CN108073499A - The test method and device of application program - Google Patents

The test method and device of application program Download PDF

Info

Publication number
CN108073499A
CN108073499A CN201610992267.2A CN201610992267A CN108073499A CN 108073499 A CN108073499 A CN 108073499A CN 201610992267 A CN201610992267 A CN 201610992267A CN 108073499 A CN108073499 A CN 108073499A
Authority
CN
China
Prior art keywords
data
application process
intended application
exits
gravestone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610992267.2A
Other languages
Chinese (zh)
Other versions
CN108073499B (en
Inventor
彭威
陈奋
黄泽丰
王庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610992267.2A priority Critical patent/CN108073499B/en
Publication of CN108073499A publication Critical patent/CN108073499A/en
Application granted granted Critical
Publication of CN108073499B publication Critical patent/CN108073499B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/3644Software debugging by instrumenting at runtime
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/3624Software debugging by performing operations on the source code, e.g. via a compiler

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses the test methods and device of a kind of application program.Wherein, this method includes:Operational objective application program, wherein, destination application is application program to be tested, and object code is injected in destination application, and intended application process is generated during operational objective application program;The operation data of monitoring objective application process, wherein, the normal data that exit that operation data include intended application process exit data with abnormal;The stability parameter for exiting data according to data and exception is normally exited and determining intended application process;Judge whether stability parameter meets preset condition;In the case where judging that stability parameter is unsatisfactory for preset condition, the delete target code from destination application.The present invention solve test application program in the prior art accuracy it is low the technical issues of.

Description

The test method and device of application program
Technical field
The present invention relates to application domain, in particular to the test method and device of a kind of application program.
Background technology
After the code injection that can realize some specific function by one section is into some application program, this is run using journey The application process that sequence obtains has the function of this, for example, assuming that the effect of object code is to intercept advertisement, then by target generation After code is injected into application program A, when running application program A, it becomes possible to realize the interception to advertisement.But by target generation Code is injected into after application program A, it is possible to can influence the stability of application program A operations.Therefore, it is necessary to application program A It is tested, with the power for the influence that the injection for judging object code generates the operation of application program A.
The influence of the stability of the code application processes of injection is mainly monitored according to signal processor in the prior art. Detailed process is:Application program in Android may be at two kinds of operating statuses:Native and Java Virtual Machine.Native As common Linux programs, and Java Virtual Machine is then the Java bytecode of operation.Occur when the code of native is run During mistake, kernel can send a signal to process, and the signal processor of calling process come the handling result given tacit consent to after handling be into Cheng Yichang is exited.Also there is similar mechanism in Java Virtual Machine, when being abnormal and application code does not capture, virtual machine meeting The exception handler of thread is called to handle, default treatment result is also that process exception exits.Under two states, using can It registers oneself processor and receives this kind of unexpected message to replace default processor, deal with problems arising from an accident so as to do some before process exits Work:Such as record log etc..The abnormal conditions of application process itself can be monitored using this technical characterstic.
In the prior art method primary disadvantage is that can only monitor it is single exited using the exception of itself, can not know simultaneously Normal exit of application exits situation with abnormal, therefore the accuracy of test application program is low.
For it is above-mentioned the problem of, currently no effective solution has been proposed.
The content of the invention
An embodiment of the present invention provides the test method and device of a kind of application program, at least to solve to survey in the prior art The technical issues of accuracy of examination application program is low.
One side according to embodiments of the present invention provides a kind of test method of application program, including:Operational objective Application program, wherein, the destination application is application program to be tested, and target is injected in the destination application Code generates intended application process during the destination application is run;Monitor the intended application process Data are run, wherein, the normal data that exit that the operation data include the intended application process exit data with abnormal;Root Normal data are exited according to described and the exception exits the stability parameter that data determine the intended application process;Described in judgement Whether stability parameter meets preset condition;In the case where judging that the stability parameter is unsatisfactory for the preset condition, The object code is deleted from the destination application.
Another aspect according to embodiments of the present invention additionally provides a kind of test device of application program, including:Operation is single Member, for operational objective application program, wherein, the destination application is application program to be tested, the intended application Object code is injected in program, intended application process is generated during the destination application is run;Monitoring is single Member, for monitoring the operation data of the intended application process, wherein, the operation data include the intended application process The normal data that exit exit data with abnormal;Determination unit, for normal exiting data and the exception exits number according to described According to the stability parameter for determining the intended application process;Judging unit, for judging it is pre- whether the stability parameter meets If condition;Unit is deleted, in the case where judging that the stability parameter is unsatisfactory for the preset condition, from the mesh The object code is deleted in mark application program.
In embodiments of the present invention, object code is injected in destination application, operational objective application program generates Intended application process, normal according to intended application process exit data and abnormal exit data and determine the steady of intended application process Qualitative parameter if the stability parameter meets preset condition, illustrates shadow of the object code to the stability of intended application process Sound is smaller;If the stability parameter is unsatisfactory for preset condition, illustrate shadow of the object code to the stability of intended application process Sound is larger, in the case where object code is to being affected of the stability of intended application process, is deleted from destination application Except object code, due to can obtain application process simultaneously it is normal exit situation and it is abnormal exit situation, this test The mode of application program takes into account the influence that the code of injection runs application program comprehensively, has reached and has improved application program The technique effect of the accuracy of test, and then the technical issues of the accuracy that solves test application program in the prior art is low.
Description of the drawings
Attached drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, this hair Bright schematic description and description does not constitute improper limitations of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is the schematic diagram of hardware environment according to embodiments of the present invention;
Fig. 2 is the flow chart of the test method of application program according to embodiments of the present invention;
Fig. 3 is the monitoring flow chart that application according to embodiments of the present invention is exited extremely;
Fig. 4 is the dlopen function execution flow charts of abduction according to embodiments of the present invention;
Fig. 5 is the schematic diagram of the test device of application program according to embodiments of the present invention;
Fig. 6 is the schematic diagram of server according to embodiments of the present invention.
Specific embodiment
In order to which those skilled in the art is made to more fully understand the present invention program, below in conjunction in the embodiment of the present invention The technical solution in the embodiment of the present invention is clearly and completely described in attached drawing, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people Member's all other embodiments obtained without making creative work should all belong to the model that the present invention protects It encloses.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, " Two " etc. be the object for distinguishing similar, without being used to describe specific order or precedence.It should be appreciated that it so uses Data can exchange in the appropriate case, so as to the embodiment of the present invention described herein can with except illustrating herein or Order beyond those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment Those steps or unit clearly listed, but may include not list clearly or for these processes, method, product Or the intrinsic other steps of equipment or unit.
Explanation of technical terms:
Logcat:The log system of android system, external tool can be by logcat come during reading system operation Log information.
Gravestone file:When android system is abnormal, some information at system meeting recording exceptional scene are led to file It can often preserve a to under/data/system/dropbox catalogues.
debuggerd:Debuggerd is that android system carries process, when having application process to be abnormal and dead When, debuggerd processes can read the stack information of crash processes and store in gravestone file, while crash daily records are exported To logcat.
Binder service objects:The server-side object of android system mid-span process communication, corresponding the opposing party are Binder target client.When service object's death, the binder client couple for having registered dead monitoring information can be sent notification to As.
It should be noted that the application process in the embodiment of the present invention exit exited extremely including application process and using into Cheng Zhengchang is exited.
According to embodiments of the present invention, a kind of embodiment of the test method of application program is provided.
Optionally, in the present embodiment, the test method of above application program can be applied to as shown in Figure 1 by servicing In the hardware environment that device 102 and terminal 104 are formed.As shown in Figure 1, server 102 is connected by network and terminal 104 It connects, above-mentioned network includes but not limited to:Wide area network, Metropolitan Area Network (MAN) or LAN, terminal 104 are not limited to PC, mobile phone, tablet electricity Brain etc..The test method of the application program of the embodiment of the present invention can be performed by terminal 104, can also by server 102 It performs.Terminal 104 perform the embodiment of the present invention application program test method can be by client mounted thereto Lai It performs.
Test method in application program is performed by terminal 104, and the process of this method is as follows:Terminal 104 Destination application in be injected with object code, operational objective application program generates intended application process, and terminal 104 monitors mesh The operation data of application process are marked, operation data normally exit data including intended application process and exception exits data.Terminal 104 exit the stability parameter that data determine intended application process according to data are normally exited with abnormal, judge stability parameter Whether preset condition is met.In the case where terminal 104 judges that stability parameter is unsatisfactory for preset condition, illustrating should in target With object code being affected to the stability of intended application process is injected in program, need at this time from destination application Delete target code.
Test method in application program is performed by server 102, network provided in an embodiment of the present invention Framework map is as shown in Figure 1.As shown in Figure 1, object code is injected in the destination application of terminal 104, operational objective application Program generate intended application process, the operation data of 104 monitoring objective application process of terminal, operation data include intended application into Cheng Zhengchang exits data and exception exits data.The normal data that exit are exited data sending to server by terminal 104 with abnormal 102.Server 102 receive intended application process it is normal exit data and it is abnormal exit data, and according to normally exiting data With the abnormal stability parameter for exiting data and determining intended application process.It is pre- that server 102 judges whether stability parameter meets If condition.In the case where server 102 judges that stability parameter is unsatisfactory for preset condition, illustrate in destination application Injection object code is affected to the stability of intended application process, needs to send to terminal 104 at this time and instructs, the instruction It is used to indicate the delete target code from destination application.
According to embodiments of the present invention, provide a kind of test method of application program, as shown in Fig. 2, this method include with Lower step:
Step S202, operational objective application program, wherein, destination application is application program to be tested, and target should With object code is injected in program, intended application process is generated during operational objective application program.
Step S204, the operation data of monitoring objective application process, wherein, operation data are including intended application process just It often exits data and exception exits data.
Step S206, according to normally exiting data and the abnormal stability parameter for exiting data and determining intended application process.
Step S208, judges whether stability parameter meets preset condition.
Step S210 in the case where judging that stability parameter is unsatisfactory for preset condition, is deleted from destination application Except object code.
Object code can be that by one section of code of some function.As an example it is assumed that the effect of object code It is to intercept advertisement, then after object code is injected into application program A, when running application program A, it becomes possible to realization pair The interception of advertisement.But object code is injected into after application program A, it is possible to the stabilization of application program A operations can be influenced Property.Therefore, it is necessary to test application program A, the shadow generated is run to application program A with the injection for judging object code It rings strong and weak.
In embodiments of the present invention, it can show that the parameter of the stability of application program operation can serve as application process Stability parameter, several illustrate can be listed below there are many representation in stability parameter.
The first representation of stability parameter:
si=ai/biFormula (1)
Wherein, siRepresent the stability parameter of intended application process i, aiRepresent intended application process i within a period of time Exception exit number (being obtained according to the abnormal data that exit), biRepresent intended application process i exiting within this time Number, wherein, bi=ai+ci, ciRepresent that normal within this time of intended application process i exits number (according to normally moving back Go out data acquisition).
Stability parameter s shown by formula (1)iIt is the abnormal rate of intended application process i, applying for usual one is not having In the case of great bug, abnormal rate should be very low or even close to 0, if abnormal rate is higher than 1%, general be believed that should With there is serious quality problems.
Second of representation of stability parameter:
si=ai/ciFormula (2)
Wherein, siRepresent the stability parameter of intended application process i, aiRepresent intended application process i within a period of time Exception exit number (being obtained according to the abnormal data that exit), ciRepresent that intended application process i is normal within this time Exit number (being obtained according to the normal data that exit).
When destination application has multiple (being more than or equal to 2), target can be generated by running each destination application Application process, therefore, one meets the multiple intended application processes of generation together, and in this case, aforementioned stable parameter can consider It is that the stability of comprehensive N number of intended application process obtains, stability parameter can be that this multiple intended application process is each From stability parameter weighted average.That is, the third representation of stability parameter:
N represent one share N number of destination application, run each destination application obtain an intended application into Journey, i.e. one shares N number of intended application process.S represents the stability that the stability of comprehensive N number of intended application process obtains Parameter.
Wherein, siRepresent the stability parameter of intended application process i, siIt can be counted by above-mentioned formula (1) or formula (2) It calculates.
wiRepresent the weight of intended application process i.Can be according to the significance level of different target application program, it will be different The corresponding intended application process of destination application assigns different weighted values.The benefit of the method for this computational stability parameter It is:It is filled with object code in multiple application programs, object code is to the stability of the corresponding application process of application program Influence may be different, to being affected for the stability of some application processes, to the stabilization of other application process The influence of property is smaller.For important application program, the weight of its corresponding application process is assigned to larger numerical value, it is right In more unessential application program, the weight of its corresponding application process is assigned to smaller numerical value, in such manner, it is possible to highlight Influence of the object code to the stability of important application process.
When destination application has multiple (being more than or equal to 2), stability parameter can also have the 4th kind of representation:
S=A/B formula (4)
S represents the stability parameter that the stability of comprehensive N number of intended application process obtains.
A represents that the exception of N number of intended application process exits the summation of number,aiRepresent intended application process i Exception within a period of time exits number (being obtained according to the abnormal data that exit).
B represents the summation for exiting number of N number of intended application process,biRepresent intended application process i at this Number is exited within the section time.
By considering the stability of multiple application processes, a stability parameter is obtained, according to the stability parameter Judge that influence of the injection object code to system application process is strong and weak, achieved the effect that improve the accuracy judged.
After stability parameter is obtained, judge whether stability parameter meets preset condition.Preset condition can be one A numberical range, for example, preset condition, which is stability parameter, is less than 0.01%.
When stability parameter meets preset condition, it is believed that the stability influence of the code application processes of injection is smaller. When stability parameter is unsatisfactory for preset condition, it is believed that the stability influence of the object code application processes of injection is larger, needs The object code of injection is deleted from application program.
In embodiments of the present invention, object code is injected in destination application, operational objective application program generates Intended application process, normal according to intended application process exit data and abnormal exit data and determine the steady of intended application process Qualitative parameter if the stability parameter meets preset condition, illustrates shadow of the object code to the stability of intended application process Sound is smaller;If the stability parameter is unsatisfactory for preset condition, illustrate shadow of the object code to the stability of intended application process Sound is larger, in the case where object code is to being affected of the stability of intended application process, is deleted from destination application Except object code, due to can obtain application process simultaneously it is normal exit situation and it is abnormal exit situation, this test The mode of application program takes into account the influence that the code of injection runs application program comprehensively, solves and tests in the prior art The technical issues of accuracy of application program is low has reached the technique effect of the accuracy for the test for improving application program.
The process of the operation data of monitoring objective application process can be such:First is created in intended application process Object, wherein, the first object is destroyed with exiting for intended application process;Whether destroyed monitor the first object;It is monitoring To the first object it is destroyed when determine that intended application process exits, wherein, intended application process is exited to be exited and just including abnormal Often exit;The data generated when intended application process is exited exit data as first.It is exited in intended application process exception In the case of, exception can be generated and exit data;It is normally exited in intended application process and exception exits two kinds, can all produced Raw first exits data.
First object is created in the intended application process space one object with life cycle, the first object and Process where it is shared weal and woe, and when the process where it exits, the first object can be destroyed.Therefore, by monitoring first pair As if it is no destroyed, whether the process where can learning it exits.
First object can be binder objects, socket objects etc..
In the case where the first object is binder objects, whether destroyed the first object of monitoring process be as follows:Registration The first notice of binder service objects, wherein, the process where the first notice is used to indicate binder has dropped out;Judge whether Detect the first notice;In the case where detecting the first notice, determine that binder objects are destroyed.
Binder be android system striding course communication a kind of mechanism, and can in binder object death ( Process where binder exits) send necrology (the i.e. first notice) to its client.Monitor client is initially injected mesh Mark process creates binder service objects.Then the necrology of the binder service objects is registered, it is possible to which obtaining target should Number is exited with process (first exits data).
In the case where the first object is socket objects, whether destroyed the first object of monitoring process be as follows:It calls Object function, wherein, object function is used to receive the information of intended application process transmission, and exited in intended application process In the case of, object function exits;Judge whether to detect that object function exits;In the case where detecting that object function exits, Determine that socket objects are destroyed.
Object function is for receiving a function of the information of intended application process transmission, when intended application process exits When, object function can exit therewith, therefore, by detecting whether object function exits, can learn socket objects whether by It destroys, so as to learn whether process exits.
Optionally, the operation data of monitoring objective application process include:The exception for obtaining intended application process exits data, Wherein, in the case where intended application process exception exits, exception can be generated and exit data;Obtain the first of intended application process Data are exited, wherein, it is normally exited in intended application process and exception exits two kinds, can all generated first and exit number According to;It exits data acquisition according to the abnormal data and first that exit and normally exits data.
The operation data of intended application process exit data including first.First has exited the acquisition process of data above It is described in detail.
The exception for obtaining application exits data any one in following two methods may be employed:
The exception for obtaining application exits the first method of data:
The exception applied using gravestone file acquisition exits data.Gravestone file directory according to reading judges gravestone text Whether part catalogue is changed;If gravestone file directory is changed, it is determined that exception has occurred in intended application process It exits;The operation data generated when intended application process is abnormal and is exited exit data as abnormal.
The characteristics of due to android system, when application process normally exits, will not generate gravestone file;It is sent out in application When raw exception exits, a gravestone file can be recorded to specific catalogue, therefore the events such as written document by monitoring the catalogue, Can know has process to be abnormal, and by parsing the particular content of gravestone file, can know that is be abnormal specifically should Use information.If gravestone file directory is changed, illustrate that abnormal exit has occurred in intended application process.
Gravestone file directory according to reading judges whether gravestone file directory is changed, this process can make It is realized with following methods (a) or method (b).
Method (a):Create directory modification event sniffer, wherein, after the modification event sniffer that creaties directory, if There is application process to be abnormal to exit, system can generate gravestone file;Judge whether system generates gravestone file;It is given birth in system In the case of gravestone file, determine that gravestone file directory is changed.Intended application process is abnormal when exiting The operation data of generation exit data as exception to be included:Gravestone file is parsed, exception is obtained and exits data.
It can know that the exception all applied exits using gravestone file, inotify mechanism monitors gravestone text may be employed The modification event of part catalogue, this method are real-time.Detailed process is:The modification event sniffer that creates a directory first is (logical Cross inotify), when application is abnormal and exits, system can generate an exception information file (gravestone file), this document head It is which is abnormal using which process that portion, which can include,.Pass through the simple parsing to exception information file, it is possible to orient The exception of application exits.
Method (b):New modification is found by the way of timing scan gravestone file directory.At regular intervals often, Run-down gravestone file directory if it find that gravestone file directory changes, then illustrates that exception has occurred in intended application process It exits.
Fig. 3 is the monitoring flow chart that application according to embodiments of the present invention is exited extremely.
As shown in figure 3, monitoring application starts the monitoring to process.Finger daemon monitors gravestone catalogue.Work as third-party application Process is abnormal exit in the case of, android system send modification gravestone file instruction, finger daemon is according to the instruction Gravestone file is changed, after monitoring application monitors gravestone file by modification, determines that abnormal exit has occurred in third-party application.
The test method of application program provided in an embodiment of the present invention can obtain application whole exit in the case of generate Exit data (i.e. above-mentioned first exits data), and calculate the stability indicator (aforementioned stable parameter) of application, and show The scheme for having technology is only obtained using the number exited extremely, therefore, the test of application program provided in an embodiment of the present invention The test result that method obtains is more accurate, while can also monitor whole applications in whole system, for meeting to whole system For having the cell phone managing class instrument of potential impact, there is very big value.
The exception for obtaining application exits the second method of data:
Debugging routine is run, wherein, generate the first process during running debugging routine;Whether detect the first process Create gravestone file;In the case where detecting the first process creation gravestone file, determine that intended application process has occurred Exception exits;The operation data generated when intended application process is abnormal and is exited exit data as abnormal.Wherein, first Process can be debuggerd processes.Debuggerd processes are the exception information file (gravestones that above-mentioned first method is mentioned File) founder, therefore (action of establishment file is to pass through by injecting the action of its establishment file of the process intercept What dlopen functions performed), achieve the effect that intercept the message that application is collapsed extremely, can be applied time exited extremely Number.Fig. 4 is the dlopen function execution flow charts of abduction according to embodiments of the present invention.
As shown in figure 4, monitoring application injection third party's process, third-party application process creation binder services, when the 3rd When square application process exits extremely, (i.e. above-mentioned first is logical to monitoring application transmission binder necrologies for third-party application process Know).
The test method of application program provided in an embodiment of the present invention can not only monitor the normal of application and exit and abnormal It exits, and whole application processes of whole system can be covered, for wanting to assess itself to other application stability in system Influence application, the result that this test method is drawn have very important reference significance.
The test method of application program provided in an embodiment of the present invention can be applied to android system security classes and survey Tool-class is tried using upper.For example, it is a testing tool class application of android system using A.The embodiment of the present invention is provided The test method of application program be applied to global advertisement intercept function (i.e. the effect of object code is using on A, can knowing Realize Ad blocking) whether can cause frequently to be abnormal using B and exit, so as to beyond some early warning ratio when It waits, closes the Ad blocking to application B.
For example, one share 10 application programs in terminal, be respectively application program B1, application program B2 ..., using journey Sequence B10.Object code (effect of object code is to realize Ad blocking) is injected in this 10 application programs.Using using A Monitor application program B1, application program B2 ..., all situations that exit of the corresponding application processes of application program B10 are being (including just Often exit situation and abnormal exit situation), and according to first exit data and it is abnormal exit data calculate respectively application program B1, Application program B2 ..., the abnormal rate of the corresponding application processes of application program B10.The abnormal rate of application process (join by stability Number) previously described formula (1) can be used to calculate.
Assuming that the abnormal rate for obtaining 10 application processes is as shown in table 1.
Table 1
Inject after same section of object code, application program B1, application program B2 ..., the application of application program B10 into The abnormal rate of journey is different, since exception that abnormal rate is application process exits number divided by all of application process exit What number obtained, therefore, abnormal rate is higher, it is more frequent to illustrate that application process exits extremely, the operation stability of application process is got over Difference.
In the case where application program does not have great bug, abnormal rate should be the number of a very little, close to 0.If one The abnormal rate of the corresponding application process of a application program is more than 1%, then it is considered that the application has serious quality problems.
From table 1 it follows that application program B1 and the abnormal rate of the corresponding application processes of application program B2 are larger, greatly In 1%, this illustrates that the injection of object code has seriously affected the fortune of application program B1 and the corresponding application processes of application program B2 Capable stability.In this case, it is necessary to which the object code being injected into application program B1 and application program B2 is deleted It removes, to ensure the stability of the operation of application program B1 and the corresponding application processes of application program B2.Application program will be injected into After object code in B1 and application program B2 is deleted, in application program B1 and the corresponding application processes of application program B2 During operation, advertisement will not be intercepted.
The abnormal rate of application program B3 to the corresponding application processes of application program B10 is smaller, and far smaller than 1%, this says Influence of the injection of bright object code to application program B3 to the stability of the operation of the corresponding application processes of application program B10 is very It is small, it can be ignored.In the corresponding application process operations of application program B3 to application program B10, advertisement can be intercepted.
In embodiments of the present invention, there is root authority, and code injection is carried out to android system or common application Application, can judge whether the injection behavior of oneself can influence the stability of third party's process using this method, so as to pre- First avoided or made technical adaptation.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement because According to the present invention, some steps may be employed other orders or be carried out at the same time.Secondly, those skilled in the art should also know It knows, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on such understanding, technical scheme is substantially in other words to existing The part that technology contributes can be embodied in the form of software product, which is stored in a storage In medium (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal equipment (can be mobile phone, calculate Machine, server or network equipment etc.) perform method described in each embodiment of the present invention.
According to embodiments of the present invention, a kind of application program for the test method for being used to implement above application program is additionally provided Test device, as shown in figure 5, the device includes:Running unit 10, monitoring unit 20, determination unit 30, judging unit 40, Delete unit 50.
Running unit 10, for operational objective application program, wherein, destination application is application program to be tested, Object code is injected in destination application, intended application process is generated during operational objective application program.
Monitoring unit 20, for the operation data of monitoring objective application process, wherein, operation data include intended application into The normal data that exit of journey exit data with abnormal.
Determination unit 30, for the stability for exiting data according to data and exception is normally exited and determining intended application process Parameter.
Judging unit 40, for judging whether stability parameter meets preset condition.
Unit 50 is deleted, in the case where judging that stability parameter is unsatisfactory for preset condition, from intended application journey Delete target code in sequence.
Optionally, monitoring unit 20 includes:Create subelement, monitoring subelement, the first determination subelement, the second definite son Unit.Subelement is created, for creating the first object in intended application process, wherein, the first object is with intended application process Exit and it is destroyed.Subelement is monitored, it is whether destroyed for monitoring the first object.First determination subelement, for supervising Control to the first object it is destroyed when determine that intended application process exits, wherein, intended application process exit exit including abnormal and Normally exit.Second determination subelement, the data for being generated when intended application process is exited exit data as first.
Optionally, monitoring subelement includes:Registration module, the first judgment module, the first determining module.Registration module is used In the first notice for registering the first object, wherein, the process where the first notice is used to indicate the first object has dropped out.First sentences Disconnected module, for judging whether to detect the first notice.First determining module, in the case where detecting the first notice, Determine that the first object is destroyed.
Optionally, monitoring unit 20 includes:First obtains subelement, the second acquisition subelement, the 3rd acquisition subelement.The One obtains subelement, and the exception for obtaining intended application process exits data, wherein, it is exited in intended application process exception In the case of, exception can be generated and exit data.Second obtains subelement, and first for obtaining intended application process exits data, Wherein, normally exited in intended application process and exception exits two kinds, can all generated first and exit data.3rd obtains Subelement, for exiting data acquisition according to the abnormal data and first that exit and normally exiting data.
Optionally, monitoring unit 20 includes:Judgment sub-unit, the 3rd determination subelement, the 4th determination subelement.Judge son Unit, for judging whether gravestone file directory is changed according to the gravestone file directory read.3rd determines that son is single Member, if changed for gravestone file directory, it is determined that abnormal exit has occurred in intended application process.4th determines son Unit, the operation data for being generated when intended application process is abnormal and is exited exit data as abnormal.
Optionally, judgment sub-unit includes:Creation module, the second judgment module, the second determining module.Creation module is used In the modification event sniffer that creaties directory, wherein, after the modification event sniffer that creaties directory, if there is application process occurs Exception exits, and system can generate gravestone file.Second judgment module, for judging whether system generates gravestone file.Second Determining module in the case of generating gravestone file in system, determines that gravestone file directory is changed.4th determines Subelement includes:Parsing module.Parsing module for parsing gravestone file, obtains exception and exits data.
Optionally, monitoring unit 20 includes:Run subelement, detection sub-unit, the 5th determination subelement, the 6th definite son Unit.Subelement is run, for running debugging routine, wherein, generate the first process during running debugging routine.Detection Subelement, for detecting whether the first process creates gravestone file.5th determination subelement, for being detected in detection sub-unit To the first process creation in the case of gravestone file, determine that abnormal exit has occurred in intended application process.6th determines that son is single Member, the operation data for being generated when intended application process is abnormal and is exited exit data as abnormal.
According to embodiments of the present invention, a kind of server for the test method for being used to implement above application program is additionally provided, As shown in fig. 6, the server mainly includes processor 601, display 603, data-interface 604, memory 605 and network interface 606, wherein:
The operation data of intended application process are then mainly transferred to processing by data-interface 604 by way of data transmission Device 901.
Memory 605 is mainly used for storing operation data, the stability parameter of intended application process.
Network interface 606 is mainly used for carrying out network communication with terminal and other servers.
Display 603 is mainly used for the operation data of display target application process.
Processor 601 is mainly used for performing following operation:
Operational objective application program, wherein, destination application is application program to be tested, is noted in destination application Enter to have object code, intended application process is generated during operational objective application program;Monitoring objective application process Data are run, wherein, the normal data that exit that operation data include intended application process exit data with abnormal;According to normally moving back Go out data and exception exits the stability parameter that data determine intended application process;Judge whether stability parameter meets default item Part;In the case where judging that stability parameter is unsatisfactory for preset condition, the delete target code from destination application.
Processor 601 is additionally operable to perform:The first object is created in intended application process, wherein, the first object is with target Exiting for application process and it is destroyed;Whether destroyed monitor the first object;Monitor the first object it is destroyed when determine mesh Mark application process exits, wherein, intended application process, which is exited, to be exited including exception and normally exits;Intended application process is exited When the data that generate exit data as first.
Processor 601 is additionally operable to perform:The first notice of the first object is registered, wherein, the first notice is used to indicate first Process where object has dropped out;Judge whether to detect the first notice;In the case where detecting the first notice, first is determined Object is destroyed.
Processor 601 is additionally operable to perform:Obtain intended application process exception exit data, wherein, intended application into In the case that Cheng Yichang is exited, exception can be generated and exit data;Obtain intended application process first exits data, wherein, Intended application process normally exits and exception is exited in the case of two kinds, can all generate first and exit data;Number is exited according to abnormal Data are normally exited according to data acquisition is exited with first.
Processor 601 is additionally operable to perform:Gravestone file directory according to reading judges whether gravestone file directory occurs Change;If gravestone file directory is changed, it is determined that abnormal exit has occurred in intended application process;By intended application Process is abnormal the operation data generated when exiting and exits data as abnormal.
Processor 601 is additionally operable to perform:Create directory modification event sniffer, wherein, in the modification event prison that creaties directory It after listening device, is exited if there is application process is abnormal, system can generate gravestone file;Judge whether system generates gravestone File;In the case where system generates gravestone file, determine that gravestone file directory is changed, intended application process is sent out The operation data that raw exception generates when exiting exit data as exception to be included:Gravestone file is parsed, exception is obtained and exits data.
Processor 601 is additionally operable to perform:Debugging routine is run, wherein, generate first during running debugging routine Process;Detect whether the first process creates gravestone file;In the case where detecting the first process creation gravestone file, really Abnormal exit has occurred in the application process that sets the goal;The operation data generated when intended application process is abnormal and is exited are as different Often exit data.
Optionally, the specific example in the present embodiment may be referred to the example described in above-described embodiment, the present embodiment Details are not described herein.
The embodiment of the present invention additionally provides a kind of storage medium.Optionally, in the present embodiment, above-mentioned storage medium can For storing the program code of the method for the embodiment of the present invention.
Optionally, in the present embodiment, above-mentioned storage medium can be located at mobile communications network, wide area network, Metropolitan Area Network (MAN) or At least one network equipment in multiple network equipments in the network of LAN.
Optionally, in the present embodiment, storage medium is arranged to storage for performing the program code of following steps:
S1, operational objective application program, wherein, destination application is application program to be tested, destination application In be injected with object code, intended application process is generated during operational objective application program;
S2, the operation data of monitoring objective application process, wherein, operation data include the normal of intended application process and exit Data and exception exit data;
S3, according to normally exiting data and the abnormal stability parameter for exiting data and determining intended application process;
S4, judges whether stability parameter meets preset condition;
S5, in the case where judging that stability parameter is unsatisfactory for preset condition, the delete target from destination application Code.
Optionally, in the present embodiment, processor is performed according to stored program code in storage medium:It should in target With creating the first object in process, wherein, the first object is destroyed with exiting for intended application process;Monitoring the first object is It is no destroyed;Monitor the first object it is destroyed when determine that intended application process exits, wherein, intended application process exits bag Exception is included to exit and normally exit;The data generated when intended application process is exited exit data as first.
Optionally, in the present embodiment, processor is performed according to stored program code in storage medium:Registration first First notice of object, wherein, the process where the first notice is used to indicate the first object has dropped out;Judge whether to detect One notice;In the case where detecting the first notice, determine that the first object is destroyed.
Optionally, in the present embodiment, processor is performed according to stored program code in storage medium:Obtain target The exception of application process exits data, wherein, in the case where intended application process exception exits, exception can be generated and exit number According to;Obtain intended application process first exits data, wherein, it is normally exited in intended application process and exception exits two kinds of feelings Under condition, it can all generate first and exit data;It exits data acquisition according to the abnormal data and first that exit and normally exits data.
Optionally, in the present embodiment, processor is performed according to stored program code in storage medium:According to reading To gravestone file directory judge whether gravestone file directory is changed;If gravestone file directory is changed, Determine that abnormal exit has occurred in intended application process;The operation data generated when intended application process is abnormal and is exited as Exception exits data.
Optionally, in the present embodiment, processor is performed according to stored program code in storage medium:It creaties directory Event sniffer is changed, wherein, after the modification event sniffer that creaties directory, exited if there is application process is abnormal, System can generate gravestone file;Judge whether system generates gravestone file;In the case where system generates gravestone file, really Determine gravestone file directory to be changed, the operation data generated when intended application process is abnormal and is exited are moved back as abnormal Going out data includes:Gravestone file is parsed, exception is obtained and exits data.
Optionally, in the present embodiment, processor is performed according to stored program code in storage medium:Operation debugging Program, wherein, generate the first process during running debugging routine;Detect whether the first process creates gravestone file; In the case where detecting the first process creation gravestone file, determine that abnormal exit has occurred in intended application process;By target Application process is abnormal the operation data generated when exiting and exits data as abnormal.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to:USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disc or The various media that can store program code such as CD.
Optionally, the specific example in the present embodiment may be referred to the example described in above-described embodiment, the present embodiment Details are not described herein.
If the integrated unit in above-described embodiment is realized in the form of SFU software functional unit and is independent product Sale or in use, the storage medium that above computer can be read can be stored in.Based on such understanding, skill of the invention The part or all or part of the technical solution that art scheme substantially in other words contributes to the prior art can be with soft The form of part product embodies, which is stored in storage medium, is used including some instructions so that one Platform or multiple stage computers equipment (can be personal computer, server or network equipment etc.) perform each embodiment institute of the present invention State all or part of step of method.
In the above embodiment of the present invention, all emphasize particularly on different fields to the description of each embodiment, do not have in some embodiment The part of detailed description may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed client, it can be by others side Formula is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, is only one Kind of division of logic function, can there is an other dividing mode in actual implementation, for example, multiple units or component can combine or It is desirably integrated into another system or some features can be ignored or does not perform.It is another, it is shown or discussed it is mutual it Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module It connects, can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit The component shown may or may not be physical location, you can be located at a place or can also be distributed to multiple In network element.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also That unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list The form that hardware had both may be employed in member is realized, can also be realized in the form of SFU software functional unit.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (14)

1. a kind of test method of application program, which is characterized in that including:
Operational objective application program, wherein, the destination application is application program to be tested, the destination application In be injected with object code, generate intended application process during the destination application is run;
The operation data of the intended application process are monitored, wherein, the operation data are including the intended application process just It often exits data and exception exits data;
Normal data are exited according to described and the exception exits the stability parameter that data determine the intended application process;
Judge whether the stability parameter meets preset condition;
In the case where judging that the stability parameter is unsatisfactory for the preset condition, deleted from the destination application The object code.
2. according to the method described in claim 1, it is characterized in that, the operation data exit data, the prison including first Controlling the operation data of the intended application process includes:
The first object is created in the intended application process, wherein, the first object moving back with the intended application process Go out and destroyed;
Whether destroyed monitor first object;
Monitor first object it is destroyed when determine that the intended application process exits, wherein, the intended application into Journey, which is exited, to be exited including exception and normally exits;
The data generated when the intended application process is exited exit data as described first.
3. according to the method described in claim 2, it is characterized in that, monitoring first object it is whether destroyed including:
Register the first notice of first object, wherein, first notice be used to indicate where first object into Journey has dropped out;
Judge whether to detect first notice;
In the case where detecting first notice, determine that first object is destroyed.
4. the according to the method described in claim 1, it is characterized in that, operation data packet of the monitoring intended application process It includes:
The exception for obtaining the intended application process exits data, wherein, in the situation that the intended application process exception exits Under, the exception can be generated and exit data;
Obtain the intended application process first exits data, wherein, it is normally exited and abnormal in the intended application process It exits in the case of two kinds, can all generate described first and exit data;
Data are normally exited according to the exception exits data and described first exits data acquisition.
5. the according to the method described in claim 1, it is characterized in that, operation data packet of the monitoring intended application process It includes:
Gravestone file directory according to reading judges whether the gravestone file directory is changed;
If the gravestone file directory is changed, it is determined that abnormal exit has occurred in the intended application process;
The operation data generated when the intended application process is abnormal and is exited exit data as the exception.
6. according to the method described in claim 5, it is characterized in that, the gravestone is judged according to the gravestone file directory read Whether file directory, which has occurred change, includes:
Create directory modification event sniffer, wherein, after catalogue modification event sniffer is created, if there is application into Journey, which is abnormal, to be exited, and system can generate gravestone file;
Judge whether the system generates the gravestone file;
In the case where the system generates the gravestone file, determine that the gravestone file directory is changed,
The operation data generated when the intended application process is abnormal and is exited exit data as the exception to be included:
The gravestone file is parsed, the exception is obtained and exits data.
7. the according to the method described in claim 1, it is characterized in that, operation data packet of the monitoring intended application process It includes:
Debugging routine is run, wherein, the first process is generated during running the debugging routine;
Detect whether first process creates gravestone file;
In the case where detecting first process creation gravestone file, determine that the intended application process has occurred Exception exits;
The operation data generated when the intended application process is abnormal and is exited exit data as the exception.
8. a kind of test device of application program, which is characterized in that including:
Running unit, for operational objective application program, wherein, the destination application is application program to be tested, institute State and object code be injected in destination application, generated during the destination application is run intended application into Journey;
Monitoring unit, for monitoring the operation data of the intended application process, wherein, the operation data include the target The normal data that exit of application process exit data with abnormal;
Determination unit, for normal exiting data and the exception exits data and determines the intended application process according to described Stability parameter;
Judging unit, for judging whether the stability parameter meets preset condition;
Unit is deleted, in the case where judging that the stability parameter is unsatisfactory for the preset condition, from the target The object code is deleted in application program.
9. device according to claim 8, which is characterized in that the operation data exit data, the prison including first Control unit includes:
Subelement is created, for creating the first object in the intended application process, wherein, first object is with the mesh Mark exiting for application process and it is destroyed;
Subelement is monitored, it is whether destroyed for monitoring first object;
First determination subelement, for monitor first object it is destroyed when determine that the intended application process exits, Wherein, the intended application process, which is exited, exits including exception and normally exits;
Second determination subelement, the data for being generated when the intended application process is exited exit number as described first According to.
10. device according to claim 9, which is characterized in that the monitoring subelement includes:
Registration module, for registering the first of first object the notice, wherein, first notice is used to indicate described first Process where object has dropped out;
First judgment module, for judging whether to detect first notice;
First determining module, in the case where detecting first notice, determining that first object is destroyed.
11. device according to claim 8, which is characterized in that the monitoring unit includes:
First obtains subelement, and the exception for obtaining the intended application process exits data, wherein, in the intended application In the case that process exception exits, the exception can be generated and exit data;
Second obtains subelement, and first for obtaining the intended application process exits data, wherein, in the intended application Process normally exits and exception is exited in the case of two kinds, can all generate described first and exit data;
3rd obtains subelement, for normally being exited according to the exception exits data and described first exits data acquisition Data.
12. device according to claim 8, which is characterized in that the monitoring unit includes:
Judgment sub-unit, for judging whether the gravestone file directory is changed according to the gravestone file directory read Become;
3rd determination subelement, if changed for the gravestone file directory, it is determined that the intended application process Abnormal exit has occurred;
4th determination subelement, for the operation data that are generated when the intended application process is abnormal and is exited as described in Exception exits data.
13. device according to claim 12, which is characterized in that the judgment sub-unit includes:
Creation module, for the modification event sniffer that creaties directory, wherein, create catalogue modification event sniffer it Afterwards, exited if there is application process is abnormal, system can generate gravestone file;
Second judgment module, for judging whether the system generates the gravestone file;
Second determining module in the case of generating the gravestone file in the system, determines the gravestone file mesh Record is changed,
4th determination subelement includes:
Parsing module for parsing the gravestone file, obtains the exception and exits data.
14. device according to claim 8, which is characterized in that the monitoring unit includes:
Subelement is run, for running debugging routine, wherein, the first process is generated during running the debugging routine;
Detection sub-unit, for detecting whether first process creates gravestone file;
5th determination subelement, for detecting first process creation gravestone file in the detection sub-unit In the case of, determine that abnormal exit has occurred in the intended application process;
6th determination subelement, for the operation data that are generated when the intended application process is abnormal and is exited as described in Exception exits data.
CN201610992267.2A 2016-11-10 2016-11-10 Application program testing method and device Active CN108073499B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610992267.2A CN108073499B (en) 2016-11-10 2016-11-10 Application program testing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610992267.2A CN108073499B (en) 2016-11-10 2016-11-10 Application program testing method and device

Publications (2)

Publication Number Publication Date
CN108073499A true CN108073499A (en) 2018-05-25
CN108073499B CN108073499B (en) 2020-09-29

Family

ID=62154776

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610992267.2A Active CN108073499B (en) 2016-11-10 2016-11-10 Application program testing method and device

Country Status (1)

Country Link
CN (1) CN108073499B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109002694A (en) * 2018-06-08 2018-12-14 广东小天才科技有限公司 A kind of application code obscures the method and device of rear orientation problem point
CN109117340A (en) * 2018-06-29 2019-01-01 Oppo(重庆)智能科技有限公司 A kind of mobile terminal and its monitoring method, the storage medium of interprocess communication
CN109753419A (en) * 2018-12-29 2019-05-14 苏州思必驰信息科技有限公司 A kind of method and device of the abnormal log information of all applications of non-invasive monitoring Android system
CN111159702A (en) * 2019-12-12 2020-05-15 北京神州绿盟信息安全科技股份有限公司 Process list generation method and device
CN116627848A (en) * 2023-07-24 2023-08-22 成都中科合迅科技有限公司 Automatic test method and system for application program

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1983209A (en) * 2005-12-14 2007-06-20 中兴通讯股份有限公司 System and method for automatically testing software unit
US7299455B2 (en) * 1995-06-02 2007-11-20 Cisco Technology, Inc. Remote monitoring of computer programs
CN101719077A (en) * 2009-12-24 2010-06-02 北京飞天诚信科技有限公司 Method and device for injecting codes in .Net program
CN101847121A (en) * 2010-05-07 2010-09-29 北京大学 Method for discovering software vulnerabilities
CN101859274A (en) * 2009-04-07 2010-10-13 西门子(中国)有限公司 Method and system for fuzz testing
CN102141962A (en) * 2011-04-07 2011-08-03 北京航空航天大学 Safety distributed test framework system and test method thereof
CN102156640A (en) * 2011-04-19 2011-08-17 山东浪潮金融信息***有限公司 Method for generating data operation code
CN102722434A (en) * 2012-05-24 2012-10-10 兰雨晴 Performance test method and tool aiming at Linux process scheduling
CN103516557A (en) * 2012-06-26 2014-01-15 腾讯科技(深圳)有限公司 Method and system for testing
US8645766B2 (en) * 2011-10-05 2014-02-04 International Business Machines Corporation Serialized error injection into a function under test
CN103701657A (en) * 2012-09-28 2014-04-02 ***股份有限公司 Device and method for monitoring and processing dysfunction of continuously running data processing system
CN104268055A (en) * 2014-09-01 2015-01-07 腾讯科技(深圳)有限公司 Program exception monitoring method and device
CN104834590A (en) * 2014-02-11 2015-08-12 腾讯科技(深圳)有限公司 Software test method and system
CN105094777A (en) * 2014-05-14 2015-11-25 腾讯科技(深圳)有限公司 Method and device for realizing application screen shot
CN105701000A (en) * 2014-11-25 2016-06-22 中兴通讯股份有限公司 Service testing method and device
CN105786562A (en) * 2016-02-04 2016-07-20 百度在线网络技术(北京)有限公司 Method and device for integrating plug-in
CN106055469A (en) * 2016-05-19 2016-10-26 中国科学院软件研究所 System and method for mobile terminal application testing based on code injection

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7299455B2 (en) * 1995-06-02 2007-11-20 Cisco Technology, Inc. Remote monitoring of computer programs
CN1983209A (en) * 2005-12-14 2007-06-20 中兴通讯股份有限公司 System and method for automatically testing software unit
CN101859274A (en) * 2009-04-07 2010-10-13 西门子(中国)有限公司 Method and system for fuzz testing
CN101719077A (en) * 2009-12-24 2010-06-02 北京飞天诚信科技有限公司 Method and device for injecting codes in .Net program
CN101847121A (en) * 2010-05-07 2010-09-29 北京大学 Method for discovering software vulnerabilities
CN102141962A (en) * 2011-04-07 2011-08-03 北京航空航天大学 Safety distributed test framework system and test method thereof
CN102156640A (en) * 2011-04-19 2011-08-17 山东浪潮金融信息***有限公司 Method for generating data operation code
US8645766B2 (en) * 2011-10-05 2014-02-04 International Business Machines Corporation Serialized error injection into a function under test
CN102722434A (en) * 2012-05-24 2012-10-10 兰雨晴 Performance test method and tool aiming at Linux process scheduling
CN103516557A (en) * 2012-06-26 2014-01-15 腾讯科技(深圳)有限公司 Method and system for testing
CN103701657A (en) * 2012-09-28 2014-04-02 ***股份有限公司 Device and method for monitoring and processing dysfunction of continuously running data processing system
CN104834590A (en) * 2014-02-11 2015-08-12 腾讯科技(深圳)有限公司 Software test method and system
CN105094777A (en) * 2014-05-14 2015-11-25 腾讯科技(深圳)有限公司 Method and device for realizing application screen shot
CN104268055A (en) * 2014-09-01 2015-01-07 腾讯科技(深圳)有限公司 Program exception monitoring method and device
CN105701000A (en) * 2014-11-25 2016-06-22 中兴通讯股份有限公司 Service testing method and device
CN105786562A (en) * 2016-02-04 2016-07-20 百度在线网络技术(北京)有限公司 Method and device for integrating plug-in
CN106055469A (en) * 2016-05-19 2016-10-26 中国科学院软件研究所 System and method for mobile terminal application testing based on code injection

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CENTTIAN: "Android Tombstone分析", 《HTTPS://WWW.CNBLOGS.COM/CODERTIAN/P/5980426.HTML》 *
JLTXGCY: "Binder对象死亡通知机制", 《HTTPS://BLOG.CSDN.NET/JLTXGCY/ARTICLE/DETAILS/27791513》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109002694A (en) * 2018-06-08 2018-12-14 广东小天才科技有限公司 A kind of application code obscures the method and device of rear orientation problem point
CN109117340A (en) * 2018-06-29 2019-01-01 Oppo(重庆)智能科技有限公司 A kind of mobile terminal and its monitoring method, the storage medium of interprocess communication
CN109117340B (en) * 2018-06-29 2022-03-29 Oppo(重庆)智能科技有限公司 Mobile terminal, method for monitoring interprocess communication of mobile terminal and storage medium
CN109753419A (en) * 2018-12-29 2019-05-14 苏州思必驰信息科技有限公司 A kind of method and device of the abnormal log information of all applications of non-invasive monitoring Android system
CN111159702A (en) * 2019-12-12 2020-05-15 北京神州绿盟信息安全科技股份有限公司 Process list generation method and device
CN111159702B (en) * 2019-12-12 2022-02-18 绿盟科技集团股份有限公司 Process list generation method and device
CN116627848A (en) * 2023-07-24 2023-08-22 成都中科合迅科技有限公司 Automatic test method and system for application program
CN116627848B (en) * 2023-07-24 2023-09-29 成都中科合迅科技有限公司 Automatic test method and system for application program

Also Published As

Publication number Publication date
CN108073499B (en) 2020-09-29

Similar Documents

Publication Publication Date Title
CN108073499A (en) The test method and device of application program
CN103309808B (en) Based on privacy disclosure of Android user black box detection method and the system of label
US9588834B1 (en) Methods and apparatus for improved fault analysis
CN112385196B (en) System and method for reporting computer security incidents
CN110505241A (en) A kind of network attack face detection method and system
US10515220B2 (en) Determine whether an appropriate defensive response was made by an application under test
US10320828B1 (en) Evaluation of security in a cyber simulator
CN104303189B (en) System and method for determining vulnerability of application program
CN110287701A (en) A kind of malicious file detection method, device, system and associated component
US20210264023A1 (en) Command inspection method and apparatus, computer device, and storage medium
CN107741902A (en) Program application detection method and program application detection means
CN109302423A (en) A kind of vulnerability scanning aptitude tests method and apparatus
CN110401580A (en) Webpage status monitoring method and relevant device based on heartbeat mechanism
CN114553596A (en) Multi-dimensional security condition real-time display method and system suitable for network security
CN111125066B (en) Method and device for detecting functions of database auditing equipment
CN115828256B (en) Unauthorized and unauthorized logic vulnerability detection method
JP2012083909A (en) Application characteristic analysis device and program
CN115834188A (en) Vulnerability scanning monitoring method and system, electronic equipment and storage medium
CN107402883B (en) A kind of data test treating method and apparatus
CN110460620A (en) Website defence method, device, equipment and storage medium
CN115659351A (en) Information security analysis method, system and equipment based on big data office
JP2018169643A (en) Security operation system, security operation management apparatus, and security operation method
CN113297090B (en) System test method, device, computer equipment and storage medium
WO2016036368A1 (en) Determine protective measure for data that meets criteria
CN116414722B (en) Fuzzy test processing method and device, fuzzy test system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant