CN108073499A - The test method and device of application program - Google Patents
The test method and device of application program Download PDFInfo
- Publication number
- CN108073499A CN108073499A CN201610992267.2A CN201610992267A CN108073499A CN 108073499 A CN108073499 A CN 108073499A CN 201610992267 A CN201610992267 A CN 201610992267A CN 108073499 A CN108073499 A CN 108073499A
- Authority
- CN
- China
- Prior art keywords
- data
- application process
- intended application
- exits
- gravestone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/3644—Software debugging by instrumenting at runtime
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/3624—Software debugging by performing operations on the source code, e.g. via a compiler
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention discloses the test methods and device of a kind of application program.Wherein, this method includes:Operational objective application program, wherein, destination application is application program to be tested, and object code is injected in destination application, and intended application process is generated during operational objective application program;The operation data of monitoring objective application process, wherein, the normal data that exit that operation data include intended application process exit data with abnormal;The stability parameter for exiting data according to data and exception is normally exited and determining intended application process;Judge whether stability parameter meets preset condition;In the case where judging that stability parameter is unsatisfactory for preset condition, the delete target code from destination application.The present invention solve test application program in the prior art accuracy it is low the technical issues of.
Description
Technical field
The present invention relates to application domain, in particular to the test method and device of a kind of application program.
Background technology
After the code injection that can realize some specific function by one section is into some application program, this is run using journey
The application process that sequence obtains has the function of this, for example, assuming that the effect of object code is to intercept advertisement, then by target generation
After code is injected into application program A, when running application program A, it becomes possible to realize the interception to advertisement.But by target generation
Code is injected into after application program A, it is possible to can influence the stability of application program A operations.Therefore, it is necessary to application program A
It is tested, with the power for the influence that the injection for judging object code generates the operation of application program A.
The influence of the stability of the code application processes of injection is mainly monitored according to signal processor in the prior art.
Detailed process is:Application program in Android may be at two kinds of operating statuses:Native and Java Virtual Machine.Native
As common Linux programs, and Java Virtual Machine is then the Java bytecode of operation.Occur when the code of native is run
During mistake, kernel can send a signal to process, and the signal processor of calling process come the handling result given tacit consent to after handling be into
Cheng Yichang is exited.Also there is similar mechanism in Java Virtual Machine, when being abnormal and application code does not capture, virtual machine meeting
The exception handler of thread is called to handle, default treatment result is also that process exception exits.Under two states, using can
It registers oneself processor and receives this kind of unexpected message to replace default processor, deal with problems arising from an accident so as to do some before process exits
Work:Such as record log etc..The abnormal conditions of application process itself can be monitored using this technical characterstic.
In the prior art method primary disadvantage is that can only monitor it is single exited using the exception of itself, can not know simultaneously
Normal exit of application exits situation with abnormal, therefore the accuracy of test application program is low.
For it is above-mentioned the problem of, currently no effective solution has been proposed.
The content of the invention
An embodiment of the present invention provides the test method and device of a kind of application program, at least to solve to survey in the prior art
The technical issues of accuracy of examination application program is low.
One side according to embodiments of the present invention provides a kind of test method of application program, including:Operational objective
Application program, wherein, the destination application is application program to be tested, and target is injected in the destination application
Code generates intended application process during the destination application is run;Monitor the intended application process
Data are run, wherein, the normal data that exit that the operation data include the intended application process exit data with abnormal;Root
Normal data are exited according to described and the exception exits the stability parameter that data determine the intended application process;Described in judgement
Whether stability parameter meets preset condition;In the case where judging that the stability parameter is unsatisfactory for the preset condition,
The object code is deleted from the destination application.
Another aspect according to embodiments of the present invention additionally provides a kind of test device of application program, including:Operation is single
Member, for operational objective application program, wherein, the destination application is application program to be tested, the intended application
Object code is injected in program, intended application process is generated during the destination application is run;Monitoring is single
Member, for monitoring the operation data of the intended application process, wherein, the operation data include the intended application process
The normal data that exit exit data with abnormal;Determination unit, for normal exiting data and the exception exits number according to described
According to the stability parameter for determining the intended application process;Judging unit, for judging it is pre- whether the stability parameter meets
If condition;Unit is deleted, in the case where judging that the stability parameter is unsatisfactory for the preset condition, from the mesh
The object code is deleted in mark application program.
In embodiments of the present invention, object code is injected in destination application, operational objective application program generates
Intended application process, normal according to intended application process exit data and abnormal exit data and determine the steady of intended application process
Qualitative parameter if the stability parameter meets preset condition, illustrates shadow of the object code to the stability of intended application process
Sound is smaller;If the stability parameter is unsatisfactory for preset condition, illustrate shadow of the object code to the stability of intended application process
Sound is larger, in the case where object code is to being affected of the stability of intended application process, is deleted from destination application
Except object code, due to can obtain application process simultaneously it is normal exit situation and it is abnormal exit situation, this test
The mode of application program takes into account the influence that the code of injection runs application program comprehensively, has reached and has improved application program
The technique effect of the accuracy of test, and then the technical issues of the accuracy that solves test application program in the prior art is low.
Description of the drawings
Attached drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, this hair
Bright schematic description and description does not constitute improper limitations of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is the schematic diagram of hardware environment according to embodiments of the present invention;
Fig. 2 is the flow chart of the test method of application program according to embodiments of the present invention;
Fig. 3 is the monitoring flow chart that application according to embodiments of the present invention is exited extremely;
Fig. 4 is the dlopen function execution flow charts of abduction according to embodiments of the present invention;
Fig. 5 is the schematic diagram of the test device of application program according to embodiments of the present invention;
Fig. 6 is the schematic diagram of server according to embodiments of the present invention.
Specific embodiment
In order to which those skilled in the art is made to more fully understand the present invention program, below in conjunction in the embodiment of the present invention
The technical solution in the embodiment of the present invention is clearly and completely described in attached drawing, it is clear that described embodiment is only
The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
Member's all other embodiments obtained without making creative work should all belong to the model that the present invention protects
It encloses.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, "
Two " etc. be the object for distinguishing similar, without being used to describe specific order or precedence.It should be appreciated that it so uses
Data can exchange in the appropriate case, so as to the embodiment of the present invention described herein can with except illustrating herein or
Order beyond those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover
Cover it is non-exclusive include, be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment
Those steps or unit clearly listed, but may include not list clearly or for these processes, method, product
Or the intrinsic other steps of equipment or unit.
Explanation of technical terms:
Logcat:The log system of android system, external tool can be by logcat come during reading system operation
Log information.
Gravestone file:When android system is abnormal, some information at system meeting recording exceptional scene are led to file
It can often preserve a to under/data/system/dropbox catalogues.
debuggerd:Debuggerd is that android system carries process, when having application process to be abnormal and dead
When, debuggerd processes can read the stack information of crash processes and store in gravestone file, while crash daily records are exported
To logcat.
Binder service objects:The server-side object of android system mid-span process communication, corresponding the opposing party are
Binder target client.When service object's death, the binder client couple for having registered dead monitoring information can be sent notification to
As.
It should be noted that the application process in the embodiment of the present invention exit exited extremely including application process and using into
Cheng Zhengchang is exited.
According to embodiments of the present invention, a kind of embodiment of the test method of application program is provided.
Optionally, in the present embodiment, the test method of above application program can be applied to as shown in Figure 1 by servicing
In the hardware environment that device 102 and terminal 104 are formed.As shown in Figure 1, server 102 is connected by network and terminal 104
It connects, above-mentioned network includes but not limited to:Wide area network, Metropolitan Area Network (MAN) or LAN, terminal 104 are not limited to PC, mobile phone, tablet electricity
Brain etc..The test method of the application program of the embodiment of the present invention can be performed by terminal 104, can also by server 102
It performs.Terminal 104 perform the embodiment of the present invention application program test method can be by client mounted thereto Lai
It performs.
Test method in application program is performed by terminal 104, and the process of this method is as follows:Terminal 104
Destination application in be injected with object code, operational objective application program generates intended application process, and terminal 104 monitors mesh
The operation data of application process are marked, operation data normally exit data including intended application process and exception exits data.Terminal
104 exit the stability parameter that data determine intended application process according to data are normally exited with abnormal, judge stability parameter
Whether preset condition is met.In the case where terminal 104 judges that stability parameter is unsatisfactory for preset condition, illustrating should in target
With object code being affected to the stability of intended application process is injected in program, need at this time from destination application
Delete target code.
Test method in application program is performed by server 102, network provided in an embodiment of the present invention
Framework map is as shown in Figure 1.As shown in Figure 1, object code is injected in the destination application of terminal 104, operational objective application
Program generate intended application process, the operation data of 104 monitoring objective application process of terminal, operation data include intended application into
Cheng Zhengchang exits data and exception exits data.The normal data that exit are exited data sending to server by terminal 104 with abnormal
102.Server 102 receive intended application process it is normal exit data and it is abnormal exit data, and according to normally exiting data
With the abnormal stability parameter for exiting data and determining intended application process.It is pre- that server 102 judges whether stability parameter meets
If condition.In the case where server 102 judges that stability parameter is unsatisfactory for preset condition, illustrate in destination application
Injection object code is affected to the stability of intended application process, needs to send to terminal 104 at this time and instructs, the instruction
It is used to indicate the delete target code from destination application.
According to embodiments of the present invention, provide a kind of test method of application program, as shown in Fig. 2, this method include with
Lower step:
Step S202, operational objective application program, wherein, destination application is application program to be tested, and target should
With object code is injected in program, intended application process is generated during operational objective application program.
Step S204, the operation data of monitoring objective application process, wherein, operation data are including intended application process just
It often exits data and exception exits data.
Step S206, according to normally exiting data and the abnormal stability parameter for exiting data and determining intended application process.
Step S208, judges whether stability parameter meets preset condition.
Step S210 in the case where judging that stability parameter is unsatisfactory for preset condition, is deleted from destination application
Except object code.
Object code can be that by one section of code of some function.As an example it is assumed that the effect of object code
It is to intercept advertisement, then after object code is injected into application program A, when running application program A, it becomes possible to realization pair
The interception of advertisement.But object code is injected into after application program A, it is possible to the stabilization of application program A operations can be influenced
Property.Therefore, it is necessary to test application program A, the shadow generated is run to application program A with the injection for judging object code
It rings strong and weak.
In embodiments of the present invention, it can show that the parameter of the stability of application program operation can serve as application process
Stability parameter, several illustrate can be listed below there are many representation in stability parameter.
The first representation of stability parameter:
si=ai/biFormula (1)
Wherein, siRepresent the stability parameter of intended application process i, aiRepresent intended application process i within a period of time
Exception exit number (being obtained according to the abnormal data that exit), biRepresent intended application process i exiting within this time
Number, wherein, bi=ai+ci, ciRepresent that normal within this time of intended application process i exits number (according to normally moving back
Go out data acquisition).
Stability parameter s shown by formula (1)iIt is the abnormal rate of intended application process i, applying for usual one is not having
In the case of great bug, abnormal rate should be very low or even close to 0, if abnormal rate is higher than 1%, general be believed that should
With there is serious quality problems.
Second of representation of stability parameter:
si=ai/ciFormula (2)
Wherein, siRepresent the stability parameter of intended application process i, aiRepresent intended application process i within a period of time
Exception exit number (being obtained according to the abnormal data that exit), ciRepresent that intended application process i is normal within this time
Exit number (being obtained according to the normal data that exit).
When destination application has multiple (being more than or equal to 2), target can be generated by running each destination application
Application process, therefore, one meets the multiple intended application processes of generation together, and in this case, aforementioned stable parameter can consider
It is that the stability of comprehensive N number of intended application process obtains, stability parameter can be that this multiple intended application process is each
From stability parameter weighted average.That is, the third representation of stability parameter:
N represent one share N number of destination application, run each destination application obtain an intended application into
Journey, i.e. one shares N number of intended application process.S represents the stability that the stability of comprehensive N number of intended application process obtains
Parameter.
Wherein, siRepresent the stability parameter of intended application process i, siIt can be counted by above-mentioned formula (1) or formula (2)
It calculates.
wiRepresent the weight of intended application process i.Can be according to the significance level of different target application program, it will be different
The corresponding intended application process of destination application assigns different weighted values.The benefit of the method for this computational stability parameter
It is:It is filled with object code in multiple application programs, object code is to the stability of the corresponding application process of application program
Influence may be different, to being affected for the stability of some application processes, to the stabilization of other application process
The influence of property is smaller.For important application program, the weight of its corresponding application process is assigned to larger numerical value, it is right
In more unessential application program, the weight of its corresponding application process is assigned to smaller numerical value, in such manner, it is possible to highlight
Influence of the object code to the stability of important application process.
When destination application has multiple (being more than or equal to 2), stability parameter can also have the 4th kind of representation:
S=A/B formula (4)
S represents the stability parameter that the stability of comprehensive N number of intended application process obtains.
A represents that the exception of N number of intended application process exits the summation of number,aiRepresent intended application process i
Exception within a period of time exits number (being obtained according to the abnormal data that exit).
B represents the summation for exiting number of N number of intended application process,biRepresent intended application process i at this
Number is exited within the section time.
By considering the stability of multiple application processes, a stability parameter is obtained, according to the stability parameter
Judge that influence of the injection object code to system application process is strong and weak, achieved the effect that improve the accuracy judged.
After stability parameter is obtained, judge whether stability parameter meets preset condition.Preset condition can be one
A numberical range, for example, preset condition, which is stability parameter, is less than 0.01%.
When stability parameter meets preset condition, it is believed that the stability influence of the code application processes of injection is smaller.
When stability parameter is unsatisfactory for preset condition, it is believed that the stability influence of the object code application processes of injection is larger, needs
The object code of injection is deleted from application program.
In embodiments of the present invention, object code is injected in destination application, operational objective application program generates
Intended application process, normal according to intended application process exit data and abnormal exit data and determine the steady of intended application process
Qualitative parameter if the stability parameter meets preset condition, illustrates shadow of the object code to the stability of intended application process
Sound is smaller;If the stability parameter is unsatisfactory for preset condition, illustrate shadow of the object code to the stability of intended application process
Sound is larger, in the case where object code is to being affected of the stability of intended application process, is deleted from destination application
Except object code, due to can obtain application process simultaneously it is normal exit situation and it is abnormal exit situation, this test
The mode of application program takes into account the influence that the code of injection runs application program comprehensively, solves and tests in the prior art
The technical issues of accuracy of application program is low has reached the technique effect of the accuracy for the test for improving application program.
The process of the operation data of monitoring objective application process can be such:First is created in intended application process
Object, wherein, the first object is destroyed with exiting for intended application process;Whether destroyed monitor the first object;It is monitoring
To the first object it is destroyed when determine that intended application process exits, wherein, intended application process is exited to be exited and just including abnormal
Often exit;The data generated when intended application process is exited exit data as first.It is exited in intended application process exception
In the case of, exception can be generated and exit data;It is normally exited in intended application process and exception exits two kinds, can all produced
Raw first exits data.
First object is created in the intended application process space one object with life cycle, the first object and
Process where it is shared weal and woe, and when the process where it exits, the first object can be destroyed.Therefore, by monitoring first pair
As if it is no destroyed, whether the process where can learning it exits.
First object can be binder objects, socket objects etc..
In the case where the first object is binder objects, whether destroyed the first object of monitoring process be as follows:Registration
The first notice of binder service objects, wherein, the process where the first notice is used to indicate binder has dropped out;Judge whether
Detect the first notice;In the case where detecting the first notice, determine that binder objects are destroyed.
Binder be android system striding course communication a kind of mechanism, and can in binder object death (
Process where binder exits) send necrology (the i.e. first notice) to its client.Monitor client is initially injected mesh
Mark process creates binder service objects.Then the necrology of the binder service objects is registered, it is possible to which obtaining target should
Number is exited with process (first exits data).
In the case where the first object is socket objects, whether destroyed the first object of monitoring process be as follows:It calls
Object function, wherein, object function is used to receive the information of intended application process transmission, and exited in intended application process
In the case of, object function exits;Judge whether to detect that object function exits;In the case where detecting that object function exits,
Determine that socket objects are destroyed.
Object function is for receiving a function of the information of intended application process transmission, when intended application process exits
When, object function can exit therewith, therefore, by detecting whether object function exits, can learn socket objects whether by
It destroys, so as to learn whether process exits.
Optionally, the operation data of monitoring objective application process include:The exception for obtaining intended application process exits data,
Wherein, in the case where intended application process exception exits, exception can be generated and exit data;Obtain the first of intended application process
Data are exited, wherein, it is normally exited in intended application process and exception exits two kinds, can all generated first and exit number
According to;It exits data acquisition according to the abnormal data and first that exit and normally exits data.
The operation data of intended application process exit data including first.First has exited the acquisition process of data above
It is described in detail.
The exception for obtaining application exits data any one in following two methods may be employed:
The exception for obtaining application exits the first method of data:
The exception applied using gravestone file acquisition exits data.Gravestone file directory according to reading judges gravestone text
Whether part catalogue is changed;If gravestone file directory is changed, it is determined that exception has occurred in intended application process
It exits;The operation data generated when intended application process is abnormal and is exited exit data as abnormal.
The characteristics of due to android system, when application process normally exits, will not generate gravestone file;It is sent out in application
When raw exception exits, a gravestone file can be recorded to specific catalogue, therefore the events such as written document by monitoring the catalogue,
Can know has process to be abnormal, and by parsing the particular content of gravestone file, can know that is be abnormal specifically should
Use information.If gravestone file directory is changed, illustrate that abnormal exit has occurred in intended application process.
Gravestone file directory according to reading judges whether gravestone file directory is changed, this process can make
It is realized with following methods (a) or method (b).
Method (a):Create directory modification event sniffer, wherein, after the modification event sniffer that creaties directory, if
There is application process to be abnormal to exit, system can generate gravestone file;Judge whether system generates gravestone file;It is given birth in system
In the case of gravestone file, determine that gravestone file directory is changed.Intended application process is abnormal when exiting
The operation data of generation exit data as exception to be included:Gravestone file is parsed, exception is obtained and exits data.
It can know that the exception all applied exits using gravestone file, inotify mechanism monitors gravestone text may be employed
The modification event of part catalogue, this method are real-time.Detailed process is:The modification event sniffer that creates a directory first is (logical
Cross inotify), when application is abnormal and exits, system can generate an exception information file (gravestone file), this document head
It is which is abnormal using which process that portion, which can include,.Pass through the simple parsing to exception information file, it is possible to orient
The exception of application exits.
Method (b):New modification is found by the way of timing scan gravestone file directory.At regular intervals often,
Run-down gravestone file directory if it find that gravestone file directory changes, then illustrates that exception has occurred in intended application process
It exits.
Fig. 3 is the monitoring flow chart that application according to embodiments of the present invention is exited extremely.
As shown in figure 3, monitoring application starts the monitoring to process.Finger daemon monitors gravestone catalogue.Work as third-party application
Process is abnormal exit in the case of, android system send modification gravestone file instruction, finger daemon is according to the instruction
Gravestone file is changed, after monitoring application monitors gravestone file by modification, determines that abnormal exit has occurred in third-party application.
The test method of application program provided in an embodiment of the present invention can obtain application whole exit in the case of generate
Exit data (i.e. above-mentioned first exits data), and calculate the stability indicator (aforementioned stable parameter) of application, and show
The scheme for having technology is only obtained using the number exited extremely, therefore, the test of application program provided in an embodiment of the present invention
The test result that method obtains is more accurate, while can also monitor whole applications in whole system, for meeting to whole system
For having the cell phone managing class instrument of potential impact, there is very big value.
The exception for obtaining application exits the second method of data:
Debugging routine is run, wherein, generate the first process during running debugging routine;Whether detect the first process
Create gravestone file;In the case where detecting the first process creation gravestone file, determine that intended application process has occurred
Exception exits;The operation data generated when intended application process is abnormal and is exited exit data as abnormal.Wherein, first
Process can be debuggerd processes.Debuggerd processes are the exception information file (gravestones that above-mentioned first method is mentioned
File) founder, therefore (action of establishment file is to pass through by injecting the action of its establishment file of the process intercept
What dlopen functions performed), achieve the effect that intercept the message that application is collapsed extremely, can be applied time exited extremely
Number.Fig. 4 is the dlopen function execution flow charts of abduction according to embodiments of the present invention.
As shown in figure 4, monitoring application injection third party's process, third-party application process creation binder services, when the 3rd
When square application process exits extremely, (i.e. above-mentioned first is logical to monitoring application transmission binder necrologies for third-party application process
Know).
The test method of application program provided in an embodiment of the present invention can not only monitor the normal of application and exit and abnormal
It exits, and whole application processes of whole system can be covered, for wanting to assess itself to other application stability in system
Influence application, the result that this test method is drawn have very important reference significance.
The test method of application program provided in an embodiment of the present invention can be applied to android system security classes and survey
Tool-class is tried using upper.For example, it is a testing tool class application of android system using A.The embodiment of the present invention is provided
The test method of application program be applied to global advertisement intercept function (i.e. the effect of object code is using on A, can knowing
Realize Ad blocking) whether can cause frequently to be abnormal using B and exit, so as to beyond some early warning ratio when
It waits, closes the Ad blocking to application B.
For example, one share 10 application programs in terminal, be respectively application program B1, application program B2 ..., using journey
Sequence B10.Object code (effect of object code is to realize Ad blocking) is injected in this 10 application programs.Using using A
Monitor application program B1, application program B2 ..., all situations that exit of the corresponding application processes of application program B10 are being (including just
Often exit situation and abnormal exit situation), and according to first exit data and it is abnormal exit data calculate respectively application program B1,
Application program B2 ..., the abnormal rate of the corresponding application processes of application program B10.The abnormal rate of application process (join by stability
Number) previously described formula (1) can be used to calculate.
Assuming that the abnormal rate for obtaining 10 application processes is as shown in table 1.
Table 1
Inject after same section of object code, application program B1, application program B2 ..., the application of application program B10 into
The abnormal rate of journey is different, since exception that abnormal rate is application process exits number divided by all of application process exit
What number obtained, therefore, abnormal rate is higher, it is more frequent to illustrate that application process exits extremely, the operation stability of application process is got over
Difference.
In the case where application program does not have great bug, abnormal rate should be the number of a very little, close to 0.If one
The abnormal rate of the corresponding application process of a application program is more than 1%, then it is considered that the application has serious quality problems.
From table 1 it follows that application program B1 and the abnormal rate of the corresponding application processes of application program B2 are larger, greatly
In 1%, this illustrates that the injection of object code has seriously affected the fortune of application program B1 and the corresponding application processes of application program B2
Capable stability.In this case, it is necessary to which the object code being injected into application program B1 and application program B2 is deleted
It removes, to ensure the stability of the operation of application program B1 and the corresponding application processes of application program B2.Application program will be injected into
After object code in B1 and application program B2 is deleted, in application program B1 and the corresponding application processes of application program B2
During operation, advertisement will not be intercepted.
The abnormal rate of application program B3 to the corresponding application processes of application program B10 is smaller, and far smaller than 1%, this says
Influence of the injection of bright object code to application program B3 to the stability of the operation of the corresponding application processes of application program B10 is very
It is small, it can be ignored.In the corresponding application process operations of application program B3 to application program B10, advertisement can be intercepted.
In embodiments of the present invention, there is root authority, and code injection is carried out to android system or common application
Application, can judge whether the injection behavior of oneself can influence the stability of third party's process using this method, so as to pre-
First avoided or made technical adaptation.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement because
According to the present invention, some steps may be employed other orders or be carried out at the same time.Secondly, those skilled in the art should also know
It knows, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention
It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but it is very much
In the case of the former be more preferably embodiment.Based on such understanding, technical scheme is substantially in other words to existing
The part that technology contributes can be embodied in the form of software product, which is stored in a storage
In medium (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal equipment (can be mobile phone, calculate
Machine, server or network equipment etc.) perform method described in each embodiment of the present invention.
According to embodiments of the present invention, a kind of application program for the test method for being used to implement above application program is additionally provided
Test device, as shown in figure 5, the device includes:Running unit 10, monitoring unit 20, determination unit 30, judging unit 40,
Delete unit 50.
Running unit 10, for operational objective application program, wherein, destination application is application program to be tested,
Object code is injected in destination application, intended application process is generated during operational objective application program.
Monitoring unit 20, for the operation data of monitoring objective application process, wherein, operation data include intended application into
The normal data that exit of journey exit data with abnormal.
Determination unit 30, for the stability for exiting data according to data and exception is normally exited and determining intended application process
Parameter.
Judging unit 40, for judging whether stability parameter meets preset condition.
Unit 50 is deleted, in the case where judging that stability parameter is unsatisfactory for preset condition, from intended application journey
Delete target code in sequence.
Optionally, monitoring unit 20 includes:Create subelement, monitoring subelement, the first determination subelement, the second definite son
Unit.Subelement is created, for creating the first object in intended application process, wherein, the first object is with intended application process
Exit and it is destroyed.Subelement is monitored, it is whether destroyed for monitoring the first object.First determination subelement, for supervising
Control to the first object it is destroyed when determine that intended application process exits, wherein, intended application process exit exit including abnormal and
Normally exit.Second determination subelement, the data for being generated when intended application process is exited exit data as first.
Optionally, monitoring subelement includes:Registration module, the first judgment module, the first determining module.Registration module is used
In the first notice for registering the first object, wherein, the process where the first notice is used to indicate the first object has dropped out.First sentences
Disconnected module, for judging whether to detect the first notice.First determining module, in the case where detecting the first notice,
Determine that the first object is destroyed.
Optionally, monitoring unit 20 includes:First obtains subelement, the second acquisition subelement, the 3rd acquisition subelement.The
One obtains subelement, and the exception for obtaining intended application process exits data, wherein, it is exited in intended application process exception
In the case of, exception can be generated and exit data.Second obtains subelement, and first for obtaining intended application process exits data,
Wherein, normally exited in intended application process and exception exits two kinds, can all generated first and exit data.3rd obtains
Subelement, for exiting data acquisition according to the abnormal data and first that exit and normally exiting data.
Optionally, monitoring unit 20 includes:Judgment sub-unit, the 3rd determination subelement, the 4th determination subelement.Judge son
Unit, for judging whether gravestone file directory is changed according to the gravestone file directory read.3rd determines that son is single
Member, if changed for gravestone file directory, it is determined that abnormal exit has occurred in intended application process.4th determines son
Unit, the operation data for being generated when intended application process is abnormal and is exited exit data as abnormal.
Optionally, judgment sub-unit includes:Creation module, the second judgment module, the second determining module.Creation module is used
In the modification event sniffer that creaties directory, wherein, after the modification event sniffer that creaties directory, if there is application process occurs
Exception exits, and system can generate gravestone file.Second judgment module, for judging whether system generates gravestone file.Second
Determining module in the case of generating gravestone file in system, determines that gravestone file directory is changed.4th determines
Subelement includes:Parsing module.Parsing module for parsing gravestone file, obtains exception and exits data.
Optionally, monitoring unit 20 includes:Run subelement, detection sub-unit, the 5th determination subelement, the 6th definite son
Unit.Subelement is run, for running debugging routine, wherein, generate the first process during running debugging routine.Detection
Subelement, for detecting whether the first process creates gravestone file.5th determination subelement, for being detected in detection sub-unit
To the first process creation in the case of gravestone file, determine that abnormal exit has occurred in intended application process.6th determines that son is single
Member, the operation data for being generated when intended application process is abnormal and is exited exit data as abnormal.
According to embodiments of the present invention, a kind of server for the test method for being used to implement above application program is additionally provided,
As shown in fig. 6, the server mainly includes processor 601, display 603, data-interface 604, memory 605 and network interface
606, wherein:
The operation data of intended application process are then mainly transferred to processing by data-interface 604 by way of data transmission
Device 901.
Memory 605 is mainly used for storing operation data, the stability parameter of intended application process.
Network interface 606 is mainly used for carrying out network communication with terminal and other servers.
Display 603 is mainly used for the operation data of display target application process.
Processor 601 is mainly used for performing following operation:
Operational objective application program, wherein, destination application is application program to be tested, is noted in destination application
Enter to have object code, intended application process is generated during operational objective application program;Monitoring objective application process
Data are run, wherein, the normal data that exit that operation data include intended application process exit data with abnormal;According to normally moving back
Go out data and exception exits the stability parameter that data determine intended application process;Judge whether stability parameter meets default item
Part;In the case where judging that stability parameter is unsatisfactory for preset condition, the delete target code from destination application.
Processor 601 is additionally operable to perform:The first object is created in intended application process, wherein, the first object is with target
Exiting for application process and it is destroyed;Whether destroyed monitor the first object;Monitor the first object it is destroyed when determine mesh
Mark application process exits, wherein, intended application process, which is exited, to be exited including exception and normally exits;Intended application process is exited
When the data that generate exit data as first.
Processor 601 is additionally operable to perform:The first notice of the first object is registered, wherein, the first notice is used to indicate first
Process where object has dropped out;Judge whether to detect the first notice;In the case where detecting the first notice, first is determined
Object is destroyed.
Processor 601 is additionally operable to perform:Obtain intended application process exception exit data, wherein, intended application into
In the case that Cheng Yichang is exited, exception can be generated and exit data;Obtain intended application process first exits data, wherein,
Intended application process normally exits and exception is exited in the case of two kinds, can all generate first and exit data;Number is exited according to abnormal
Data are normally exited according to data acquisition is exited with first.
Processor 601 is additionally operable to perform:Gravestone file directory according to reading judges whether gravestone file directory occurs
Change;If gravestone file directory is changed, it is determined that abnormal exit has occurred in intended application process;By intended application
Process is abnormal the operation data generated when exiting and exits data as abnormal.
Processor 601 is additionally operable to perform:Create directory modification event sniffer, wherein, in the modification event prison that creaties directory
It after listening device, is exited if there is application process is abnormal, system can generate gravestone file;Judge whether system generates gravestone
File;In the case where system generates gravestone file, determine that gravestone file directory is changed, intended application process is sent out
The operation data that raw exception generates when exiting exit data as exception to be included:Gravestone file is parsed, exception is obtained and exits data.
Processor 601 is additionally operable to perform:Debugging routine is run, wherein, generate first during running debugging routine
Process;Detect whether the first process creates gravestone file;In the case where detecting the first process creation gravestone file, really
Abnormal exit has occurred in the application process that sets the goal;The operation data generated when intended application process is abnormal and is exited are as different
Often exit data.
Optionally, the specific example in the present embodiment may be referred to the example described in above-described embodiment, the present embodiment
Details are not described herein.
The embodiment of the present invention additionally provides a kind of storage medium.Optionally, in the present embodiment, above-mentioned storage medium can
For storing the program code of the method for the embodiment of the present invention.
Optionally, in the present embodiment, above-mentioned storage medium can be located at mobile communications network, wide area network, Metropolitan Area Network (MAN) or
At least one network equipment in multiple network equipments in the network of LAN.
Optionally, in the present embodiment, storage medium is arranged to storage for performing the program code of following steps:
S1, operational objective application program, wherein, destination application is application program to be tested, destination application
In be injected with object code, intended application process is generated during operational objective application program;
S2, the operation data of monitoring objective application process, wherein, operation data include the normal of intended application process and exit
Data and exception exit data;
S3, according to normally exiting data and the abnormal stability parameter for exiting data and determining intended application process;
S4, judges whether stability parameter meets preset condition;
S5, in the case where judging that stability parameter is unsatisfactory for preset condition, the delete target from destination application
Code.
Optionally, in the present embodiment, processor is performed according to stored program code in storage medium:It should in target
With creating the first object in process, wherein, the first object is destroyed with exiting for intended application process;Monitoring the first object is
It is no destroyed;Monitor the first object it is destroyed when determine that intended application process exits, wherein, intended application process exits bag
Exception is included to exit and normally exit;The data generated when intended application process is exited exit data as first.
Optionally, in the present embodiment, processor is performed according to stored program code in storage medium:Registration first
First notice of object, wherein, the process where the first notice is used to indicate the first object has dropped out;Judge whether to detect
One notice;In the case where detecting the first notice, determine that the first object is destroyed.
Optionally, in the present embodiment, processor is performed according to stored program code in storage medium:Obtain target
The exception of application process exits data, wherein, in the case where intended application process exception exits, exception can be generated and exit number
According to;Obtain intended application process first exits data, wherein, it is normally exited in intended application process and exception exits two kinds of feelings
Under condition, it can all generate first and exit data;It exits data acquisition according to the abnormal data and first that exit and normally exits data.
Optionally, in the present embodiment, processor is performed according to stored program code in storage medium:According to reading
To gravestone file directory judge whether gravestone file directory is changed;If gravestone file directory is changed,
Determine that abnormal exit has occurred in intended application process;The operation data generated when intended application process is abnormal and is exited as
Exception exits data.
Optionally, in the present embodiment, processor is performed according to stored program code in storage medium:It creaties directory
Event sniffer is changed, wherein, after the modification event sniffer that creaties directory, exited if there is application process is abnormal,
System can generate gravestone file;Judge whether system generates gravestone file;In the case where system generates gravestone file, really
Determine gravestone file directory to be changed, the operation data generated when intended application process is abnormal and is exited are moved back as abnormal
Going out data includes:Gravestone file is parsed, exception is obtained and exits data.
Optionally, in the present embodiment, processor is performed according to stored program code in storage medium:Operation debugging
Program, wherein, generate the first process during running debugging routine;Detect whether the first process creates gravestone file;
In the case where detecting the first process creation gravestone file, determine that abnormal exit has occurred in intended application process;By target
Application process is abnormal the operation data generated when exiting and exits data as abnormal.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to:USB flash disk, read-only memory (ROM,
Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disc or
The various media that can store program code such as CD.
Optionally, the specific example in the present embodiment may be referred to the example described in above-described embodiment, the present embodiment
Details are not described herein.
If the integrated unit in above-described embodiment is realized in the form of SFU software functional unit and is independent product
Sale or in use, the storage medium that above computer can be read can be stored in.Based on such understanding, skill of the invention
The part or all or part of the technical solution that art scheme substantially in other words contributes to the prior art can be with soft
The form of part product embodies, which is stored in storage medium, is used including some instructions so that one
Platform or multiple stage computers equipment (can be personal computer, server or network equipment etc.) perform each embodiment institute of the present invention
State all or part of step of method.
In the above embodiment of the present invention, all emphasize particularly on different fields to the description of each embodiment, do not have in some embodiment
The part of detailed description may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed client, it can be by others side
Formula is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, is only one
Kind of division of logic function, can there is an other dividing mode in actual implementation, for example, multiple units or component can combine or
It is desirably integrated into another system or some features can be ignored or does not perform.It is another, it is shown or discussed it is mutual it
Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module
It connects, can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit
The component shown may or may not be physical location, you can be located at a place or can also be distributed to multiple
In network element.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
That unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list
The form that hardware had both may be employed in member is realized, can also be realized in the form of SFU software functional unit.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (14)
1. a kind of test method of application program, which is characterized in that including:
Operational objective application program, wherein, the destination application is application program to be tested, the destination application
In be injected with object code, generate intended application process during the destination application is run;
The operation data of the intended application process are monitored, wherein, the operation data are including the intended application process just
It often exits data and exception exits data;
Normal data are exited according to described and the exception exits the stability parameter that data determine the intended application process;
Judge whether the stability parameter meets preset condition;
In the case where judging that the stability parameter is unsatisfactory for the preset condition, deleted from the destination application
The object code.
2. according to the method described in claim 1, it is characterized in that, the operation data exit data, the prison including first
Controlling the operation data of the intended application process includes:
The first object is created in the intended application process, wherein, the first object moving back with the intended application process
Go out and destroyed;
Whether destroyed monitor first object;
Monitor first object it is destroyed when determine that the intended application process exits, wherein, the intended application into
Journey, which is exited, to be exited including exception and normally exits;
The data generated when the intended application process is exited exit data as described first.
3. according to the method described in claim 2, it is characterized in that, monitoring first object it is whether destroyed including:
Register the first notice of first object, wherein, first notice be used to indicate where first object into
Journey has dropped out;
Judge whether to detect first notice;
In the case where detecting first notice, determine that first object is destroyed.
4. the according to the method described in claim 1, it is characterized in that, operation data packet of the monitoring intended application process
It includes:
The exception for obtaining the intended application process exits data, wherein, in the situation that the intended application process exception exits
Under, the exception can be generated and exit data;
Obtain the intended application process first exits data, wherein, it is normally exited and abnormal in the intended application process
It exits in the case of two kinds, can all generate described first and exit data;
Data are normally exited according to the exception exits data and described first exits data acquisition.
5. the according to the method described in claim 1, it is characterized in that, operation data packet of the monitoring intended application process
It includes:
Gravestone file directory according to reading judges whether the gravestone file directory is changed;
If the gravestone file directory is changed, it is determined that abnormal exit has occurred in the intended application process;
The operation data generated when the intended application process is abnormal and is exited exit data as the exception.
6. according to the method described in claim 5, it is characterized in that, the gravestone is judged according to the gravestone file directory read
Whether file directory, which has occurred change, includes:
Create directory modification event sniffer, wherein, after catalogue modification event sniffer is created, if there is application into
Journey, which is abnormal, to be exited, and system can generate gravestone file;
Judge whether the system generates the gravestone file;
In the case where the system generates the gravestone file, determine that the gravestone file directory is changed,
The operation data generated when the intended application process is abnormal and is exited exit data as the exception to be included:
The gravestone file is parsed, the exception is obtained and exits data.
7. the according to the method described in claim 1, it is characterized in that, operation data packet of the monitoring intended application process
It includes:
Debugging routine is run, wherein, the first process is generated during running the debugging routine;
Detect whether first process creates gravestone file;
In the case where detecting first process creation gravestone file, determine that the intended application process has occurred
Exception exits;
The operation data generated when the intended application process is abnormal and is exited exit data as the exception.
8. a kind of test device of application program, which is characterized in that including:
Running unit, for operational objective application program, wherein, the destination application is application program to be tested, institute
State and object code be injected in destination application, generated during the destination application is run intended application into
Journey;
Monitoring unit, for monitoring the operation data of the intended application process, wherein, the operation data include the target
The normal data that exit of application process exit data with abnormal;
Determination unit, for normal exiting data and the exception exits data and determines the intended application process according to described
Stability parameter;
Judging unit, for judging whether the stability parameter meets preset condition;
Unit is deleted, in the case where judging that the stability parameter is unsatisfactory for the preset condition, from the target
The object code is deleted in application program.
9. device according to claim 8, which is characterized in that the operation data exit data, the prison including first
Control unit includes:
Subelement is created, for creating the first object in the intended application process, wherein, first object is with the mesh
Mark exiting for application process and it is destroyed;
Subelement is monitored, it is whether destroyed for monitoring first object;
First determination subelement, for monitor first object it is destroyed when determine that the intended application process exits,
Wherein, the intended application process, which is exited, exits including exception and normally exits;
Second determination subelement, the data for being generated when the intended application process is exited exit number as described first
According to.
10. device according to claim 9, which is characterized in that the monitoring subelement includes:
Registration module, for registering the first of first object the notice, wherein, first notice is used to indicate described first
Process where object has dropped out;
First judgment module, for judging whether to detect first notice;
First determining module, in the case where detecting first notice, determining that first object is destroyed.
11. device according to claim 8, which is characterized in that the monitoring unit includes:
First obtains subelement, and the exception for obtaining the intended application process exits data, wherein, in the intended application
In the case that process exception exits, the exception can be generated and exit data;
Second obtains subelement, and first for obtaining the intended application process exits data, wherein, in the intended application
Process normally exits and exception is exited in the case of two kinds, can all generate described first and exit data;
3rd obtains subelement, for normally being exited according to the exception exits data and described first exits data acquisition
Data.
12. device according to claim 8, which is characterized in that the monitoring unit includes:
Judgment sub-unit, for judging whether the gravestone file directory is changed according to the gravestone file directory read
Become;
3rd determination subelement, if changed for the gravestone file directory, it is determined that the intended application process
Abnormal exit has occurred;
4th determination subelement, for the operation data that are generated when the intended application process is abnormal and is exited as described in
Exception exits data.
13. device according to claim 12, which is characterized in that the judgment sub-unit includes:
Creation module, for the modification event sniffer that creaties directory, wherein, create catalogue modification event sniffer it
Afterwards, exited if there is application process is abnormal, system can generate gravestone file;
Second judgment module, for judging whether the system generates the gravestone file;
Second determining module in the case of generating the gravestone file in the system, determines the gravestone file mesh
Record is changed,
4th determination subelement includes:
Parsing module for parsing the gravestone file, obtains the exception and exits data.
14. device according to claim 8, which is characterized in that the monitoring unit includes:
Subelement is run, for running debugging routine, wherein, the first process is generated during running the debugging routine;
Detection sub-unit, for detecting whether first process creates gravestone file;
5th determination subelement, for detecting first process creation gravestone file in the detection sub-unit
In the case of, determine that abnormal exit has occurred in the intended application process;
6th determination subelement, for the operation data that are generated when the intended application process is abnormal and is exited as described in
Exception exits data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610992267.2A CN108073499B (en) | 2016-11-10 | 2016-11-10 | Application program testing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610992267.2A CN108073499B (en) | 2016-11-10 | 2016-11-10 | Application program testing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108073499A true CN108073499A (en) | 2018-05-25 |
CN108073499B CN108073499B (en) | 2020-09-29 |
Family
ID=62154776
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610992267.2A Active CN108073499B (en) | 2016-11-10 | 2016-11-10 | Application program testing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108073499B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109002694A (en) * | 2018-06-08 | 2018-12-14 | 广东小天才科技有限公司 | A kind of application code obscures the method and device of rear orientation problem point |
CN109117340A (en) * | 2018-06-29 | 2019-01-01 | Oppo(重庆)智能科技有限公司 | A kind of mobile terminal and its monitoring method, the storage medium of interprocess communication |
CN109753419A (en) * | 2018-12-29 | 2019-05-14 | 苏州思必驰信息科技有限公司 | A kind of method and device of the abnormal log information of all applications of non-invasive monitoring Android system |
CN111159702A (en) * | 2019-12-12 | 2020-05-15 | 北京神州绿盟信息安全科技股份有限公司 | Process list generation method and device |
CN116627848A (en) * | 2023-07-24 | 2023-08-22 | 成都中科合迅科技有限公司 | Automatic test method and system for application program |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1983209A (en) * | 2005-12-14 | 2007-06-20 | 中兴通讯股份有限公司 | System and method for automatically testing software unit |
US7299455B2 (en) * | 1995-06-02 | 2007-11-20 | Cisco Technology, Inc. | Remote monitoring of computer programs |
CN101719077A (en) * | 2009-12-24 | 2010-06-02 | 北京飞天诚信科技有限公司 | Method and device for injecting codes in .Net program |
CN101847121A (en) * | 2010-05-07 | 2010-09-29 | 北京大学 | Method for discovering software vulnerabilities |
CN101859274A (en) * | 2009-04-07 | 2010-10-13 | 西门子(中国)有限公司 | Method and system for fuzz testing |
CN102141962A (en) * | 2011-04-07 | 2011-08-03 | 北京航空航天大学 | Safety distributed test framework system and test method thereof |
CN102156640A (en) * | 2011-04-19 | 2011-08-17 | 山东浪潮金融信息***有限公司 | Method for generating data operation code |
CN102722434A (en) * | 2012-05-24 | 2012-10-10 | 兰雨晴 | Performance test method and tool aiming at Linux process scheduling |
CN103516557A (en) * | 2012-06-26 | 2014-01-15 | 腾讯科技(深圳)有限公司 | Method and system for testing |
US8645766B2 (en) * | 2011-10-05 | 2014-02-04 | International Business Machines Corporation | Serialized error injection into a function under test |
CN103701657A (en) * | 2012-09-28 | 2014-04-02 | ***股份有限公司 | Device and method for monitoring and processing dysfunction of continuously running data processing system |
CN104268055A (en) * | 2014-09-01 | 2015-01-07 | 腾讯科技(深圳)有限公司 | Program exception monitoring method and device |
CN104834590A (en) * | 2014-02-11 | 2015-08-12 | 腾讯科技(深圳)有限公司 | Software test method and system |
CN105094777A (en) * | 2014-05-14 | 2015-11-25 | 腾讯科技(深圳)有限公司 | Method and device for realizing application screen shot |
CN105701000A (en) * | 2014-11-25 | 2016-06-22 | 中兴通讯股份有限公司 | Service testing method and device |
CN105786562A (en) * | 2016-02-04 | 2016-07-20 | 百度在线网络技术(北京)有限公司 | Method and device for integrating plug-in |
CN106055469A (en) * | 2016-05-19 | 2016-10-26 | 中国科学院软件研究所 | System and method for mobile terminal application testing based on code injection |
-
2016
- 2016-11-10 CN CN201610992267.2A patent/CN108073499B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7299455B2 (en) * | 1995-06-02 | 2007-11-20 | Cisco Technology, Inc. | Remote monitoring of computer programs |
CN1983209A (en) * | 2005-12-14 | 2007-06-20 | 中兴通讯股份有限公司 | System and method for automatically testing software unit |
CN101859274A (en) * | 2009-04-07 | 2010-10-13 | 西门子(中国)有限公司 | Method and system for fuzz testing |
CN101719077A (en) * | 2009-12-24 | 2010-06-02 | 北京飞天诚信科技有限公司 | Method and device for injecting codes in .Net program |
CN101847121A (en) * | 2010-05-07 | 2010-09-29 | 北京大学 | Method for discovering software vulnerabilities |
CN102141962A (en) * | 2011-04-07 | 2011-08-03 | 北京航空航天大学 | Safety distributed test framework system and test method thereof |
CN102156640A (en) * | 2011-04-19 | 2011-08-17 | 山东浪潮金融信息***有限公司 | Method for generating data operation code |
US8645766B2 (en) * | 2011-10-05 | 2014-02-04 | International Business Machines Corporation | Serialized error injection into a function under test |
CN102722434A (en) * | 2012-05-24 | 2012-10-10 | 兰雨晴 | Performance test method and tool aiming at Linux process scheduling |
CN103516557A (en) * | 2012-06-26 | 2014-01-15 | 腾讯科技(深圳)有限公司 | Method and system for testing |
CN103701657A (en) * | 2012-09-28 | 2014-04-02 | ***股份有限公司 | Device and method for monitoring and processing dysfunction of continuously running data processing system |
CN104834590A (en) * | 2014-02-11 | 2015-08-12 | 腾讯科技(深圳)有限公司 | Software test method and system |
CN105094777A (en) * | 2014-05-14 | 2015-11-25 | 腾讯科技(深圳)有限公司 | Method and device for realizing application screen shot |
CN104268055A (en) * | 2014-09-01 | 2015-01-07 | 腾讯科技(深圳)有限公司 | Program exception monitoring method and device |
CN105701000A (en) * | 2014-11-25 | 2016-06-22 | 中兴通讯股份有限公司 | Service testing method and device |
CN105786562A (en) * | 2016-02-04 | 2016-07-20 | 百度在线网络技术(北京)有限公司 | Method and device for integrating plug-in |
CN106055469A (en) * | 2016-05-19 | 2016-10-26 | 中国科学院软件研究所 | System and method for mobile terminal application testing based on code injection |
Non-Patent Citations (2)
Title |
---|
CENTTIAN: "Android Tombstone分析", 《HTTPS://WWW.CNBLOGS.COM/CODERTIAN/P/5980426.HTML》 * |
JLTXGCY: "Binder对象死亡通知机制", 《HTTPS://BLOG.CSDN.NET/JLTXGCY/ARTICLE/DETAILS/27791513》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109002694A (en) * | 2018-06-08 | 2018-12-14 | 广东小天才科技有限公司 | A kind of application code obscures the method and device of rear orientation problem point |
CN109117340A (en) * | 2018-06-29 | 2019-01-01 | Oppo(重庆)智能科技有限公司 | A kind of mobile terminal and its monitoring method, the storage medium of interprocess communication |
CN109117340B (en) * | 2018-06-29 | 2022-03-29 | Oppo(重庆)智能科技有限公司 | Mobile terminal, method for monitoring interprocess communication of mobile terminal and storage medium |
CN109753419A (en) * | 2018-12-29 | 2019-05-14 | 苏州思必驰信息科技有限公司 | A kind of method and device of the abnormal log information of all applications of non-invasive monitoring Android system |
CN111159702A (en) * | 2019-12-12 | 2020-05-15 | 北京神州绿盟信息安全科技股份有限公司 | Process list generation method and device |
CN111159702B (en) * | 2019-12-12 | 2022-02-18 | 绿盟科技集团股份有限公司 | Process list generation method and device |
CN116627848A (en) * | 2023-07-24 | 2023-08-22 | 成都中科合迅科技有限公司 | Automatic test method and system for application program |
CN116627848B (en) * | 2023-07-24 | 2023-09-29 | 成都中科合迅科技有限公司 | Automatic test method and system for application program |
Also Published As
Publication number | Publication date |
---|---|
CN108073499B (en) | 2020-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108073499A (en) | The test method and device of application program | |
CN103309808B (en) | Based on privacy disclosure of Android user black box detection method and the system of label | |
US9588834B1 (en) | Methods and apparatus for improved fault analysis | |
CN112385196B (en) | System and method for reporting computer security incidents | |
CN110505241A (en) | A kind of network attack face detection method and system | |
US10515220B2 (en) | Determine whether an appropriate defensive response was made by an application under test | |
US10320828B1 (en) | Evaluation of security in a cyber simulator | |
CN104303189B (en) | System and method for determining vulnerability of application program | |
CN110287701A (en) | A kind of malicious file detection method, device, system and associated component | |
US20210264023A1 (en) | Command inspection method and apparatus, computer device, and storage medium | |
CN107741902A (en) | Program application detection method and program application detection means | |
CN109302423A (en) | A kind of vulnerability scanning aptitude tests method and apparatus | |
CN110401580A (en) | Webpage status monitoring method and relevant device based on heartbeat mechanism | |
CN114553596A (en) | Multi-dimensional security condition real-time display method and system suitable for network security | |
CN111125066B (en) | Method and device for detecting functions of database auditing equipment | |
CN115828256B (en) | Unauthorized and unauthorized logic vulnerability detection method | |
JP2012083909A (en) | Application characteristic analysis device and program | |
CN115834188A (en) | Vulnerability scanning monitoring method and system, electronic equipment and storage medium | |
CN107402883B (en) | A kind of data test treating method and apparatus | |
CN110460620A (en) | Website defence method, device, equipment and storage medium | |
CN115659351A (en) | Information security analysis method, system and equipment based on big data office | |
JP2018169643A (en) | Security operation system, security operation management apparatus, and security operation method | |
CN113297090B (en) | System test method, device, computer equipment and storage medium | |
WO2016036368A1 (en) | Determine protective measure for data that meets criteria | |
CN116414722B (en) | Fuzzy test processing method and device, fuzzy test system and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |