incidence relation table and the obtained abstract syntax tree, vulnerability detection can be easily carried out on the application program, and the vulnerability detection efficiency is high.

Description

Technical field [0001] The present invention relates to the field of computer technology, in particular to an application of vulnerability detection methods, devices, devices, storage media and programs. Background [0002] With the rapid development of the Android platform, the number of Android applications has been growing rapidly, but with it there are also vulnerabilities generated by Android applications. All Android application vulnerabilities have the potential to be exploited by attackers, so a more comprehensive understanding of the vulnerability, so that the vulnerability can be found and fixed, is an effective way to avoid software attacks. [0003] At present, vulnerability detection mainly converts the executable code in the installation package of the Android application into class assembly code through reverse tools, and then detects whether there is a security vulnerability based on the class assembly code. However, decompiling code such as class assembly obtain...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 韩争光刘涛赵帅
Owner 奇安盘古(上海)信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products