Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Visual evidence obtaining system for android attack scene reconstruction and implementation method

An attack scenario, Android technology, applied in computer security devices, special data processing applications, instruments, etc., can solve problems such as lack of applicability, and achieve the effect of good visualization and easy deployment

Pending Publication Date: 2021-10-29
NANJING UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of method provides new ideas for scene reconstruction, but its applicability is lacking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visual evidence obtaining system for android attack scene reconstruction and implementation method
  • Visual evidence obtaining system for android attack scene reconstruction and implementation method
  • Visual evidence obtaining system for android attack scene reconstruction and implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] The technical solutions provided by the present invention will be described in detail below in conjunction with specific examples. It should be understood that the following specific embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention. In addition, the steps shown in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, the sequence may be different. The steps shown or described are performed in the order herein.

[0079] figure 1 Shown is a schematic structural diagram of a visual forensics system for Android attack scene reconstruction provided by the present invention, including a configuration module, a user operation collection module, a UI collection module, a UI analysis module, a Log collection module, a Log filtering module and an association an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a visual evidence obtaining system for android attack scene reconstruction and an implementation method. The system comprises a configuration module, a user operation collection module, a UI collection module, a UI analysis module, a Log collection module, a Log filtering module and a correlation analysis module. The invention provides a top-down digital forensics tool for Android equipment, high-level application program UI elements are combined with low-level security related system events, and an attack scene is reconstructed. Compared with a previous scene reconstruction method, the method can explain the nature of attacks from a global perspective, and has fine granularity and easy-to-understand context semantics. The system is developed on the basis of a built-in Android debugging bridge toolkit, and can be deployed and run when any Android system runs. The system is easy to deploy, Android equipment does not need to be modified, and compared with an existing method, the method is safer and more flexible, and the visualization effect of a scene reconstruction result is better.

Description

technical field [0001] The invention belongs to the technical field of data forensics in computer technology, and relates to a scene reconstruction mechanism for Android device attack behaviors, in particular to a visual forensics tool for Android attack scene reconstruction and an implementation method thereof. Background technique [0002] Android forensics is the process of extracting, recovering and analyzing data from a device, which can be roughly divided into static and dynamic methods. The static method is to analyze the directory structure, log, cache, SQLite database and other data files of each application, dig out the meaning of the data, analyze user behavior, and achieve the purpose of forensics. The characteristic of this type of method is that it can analyze an application program in detail, but the analysis often requires manual labor, so it is somewhat cumbersome and time-consuming; the dynamic method is to capture dynamic data such as network traffic and d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F16/835G06F16/838
CPCG06F21/552G06F21/554G06F16/838G06F16/835
Inventor 伏晓宋师文吴天池刘轩宇骆斌
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products