CN104732146A - Android program bug detection method and system - Google Patents

Android program bug detection method and system Download PDF

Info

Publication number
CN104732146A
CN104732146A CN201510158271.4A CN201510158271A CN104732146A CN 104732146 A CN104732146 A CN 104732146A CN 201510158271 A CN201510158271 A CN 201510158271A CN 104732146 A CN104732146 A CN 104732146A
Authority
CN
China
Prior art keywords
class
android program
android
program
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510158271.4A
Other languages
Chinese (zh)
Inventor
金果
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201510158271.4A priority Critical patent/CN104732146A/en
Publication of CN104732146A publication Critical patent/CN104732146A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides an Android program bug detection method and system. The Android program bug detection system is applied to the Android program development, and comprises a program bug detection module, and the program bug detection module is used for obtaining Android Manifest.xml of an Android program for analysis and determining the module composition and the inherit class relationship of the Android program; the inherit class is detected, and when it is detected that an interface of the inherit class does not meet the corresponding interface encoding specification, a user is prompted that class interface bugs exist in the inherit class. According to the Android program bug detection method and system, based on a prototype that software coding errors will cause safety bugs of system software, a corresponding program bug detection scheme is constructed, and the program bugs caused by nonstandard programs can be detected.

Description

A kind of Android program leak detection method and system
Technical field
The present invention relates to a kind of computer technology, particularly relate to a kind of Android program leak detection method and system.
Background technology
Along with day by day universal in people's life of internet and intelligent mobile terminal, mobile security problem and potential safety hazard are also thereupon more and more serious.The event that the current malicious code of implantation on mobile terminals carries out the network crime shows a rising trend, and the user of mobile terminal is facing unprecedented security risk.Especially the smart mobile phone of android system, based on the increasing income property of source code, the risk that the application program of its exploitation exists enjoys people to pay close attention to especially.
In order to detect potential safety hazard existing in application program, many Android program leak detection methods are there is, mainly by carrying out static analysis to the Dalvik bytecode after the decompiling of Android application program.Android program leak detection method specifically comprises: 1, adopts orecontrolling factor flow graph (CFG, Control Flow Graph) technology, in addition in conjunction with the technology of some static stain analyses or data-flow analysis to improve the accuracy rate of detection.Trace routine determines possible execution route by setting up controlling stream graph to the Dalvik bytecode after the decompiling of Android application program, then adopts data stream analysis techniques above result to be simplified further to the path collection obtaining triggering authority leakage.2, Java source code static analysis after trace routine decompiling, Android the component list that doubtful authority is revealed is extracted from Manifest file, then from the java applet entrance that each assembly is corresponding, CFG is constructed, simultaneously in conjunction with static stain analytical technology, locate the system call point causing authority to be revealed.3, privacy leakage in being applied by Android and data contamination leak, carry out static analysis to the Java source code after decompiling, generating function calling graph and program control flowchart, the program of SQLite database manipulation function performs stream, determines the application that there is leak.4, by analyzing the Content Provider interface characteristics that Android to be detected applies, judge whether it may exist privacy leakage leak; If possible exist, for the Android application to be detected that may there is privacy leakage leak, by the monitoring to api function relevant in android system, the test of SQL injection loophole and the test of traversal path leak are carried out to the URI that openly may have access to that Android to be detected applies, detects passive leaking data security risk.These methods are all the static detection methods after compiling of application, and for the Android application program of writing, leak wherein is just present in before this program compilation.If these leaks can just be detected before compiling, the workload of Hole Detection can not only be reduced, find faster and eliminate leak, and it also avoid existing leak detection method to Java decompiling instrument accurately and the dependence of integrality.
Given this, the method and system how finding a kind of Android program of the Java of not relying on decompiling instrument to detect leak just become those skilled in the art's problem demanding prompt solution.
Summary of the invention
The shortcoming of prior art in view of the above, the object of the present invention is to provide a kind of Android program leak detection method and system, for solve Android program in prior art detect leak method usually need depend on Java decompiling instrument problem.
For achieving the above object and other relevant objects, the invention provides a kind of Android program leak detection method, described Android program leak detection method comprises: resolve the AndroidManifest.xml of Android program, determines that the assembly of described Android program is formed and derived class relation; Described derived class being detected, when detecting that the interface of described derived class does not meet corresponding interface coding criterion, then reminding described derived class to there is class interface leak.
Alternatively, described Android program leak detection method also comprises: when detecting that described assembly is made up of uneasy universal class, reminds described assembly to there are class security breaches.
Alternatively, described Android program leak detection method also comprises: there are class security breaches to described prompting to described assembly and process, described process comprises: revise described assembly, again carries out Hole Detection to described assembly.
Alternatively, described Android program leak detection method also comprises: there is class interface leak to the described derived class of described prompting and process, described process comprises: revise described class interface coding, again carry out Hole Detection to described derived class interface.
Alternatively, described interface coding criterion comprises: limit the accessibility of class interface member.
Alternatively, described Android program leak detection method also comprises: build corresponding bug detection class and realize described Android program Hole Detection.
The invention provides a kind of Android program leakage location, be applied in Android program exploitation, described Android program leakage location comprises: bug detecting module, AndroidManifest.xml for obtaining Android program resolves, and determines that the assembly of described Android program is formed and derived class relation; Described derived class being detected, when detecting that the interface of described derived class does not meet corresponding interface coding criterion, then reminding described derived class to there is class interface leak.
Alternatively, described bug detecting module also for: described assembly being detected, when detecting that described assembly is made up of uneasy universal class, reminding described assembly to there are class security breaches.
Alternatively, described Android program leakage location also comprises bug processing module, modifies for there are class security breaches to described assembly.
Alternatively, described Android program leakage location also comprises bug processing module, modifies for there is class interface leak to described derived class.
Alternatively, described interface coding criterion comprises: limit the addressable authority of class interface member.
Alternatively, the function of described bug detecting module realizes by building corresponding bug detection class.
As mentioned above, Android program leak detection method of the present invention and system, there is following beneficial effect: before Android application program does not also generate corresponding APK program and program also before formal compiling, not the security mechanism for java language itself, but a kind of safety standard set review mechanism of application programs and source code.Provide powerful support for for finding in Android application that privacy leakage and data class security breaches provide as early as possible.When also not compiling, time namely application program does not also generate APK, depth scan is carried out to the code of programmer, the code lack of standardization of discovery procedure person's coding, and corresponding authority mechanism is carried out from review mechanism.Technical scheme of the present invention does not rely on accuracy and the integrality of Java decompiling instrument, simultaneously not by the impact of this behavioral characteristics polymorphic of Java yet.
Accompanying drawing explanation
Fig. 1 is shown as the schematic flow sheet of an embodiment of Android program leak detection method of the present invention.
Fig. 2 is shown as the schematic flow sheet of an embodiment of Android program leak detection method of the present invention.
Fig. 3 is shown as the module diagram of an embodiment of Android program leakage location of the present invention.
Element numbers explanation
1 Android program leakage location
11 bug detecting modules
12 bug processing modules
S1 ~ S2 step
Embodiment
Below by way of specific instantiation, embodiments of the present invention are described, those skilled in the art the content disclosed by this instructions can understand other advantages of the present invention and effect easily.The present invention can also be implemented or be applied by embodiments different in addition, and the every details in this instructions also can based on different viewpoints and application, carries out various modification or change not deviating under spirit of the present invention.
It should be noted that, the diagram provided in the present embodiment only illustrates basic conception of the present invention in a schematic way, then only the assembly relevant with the present invention is shown in graphic but not component count, shape and size when implementing according to reality is drawn, it is actual when implementing, and the kenel of each assembly, quantity and ratio can be a kind of change arbitrarily, and its assembly layout kenel also may be more complicated.
The invention provides a kind of Android program leak detection method.In one embodiment, as shown in Figure 1, described Android program leak detection method comprises:
Step S1, resolves the AndroidManifest.xml of Android program, determines that the assembly of described Android program is formed and derived class relation.In one embodiment, movable component <activity></acti vity> is had in the assembly of AndroidManifest.xml, service receiver <receiver></rece iver> serviced component <service></servi ce> etc., the class that these assemblies comprise, represent corresponding class
From the service that this receives, basic class be ClearService after system start-up, after program loads, ClearService removes service class, other classes corresponding can be called, program class is certainly or by combination after all, or can see which class application loads by inheriting the mode quoted.These have certain adduction relationship in virtual machine, and this class ClearService refer to here:
import android.app.Service;
import android.content.Context;
import android.content.Intent;
import android.os.IBinder;
import android.text.TextUtils;
import android.util.Log;
And these classes, the physical layer interfaces such as basic JAVA can be called again by inheritance.Such class one deck calls one deck, will demonstrate the call relation of class.If bad class adds to come in, be the call relation being difficult to the class being fused to ecosystem class certainly, namely he does not know how ecosystem class is called on earth, and bad behavior class only can call its behavior class of writing.
Step S2, detects described derived class, when detecting that the interface of described derived class does not meet corresponding interface coding criterion, then reminds described derived class to there is class interface leak.Described interface coding criterion comprises: limit the accessibility of class interface member.In one embodiment, described Android program leak detection method also comprises: there are class security breaches to described prompting to described assembly and process, described process comprises: revise described assembly, again carries out Hole Detection to described assembly.
In one embodiment, described Android program leak detection method also comprises: detect described assembly, when detecting that described assembly is made up of uneasy universal class, reminds described assembly to there are class security breaches.In one embodiment, described Android program leak detection method also comprises: there is class interface leak to the described derived class of described prompting and process, described process comprises: revise described class interface coding, again carry out Hole Detection to described derived class interface.
In one embodiment, described Android program leak detection method also comprises: build corresponding bug detection class and realize described Android program Hole Detection.Particularly, described Android program leak detection method is by building corresponding bug detection class, realizes described Android program Hole Detection in described bug detection class.
In one embodiment, as shown in Figure 2, described Android program leak detection method comprises: step 1, read Android application program, described Android application program refers to APK (AndroidPackage, Android installation kit) program, or APK source code.Step 2, resolves Android application program, starts to resolve the AndroidManifest.xml basic configuration table of Android application program.Time program loads, this table very first time corresponding is loaded in virtual machine, thus can confirm which assembly is an APK program have, and just independently can analyze these assemblies.Step 3, resolves the Activity of an Android application program, the associated components such as Service, Broadcast, Receive, Provider.The assembly of corresponding program just can be found to be made up of which, thus can the relation integration of constructor, and derived class relation.Step 4, by analyzing the adduction relationship of corresponding Android component code.Thus can judge that corresponding assembly is quoted and whether derive from unsafe class, if there is corresponding assembly to have problem, system jumps to step 5.Step 5, corresponding Android assembly of modifying, automatically enters auditing system to amendment rear section simultaneously, re-executes step 4.Step 6, if do not find that corresponding andorid assembly is quoted, and the interface of class imports more safely.System is called corresponding coding criterion storehouse, sees and whether meets corresponding standard code standard (i.e. interface coding criterion), jump to step 7 if do not met.Here coding criterion storehouse is not that java traditional accordingly writes coding criterion standard, but a kind of specification of Aulomatizeted Detect.The specification of Aulomatizeted Detect, namely when carrying out system development, each different program language, there are its grammer and semantic and corresponding compiling system, after program is write as code, be that the language that corresponding program will be converted into corresponding computing machine understanding goes to perform certainly when running, but program is the fusion of code, single program may meet corresponding language specification.
But the set of program just not necessarily just meets specification, the super class that Java such as writes, single statement meets specification, but merge, say when program inherits that the authority of the accessibility of program expands, which results in the generation of the leak of program, time such program compilation runs, is exactly risk point place.Aulomatizeted Detect specification or rule detect automatically to the code of program exactly, and whether the accessibility authority comprising program when detecting program inherits as above expands.Detected by the Aulomatizeted Detect program of a set of this class method of special disposal, whether the code in program meets Aulomatizeted Detect specification, and this kind of Aulomatizeted Detect program is just Aulomatizeted Detect specification.
For java applet in Aulomatizeted Detect specification class, comprise class, interface, the accessibility of method and data member limits.In one embodiment, described Aulomatizeted Detect specification comprises a method preventing program inherits from expanding class authority:
In this example, if the doLogic () method of subclass manifolding base class, adds the accessibility of manifolding method, because the method for base class is protected, it is Public that subclass Sub defines the method, thus adds the accessibility of doLogic () method.After the method is defined as Public, the user of any Sub can call the method.
Now, the interface coding criterion in examination in legal method can comprise arrange as follows: if the method for base class is protected, then corresponding subclass can not be newly defined as Public to the method.The disposal route of this derived class bug is comprised: corresponding method is set to final, so just can avoid a malice manifolding program.Concrete modification is as follows:
Step 7, modifies to the dangerous code not meeting corresponding specification, automatically carries out system review mechanism simultaneously, namely jump to step 6 and perform the code of amendment.Until when Android program code meets corresponding safety standard (i.e. interface coding criterion), perform step 8.Step 8, terminates described method.
The invention provides a kind of Android program leakage location, be applied in Android program exploitation.In one embodiment, as shown in Figure 3, described Android program leakage location 1 comprises bug detecting module 11:
Bug detecting module 11 is resolved for the AndroidManifest.xml obtaining Android program, determines that the assembly of described Android program is formed and derived class relation; When detecting that described assembly is made up of uneasy universal class, described assembly is reminded to there are class security breaches; If the interface of described derived class does not meet corresponding interface coding criterion, then described derived class is reminded to there is class interface leak.Described interface coding criterion comprises: limit the addressable authority of class interface member.In one embodiment, described bug detecting module 11 also for: when detecting that described assembly is made up of uneasy universal class, remind described assembly to there are class security breaches.In one embodiment, the function of described bug detecting module 11 realizes by building corresponding bug detection class.
In one embodiment, as shown in Figure 3, described Android program leakage location 11 comprises bug detecting module 11 and bug processing module 12, wherein:
Bug detecting module 11 is resolved for the AndroidManifest.xml obtaining Android program, determines that the assembly of described Android program is formed and derived class relation; Described derived class being detected, when detecting that the interface of described derived class does not meet corresponding interface coding criterion, then reminding described derived class to there is class interface leak.In one embodiment, described bug detecting module 11 also for: described assembly being detected, when detecting that described assembly is made up of uneasy universal class, reminding described assembly to there are class security breaches.
Bug processing module 12 processes for the security breaches of reminding bug detecting module 11.Particularly, there are class security breaches for described assembly and modify or/and modify for there is class interface leak to described derived class in bug processing module 12.In one embodiment, there are class security breaches for described assembly and modify in bug processing module 12.In another embodiment, bug processing module 12 is also modified for there is class interface leak to described derived class.
In sum, Android program leak detection method of the present invention and system, mistake based on Software Coding can cause the security breaches of system software to be that prototype is set out, and builds corresponding bug detection scheme, can detect the leak of the program caused by nonstandard programming.Technical scheme of the present invention is before Android application program does not also generate corresponding APK program and program also before formal compiling, not the security mechanism for java language itself, but a kind of safety standard set review mechanism of application programs and source code.This provides powerful support for for privacy leakage and data class security breaches in discovery Android application as early as possible provide.Owing to being when also not compiling, time namely application program does not also generate APK, depth scan is carried out to the code of programmer, the code lack of standardization of discovery procedure person's coding, and corresponding authority mechanism is carried out from review mechanism.So technical scheme of the present invention does not rely on accuracy and the integrality of Java decompiling instrument, simultaneously also not by the impact of this behavioral characteristics polymorphic of Java.So the present invention effectively overcomes various shortcoming of the prior art and tool high industrial utilization.
Above-described embodiment is illustrative principle of the present invention and effect thereof only, but not for limiting the present invention.Any person skilled in the art scholar all without prejudice under spirit of the present invention and category, can modify above-described embodiment or changes.Therefore, such as have in art usually know the knowledgeable do not depart from complete under disclosed spirit and technological thought all equivalence modify or change, must be contained by claim of the present invention.

Claims (12)

1. an Android program leak detection method, is characterized in that, described Android program leak detection method comprises:
The AndroidManifest.xml of Android program is resolved, determines that the assembly of described Android program is formed and derived class relation;
Described derived class being detected, when detecting that the interface of described derived class does not meet corresponding interface coding criterion, then reminding described derived class to there is class interface leak.
2. Android program leak detection method according to claim 1, it is characterized in that: described Android program leak detection method also comprises: detect described assembly, when detecting that described assembly is made up of uneasy universal class, described assembly is reminded to there are class security breaches.
3. Android program leak detection method according to claim 2, it is characterized in that: described Android program leak detection method also comprises: to described assembly, class security breaches are existed to described prompting and processes, described process comprises: revise described assembly, again carries out Hole Detection to described assembly.
4. Android program leak detection method according to claim 1, it is characterized in that: described Android program leak detection method also comprises: class interface leak is existed to the described derived class of described prompting and processes, described process comprises: revise described class interface coding, again carry out Hole Detection to described derived class interface.
5. Android program leak detection method according to claim 1, is characterized in that: described interface coding criterion comprises: limit the accessibility of class interface member.
6. Android program leak detection method according to claim 1, is characterized in that: described Android program leak detection method also comprises: build corresponding bug detection class and realize described Android program Hole Detection.
7. an Android program leakage location, is characterized in that: be applied in Android program exploitation, described Android program leakage location comprises:
Bug detecting module, resolves for the AndroidManifest.xml obtaining Android program, determines that the assembly of described Android program is formed and derived class relation; Described derived class being detected, when detecting that the interface of described derived class does not meet corresponding interface coding criterion, then reminding described derived class to there is class interface leak.
8. Android program leakage location according to claim 7, it is characterized in that: described bug detecting module also for: described assembly is detected, when detecting that described assembly is made up of uneasy universal class, described assembly is reminded to there are class security breaches.
9. Android program leakage location according to claim 8, is characterized in that: described Android program leakage location also comprises bug processing module, modifies for there are class security breaches to described assembly.
10. Android program leakage location according to claim 7, is characterized in that: described Android program leakage location also comprises bug processing module, modifies for there is class interface leak to described derived class.
11. Android program leakage location according to claim 7, is characterized in that: described interface coding criterion comprises: limit the addressable authority of class interface member.
12. Android program leakage location according to claim 7, is characterized in that: the function of described bug detecting module realizes by building corresponding bug detection class.
CN201510158271.4A 2015-04-03 2015-04-03 Android program bug detection method and system Pending CN104732146A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510158271.4A CN104732146A (en) 2015-04-03 2015-04-03 Android program bug detection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510158271.4A CN104732146A (en) 2015-04-03 2015-04-03 Android program bug detection method and system

Publications (1)

Publication Number Publication Date
CN104732146A true CN104732146A (en) 2015-06-24

Family

ID=53456027

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510158271.4A Pending CN104732146A (en) 2015-04-03 2015-04-03 Android program bug detection method and system

Country Status (1)

Country Link
CN (1) CN104732146A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105243329A (en) * 2015-10-26 2016-01-13 北京奇虎科技有限公司 Method and system for vulnerability discovery of Android system
CN106201889A (en) * 2016-07-15 2016-12-07 国云科技股份有限公司 A kind of system and its implementation checking that program code writes specification
CN106326103A (en) * 2015-07-06 2017-01-11 阿里巴巴集团控股有限公司 Method and apparatus used for detecting vulnerability of to-be-detected application
CN107025168A (en) * 2015-12-15 2017-08-08 阿里巴巴集团控股有限公司 Leak detection method and device
CN107239706A (en) * 2017-06-06 2017-10-10 贵州大学 The safety loophole mining method of application program of mobile phone under a kind of Android platform
CN110427757A (en) * 2019-08-06 2019-11-08 南方电网科学研究院有限责任公司 A kind of Android leak detection method, system and relevant apparatus
CN111353146A (en) * 2020-05-25 2020-06-30 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for detecting sensitive permission of application program
CN112100620A (en) * 2020-09-04 2020-12-18 百度在线网络技术(北京)有限公司 Code security detection method, device, equipment and readable storage medium
CN112733158A (en) * 2021-04-06 2021-04-30 北京邮电大学 Android system vulnerability detection method, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102339252A (en) * 2011-07-25 2012-02-01 大连理工大学 Static state detecting system based on XML (Extensive Makeup Language) middle model and defect mode matching
CN103984900A (en) * 2014-05-19 2014-08-13 南京赛宁信息技术有限公司 Android application vulnerability detection method and Android application vulnerability detection system
CN103996007A (en) * 2014-05-29 2014-08-20 诸葛建伟 Testing method and system for Android application permission leakage vulnerabilities
US20140380283A1 (en) * 2013-06-25 2014-12-25 Purdue Research Foundation Systems and Methods of Detecting Power Bugs

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102339252A (en) * 2011-07-25 2012-02-01 大连理工大学 Static state detecting system based on XML (Extensive Makeup Language) middle model and defect mode matching
US20140380283A1 (en) * 2013-06-25 2014-12-25 Purdue Research Foundation Systems and Methods of Detecting Power Bugs
CN103984900A (en) * 2014-05-19 2014-08-13 南京赛宁信息技术有限公司 Android application vulnerability detection method and Android application vulnerability detection system
CN103996007A (en) * 2014-05-29 2014-08-20 诸葛建伟 Testing method and system for Android application permission leakage vulnerabilities

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
黄燕忠: "《Internet理论与实作应用大全》", 31 May 2002 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106326103A (en) * 2015-07-06 2017-01-11 阿里巴巴集团控股有限公司 Method and apparatus used for detecting vulnerability of to-be-detected application
CN106326103B (en) * 2015-07-06 2019-01-04 阿里巴巴集团控股有限公司 For detecting the method and device of the loophole of application to be detected
CN105243329A (en) * 2015-10-26 2016-01-13 北京奇虎科技有限公司 Method and system for vulnerability discovery of Android system
CN107025168B (en) * 2015-12-15 2022-01-07 阿里巴巴集团控股有限公司 Vulnerability detection method and device
CN107025168A (en) * 2015-12-15 2017-08-08 阿里巴巴集团控股有限公司 Leak detection method and device
CN106201889A (en) * 2016-07-15 2016-12-07 国云科技股份有限公司 A kind of system and its implementation checking that program code writes specification
CN107239706A (en) * 2017-06-06 2017-10-10 贵州大学 The safety loophole mining method of application program of mobile phone under a kind of Android platform
CN110427757A (en) * 2019-08-06 2019-11-08 南方电网科学研究院有限责任公司 A kind of Android leak detection method, system and relevant apparatus
CN111353146B (en) * 2020-05-25 2020-08-25 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for detecting sensitive permission of application program
CN111353146A (en) * 2020-05-25 2020-06-30 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for detecting sensitive permission of application program
CN112100620A (en) * 2020-09-04 2020-12-18 百度在线网络技术(北京)有限公司 Code security detection method, device, equipment and readable storage medium
CN112100620B (en) * 2020-09-04 2024-02-06 百度在线网络技术(北京)有限公司 Code security detection method, apparatus, device and readable storage medium
CN112733158A (en) * 2021-04-06 2021-04-30 北京邮电大学 Android system vulnerability detection method, electronic equipment and storage medium
CN112733158B (en) * 2021-04-06 2021-08-03 北京邮电大学 Android system vulnerability detection method, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104732146A (en) Android program bug detection method and system
CN107832619B (en) Automatic application program vulnerability mining system and method under Android platform
Xue et al. Malton: Towards {On-Device}{Non-Invasive} Mobile Malware Analysis for {ART}
US20210149788A1 (en) Software diagnosis using transparent decompilation
Au et al. Pscout: analyzing the android permission specification
Yang et al. Leakminer: Detect information leakage on android with static taint analysis
CN103729595B (en) A kind of Android application program private data leakage off-line checking method
Rountev et al. Static reference analysis for GUI objects in Android software
Junaid et al. Dexteroid: Detecting malicious behaviors in android apps using reverse-engineered life cycle models
CN103984900A (en) Android application vulnerability detection method and Android application vulnerability detection system
Li et al. Peruim: Understanding mobile application privacy with permission-ui mapping
CN103577324A (en) Static detection method for privacy information disclosure in mobile applications
CN109558304B (en) Component association analysis method and device and electronic equipment
CN114021142A (en) Android application program vulnerability detection method
CN101901184B (en) Method, device and system for inspecting vulnerability of application program
Kashyap et al. Security signature inference for javascript-based browser addons
Xu Techniques and tools for analyzing and understanding android applications
Pan et al. Static asynchronous component misuse detection for Android applications
Wu et al. Sentinel: generating GUI tests for sensor leaks in Android and Android wear apps
EP2885712A1 (en) Imperative attribution for elements in managed runtimes
CN115495745A (en) Industrial software source code static detection method and system based on risk function
Zhang et al. Contextual approach for identifying malicious inter-component privacy leaks in android apps
Wu et al. CydiOS: A Model-Based Testing Framework for iOS Apps
CN110069926B (en) Malicious code positioning method, storage medium and terminal for Android repackaging application
Mao et al. Automatic permission inference for hybrid mobile apps

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150624