Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

77 results about "Privilege escalation" patented technology

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application with more privileges than intended by the application developer or system administrator can perform unauthorized actions.

Method for detecting code security hole based on constraint analysis and model checking

The invention relates to a method for detecting a code security hole based on constraint analysis and model checking, which can extract the source code of a C program in a constraint way and detect the security hole of the program with the model checking. The main content comprises the following steps: buffer attribute information which is involved in the source code of the C program is extracted with a constraint analysis technology; the corresponding ASSERT sentence information of attribute generation, attribute transmission and attribute constraint is inserted into variable declaration, variable assignment and function call site with the buffer attribute information; the inserted code can be taken as the input of the model checking to judge whether the program is accessible, find whether the dangerous points in the program really has an accessible path and finally find the security hole in the source code. Currently, independent model checking can not detect the security hole of the buffer and the like, the method combines the static detecting technology of the constraint analysis with the model detecting technology to realize the detection of the security hole of the buffer overflow and the like, wherein, the detecting precision of the method is higher than that of the general static detecting technology. By extracting the other dangerous function information of the source code, corresponding inserting process is carried out. The invention also can detect the security holes such as formative character string, code injection, privilege escalation, etc.
Owner:BEIHANG UNIV

Control method and system of restricted access in Android application multi-running environment

The invention discloses a control method and system of restricted access in an Android application multi-running environment, an open source virtualization framework is extended, and a privilege escalation attack initiated by a ClientApp due to the sharing of a permission of a HostApp is limited. The method includes a step of judging whether a current sensitive API call operation is legal or not with the combination of loaded policy information if a current operation is the sensitive API call operation when the ClientApp is running, and allowing the ClientApp to call a real API if so, a step of triggering an IOHook module to obtain a currently accessed file directory if the current operation belongs to a file access operation, then allowing an IoCheck module to check whether current accessis legal or not with the combination of a policy library, and calling a real system for file operation if so, and a step of analyzing a permission list to be a default quasi-permission authorizationset while the HostApp loads the ClientApp, and forming an authorization set with the integration of a developer-configured policy. According to the method and the system, the sensitive API access control in a third-party application multi-running environment is achieved.
Owner:HUAZHONG UNIV OF SCI & TECH

Method for vulnerability detection in Windows operating environment based on instrumentation tool

The invention discloses a method for vulnerability detection in a Windows operating environment based on an instrumentation tool. The method comprises the steps that when it is detected that a target process executes a function call instruction, a next instruction address and a function return address are saved; if the instruction corresponding to the skip destination address of the target progress is not a start instruction of a function, ROP vulnerability existing is determined; when it is detected that the target process executes the function return address, whether the return address in a current thread stack is stored or not is detected, and if the return address is stored, a buffer overflow vulnerability is determined; whether the address of a function return instruction is same as the stored return address or not is judged, the address of the function return instruction is saved if the address of the function return instruction is not same as the stored return address, and it is judged that a ROP vulnerability exists in the target progress when it is detected that the address is executed for multiple times; a preset debugged progress is opened based on a function call interface, then whether the preset debugged progress can open the target process or not is judged, and if the preset debugged progress cannot open the target process, a local privilege escalation vulnerability exists. By means of the method, multiple samples can be automatically identified and detected concurrently.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Security defense method and device of Android privilege escalation attack based on integrity verification

The invention relates to a security defense method and device of the Android privilege escalation attacks based on integrity verifications. The method comprises the steps that the case that whether or not an application program is executing the system calls associated with sensitive kernel functions is detected in real time; integrity verifications are conducted on the sensitive kernel functions to be executed by the system calls; the accuracy and reliability of the kernel function pointer corresponding to the sensitive kernel functions are examined; the case that whether or not the internal storage pointed by the kernel function pointers has the commands for the privilege escalation attack features is evaluated; the detected application privilege escalation attacks are given warnings and blocked. According to the security defense method and device of the Android privilege escalation attacks based on integrity verifications, the privilege escalation attack behaviors of malicious programs are detected in real time and are given warnings and blocked, and the damages caused by attacks on the Android system are prevented, and the securities of the application and data are effectively protected. The security defense method and device of the Android privilege escalation attacks based on integrity verifications reduce security threats brought to the Android system by the privilege escalation vulnerabilities, and enhance the security of the Android system.
Owner:INST OF INFORMATION ENG CAS

Methods for feedback and matching of privilege escalation configuration information as well as corresponding devices

The invention discloses a method for feedback of privilege escalation configuration information and a related device. The method comprises the following steps of obtaining a request containing characteristic information of terminal equipment; searching configuration information used for obtaining Root permission according to the characteristic information; sorting the searched configuration information according to history service data stored for the configuration information and forming a recommendation list containing the searched configuration information; responding to the request and pushing the recommendation list containing the sorted configuration information. The invention further discloses a method and a device for matching of the privilege escalation configuration information. The method comprises the following steps of transmitting a request containing the characteristic information collected by the terminal equipment; obtaining a configuration information recommendation list, which responds to the request and is used for obtaining the Root permission of the terminal equipment; applying privilege escalation to the terminal equipment by utilizing at least one piece of configuration information. According to the methods and the devices, a more effective scheme for obtaining highest permission of terminal equipment system is provided for a user.
Owner:BEIJING QIHOO TECH CO LTD +1

Remote control debugging method and system based on Android equipment

InactiveCN105141776ARealize remote controlImprove remote control debugging efficiencySubstation equipmentTransmissionRemote controlComputer science
The present invention discloses a remote control debugging method and system based on Android equipment. The method includes the steps as follows: a controlling terminal of the Android equipment receives remote control debugging information transmitted by a controlled terminal of the Android equipment, distributes and marks verification codes, and transmits verification code prompting information; when the controlling terminal receives correct verification code prompting information inputted by the controlled terminal, and acquires reception instruction confirmation of the controlled terminal for processing the remote control debugging, the controlled terminal establishes a pseudo-terminal service in local, the controlling terminal acquires a bottom layer linux terminal of the controlled terminal, and the controlling terminal acquires root privileges through a privilege escalation operation so that the controlled terminal is remotely controlled. The remote control debugging method and system based on Android equipment control remote terminals among Android equipment, and remotely control remote menus. The remote control debugging method and system based on Android equipment can greatly increase the remote control efficiency and reduce the realizing cost for remote control, and provide subscribers with convenience.
Owner:KONKA GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products