Android平台下软件安全漏洞挖掘方法研究  被引量:6

RESEARCH ON SECURITY VULNERABILITIES MINING METHOD FOR SOFTWARE ON ANDROID PLATFORM

在线阅读下载全文

作  者:龚炳江[1] 唐宇敬[1] 

机构地区:[1]河北工程大学信息与电气工程学院,河北邯郸056038

出  处:《计算机应用与软件》2014年第1期311-314,333,共5页Computer Applications and Software

摘  要:为了减少Android系统用户的隐私数据泄露问题,提出一种针对Android应用程序源码的漏洞挖掘方法。该方法在Android漏洞库和权限方法集合的基础上,采用静态分析得到Android特有的权限漏洞矩阵代数式和漏洞点处测试用例,基于漏洞知识对测试用例变异得到半有效数据,利用污点注入和数据流分析进行Fuzzing挖掘。经过对400个Android应用程序源码进行实例分析,结果表明该方法不仅能挖掘常规漏洞,而且在Android特有的权限信息漏洞挖掘方面效果明显。利用约束分析得到的测试用例数量少,而通过漏洞知识得到的半有效数据的针对性强,并且代码覆盖率和精确度较高。In order to reduce the privacy data leak problems of the Android system users, we put forward a vulnerability mining method aiming at the source code of the Android applications. On the basis of Android vulnerability database and permission-method set, the method adopts static analysis to obtain the algebraic expression of special permission vulnerability matrix of Android and the test case of vulnerability points, mutates the test cases based on vulnerability knowledge to obtain semi-efficient data, and uses stain injection and data flow analysis to mine Fuzzing. Through example analyses on 400 Android applications source code, the results show that the method can mine the conventional vulnerability and has distinct effect in mining the special permission information vulnerability of Android. The number of the test cases derived from using constraint analysis is less, and the pertinency of semi-efficient data derived from vulnerability knowledge is high. This method has high code coverage and precision as well.

关 键 词:安全漏洞 ANDROID 权限 静态分析 FUZZING 

分 类 号:TP309.2[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象