Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application permission divulgence detection method and system based on reverse symbolic execution

A technology of symbol execution and application authority, applied in the field of mobile information security, can solve the problems of low detection efficiency, large manpower and time consumption, and achieve the effect of avoiding overhead and improving detection efficiency

Active Publication Date: 2015-03-25
BEIHANG UNIV
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is an effective method for security experts to conduct detailed manual dynamic analysis of malware, but manual dynamic analysis requires a lot of manpower and time, and its detection efficiency is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application permission divulgence detection method and system based on reverse symbolic execution
  • Application permission divulgence detection method and system based on reverse symbolic execution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] figure 1 A flow chart of the application authority leakage detection method based on reverse symbolic execution of the present invention is shown.

[0034] refer to figure 1 , the process of the application authority leakage detection method based on reverse symbolic execution of the present invention specifically includes:

[0035]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an application permission divulgence detection method and system based on reverse symbolic execution. The method comprises the steps of S1, establishing a control flow diagram of an application to be detected; S2, according to the mapping relation between an API and a preset permission, marking a node possibly divulging the permission on the control flow diagram; S3, with the node possibly divulging the permission as a starting point, searching for all paths between the starting point and a program entry point by traversing the control flow diagram through reverse symbolic execution, wherein all the paths between the starting point and the program entry point are paths possibly divulging the permission. By adopting the reverse symbolic execution mode, it is only needed to traverse all the possible paths between a calling point of the sensitive API and the program entry point, it is avoided that paths unrelated to permission divulgence are traversed, and therefore detection efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of mobile information security, in particular to a method and system for detecting application authority leakage based on reverse symbolic execution. Background technique [0002] The security of Android applications has become a serious problem that threatens the development of the industry. Every day, software stores and virus tool vendors receive hundreds or even thousands of suspicious malicious application samples. How to quickly and accurately analyze these malicious applications to determine whether there is a threat and the severity of the threat is one of the core tasks of security analysts. It is an effective means for security experts to conduct detailed manual dynamic analysis of malware, but manual dynamic analysis requires a lot of manpower and time, and its detection efficiency is very low. Contents of the invention [0003] Based on the above problems, the present invention provides a met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/52
Inventor 姜博陈鹏高小鹏吴煜龙翔万寒
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products