Vulnerability detection method and related device for Android applications

An Android application, vulnerability detection technology, applied in the field of information security, can solve problems such as low efficiency and accuracy, lack of vulnerability research, and labor-intensive, to achieve the effect of rapid and effective detection

Active Publication Date: 2022-02-11
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The rule-based vulnerability detection method needs to rely on manual expert experience to extract rules, which is labor-intensive and has a large number of false negatives
The learning-based Android application vulnerability detection method lacks research on the vulnerabilities caused by the operating mechanism of Android itself.
In other words, the efficiency and accuracy of the existing two vulnerability detection methods are low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and related device for Android applications
  • Vulnerability detection method and related device for Android applications
  • Vulnerability detection method and related device for Android applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0024] It should be noted that, unless otherwise defined, the technical terms or scientific terms used in the embodiments of the present disclosure shall have ordinary meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar words used in the embodiments of the present disclosure do not indicate any sequence, quantity or importance, but are only used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items. Words such as "connected" or "connected" are not lim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure provides a vulnerability detection method for Android applications and related devices, including: constructing a control flow graph of the target Android application; building a program dependency graph of the target Android application based on the control flow graph; The vulnerability characteristics of the target Android application; use the vulnerability characteristics to train the pre-built machine learning model, obtain the vulnerability detection model, and detect the vulnerability of the target Android application based on the vulnerability detection model. The vulnerability detection method and related devices for Android applications provided by the present disclosure, according to the acquired vulnerability characteristics of Android applications with semantics, train a vulnerability detection model with context awareness, which can quickly and effectively detect vulnerabilities of Android applications .

Description

technical field [0001] The present disclosure relates to the technical field of information security, and in particular to a vulnerability detection method and a related device for Android application programs. Background technique [0002] In recent years, the number of Android applications has been growing rapidly, but with the increase there are also vulnerabilities generated by Android applications. As stated in the "Overview of my country's Internet Network Security Situation in 2020", the number of security vulnerabilities collected by the National Information Security Vulnerability Sharing Platform (CNVD) accounted for 8.0% of the total number of security vulnerabilities collected in the whole year. Compared with 2019, the year-on-year increase was 37.1% %. The vulnerabilities of all Android applications have the potential to be exploited by attackers. Therefore, a more comprehensive understanding of vulnerabilities, so as to discover vulnerabilities and fix them, is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/563G06F21/577
Inventor 张华秦佳伟李文敏涂腾飞王华伟严定宇崔栋杜代忠
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products