CN107844703B - Client security detection method and device based on Android platform Unity3D game - Google Patents

Client security detection method and device based on Android platform Unity3D game Download PDF

Info

Publication number
CN107844703B
CN107844703B CN201710951249.4A CN201710951249A CN107844703B CN 107844703 B CN107844703 B CN 107844703B CN 201710951249 A CN201710951249 A CN 201710951249A CN 107844703 B CN107844703 B CN 107844703B
Authority
CN
China
Prior art keywords
game
dynamic library
test command
client
command set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710951249.4A
Other languages
Chinese (zh)
Other versions
CN107844703A (en
Inventor
刘青云
黎健钧
杨明邦
彭元龙
徐飞
张治良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Xishanju Digital Technology Co ltd
Zhuhai Kingsoft Digital Network Technology Co Ltd
Original Assignee
Zhuhai Seasun Mobile Game Technology Co ltd
Zhuhai Kingsoft Online Game Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Seasun Mobile Game Technology Co ltd, Zhuhai Kingsoft Online Game Technology Co Ltd filed Critical Zhuhai Seasun Mobile Game Technology Co ltd
Priority to CN201710951249.4A priority Critical patent/CN107844703B/en
Publication of CN107844703A publication Critical patent/CN107844703A/en
Application granted granted Critical
Publication of CN107844703B publication Critical patent/CN107844703B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a client security detection method based on an Android platform Unity3D game, which comprises the following steps of: acquiring a process identifier of a game process to be detected; according to the process identifier, an auxiliary test command set dynamic library and an interface server dynamic library are loaded to a process corresponding to the process identifier; and the interface client sends the test command provided by the auxiliary test command set dynamic library to the process through the interface server dynamic library. The invention has the advantages of perfecting the client safety detection coverage and improving the detection efficiency.

Description

Client security detection method and device based on Android platform Unity3D game
Technical Field
The invention relates to a security detection method and a corresponding device for a mobile phone game, in particular to a client security detection method and a client security detection device based on an Android platform Unity3D game.
Background
In the smart phone industry, with the market share of mobile phone games becoming higher and higher, most of the well-known game development companies invest in more technical research and development in mobile phone game development. As the complexity of mobile games is increasing, various security problems are inevitably introduced in the development process of the mobile games. For the mobile phone based on the Android platform Unity3D, the security detection items of the client mainly include game numerical memory security (i.e. whether the numerical values in the game memory can be searched, modified and validated) and client game logic security (i.e. whether the game logic has bugs under various different use cases).
For the security detection of the game numerical memory, one of the mainstream methods at present is to use tools such as a sesame seed cake modifier, etc., and a tester locates the address of the relevant numerical value by searching for the progress/proc/< pid >/mem, then modifies the numerical value (such as the vitality, the attack power, the virtual property, etc. of the game character) and observes the change, and finally obtains the conclusion whether the memory numerical value is secure or not. The method has the disadvantages that the operation is very tedious and time-consuming, only the numerical values displayed on the interface can be retrieved, and each regression test needs to be operated again, so that the test efficiency is low.
For client logic security detection, one of the mainstream methods at present relies on manual operation to cover all test cases, so as to detect whether there is a bug in game logic under various different cases. The disadvantage of this approach is that manual operations are also very time consuming and test cases can only be overlaid to the normal game logic. In practice, the client code may be compromised. Therefore, it is impossible to discover what effect a client, after malicious modification of code logic, will have on a game simply by normal operation. The tester also needs to cover abnormal use cases to ensure the logic security of the game more comprehensively.
Disclosure of Invention
The invention aims to overcome the defects in the prior art, and provides a client security detection method and device based on an Android platform Unity3D game, so as to solve the problems that the client test coverage is not perfect and the test efficiency is not high in the prior art.
In order to achieve the above object, the present invention adopts the following technical means.
Firstly, the invention provides a client security detection method based on an Android platform Unity3D game, which comprises the following steps: acquiring a process identifier of a game process to be detected; according to the process identifier, an auxiliary test command set dynamic library and an interface server dynamic library are loaded to a process corresponding to the process identifier; and the interface client sends the test command provided by the auxiliary test command set dynamic library to the process through the interface server dynamic library.
In the method of the present invention, the method further includes exporting the test command provided by sending the auxiliary test command set dynamic library to the process as an external log file.
In the above method of the present invention, the dynamic library of auxiliary test command sets includes a command to read a program set of a game.
In the method of the present invention, the dynamic library of auxiliary test command sets includes a command for searching for game class instances.
Further, in the above method of the present invention, the dynamic library of auxiliary test command sets includes a command for calling a method of the game class instance.
Further, in the above method of the present invention, the dynamic library of auxiliary test command sets includes commands for reading and writing attributes and fields of the game class instance.
Still further, in the above method of the present invention, the attributes and fields read and written to the game class instance during the test are exported as an external log file.
Secondly, the invention provides a client security detection device based on an Android platform Unity3D game, which comprises the following modules: the monitoring module is used for acquiring a process identifier of a game process to be detected; the injection module is used for loading an auxiliary test command set dynamic library and an interface server dynamic library into a process corresponding to the process identifier according to the process identifier; and the sending module is used for sending the test command provided by the auxiliary test command set dynamic library to the process by the interface client through the interface server dynamic library.
In the above apparatus of the present invention, the apparatus further includes an export module, configured to export the test command provided by the dynamic library of the auxiliary test command set sent to the process as an external log file.
In the above device of the present invention, the dynamic library of auxiliary test command sets injected by the injection module includes a command to read a program set of a game.
In the above device of the present invention, the dynamic library of auxiliary test command sets injected by the injection module includes a command for looking up a game class instance.
Further, in the above device of the present invention, the dynamic library of the auxiliary test command set injected by the injection module includes a command for calling a method of the game class instance.
Further, in the above apparatus of the present invention, the dynamic library of auxiliary test command sets injected by the injection module includes commands for reading and writing the attributes and fields of the game class instance.
Still further, in the above apparatus of the present invention, the export module further exports the attributes and fields read from and written to the game class instance during the test process as an external log file.
Finally, the present invention also provides a computer readable storage medium having stored thereon computer instructions. The instructions when executed by the processor implement the steps of a method as in any one of the preceding.
The invention has the beneficial effects that: the coverage of numerical value memory security detection and logic security detection of the client is perfected, and the detection efficiency is improved.
Drawings
Fig. 1 is a flowchart illustrating a method for detecting client security according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method for detecting client security according to another embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating a dynamic library injection process of the client security detection method according to the present invention;
FIG. 4 is a block diagram of a client security detection apparatus according to an embodiment of the present invention;
fig. 5 is a block diagram of another embodiment of a client security detection apparatus according to the present invention.
Detailed Description
The conception, the specific structure and the technical effects of the present invention will be clearly and completely described in conjunction with the embodiments and the accompanying drawings to fully understand the objects, the schemes and the effects of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The same reference numbers will be used throughout the drawings to refer to the same or like parts.
Referring to a flowchart of an embodiment shown in fig. 1, a client security detection method based on an Android platform Unity3D game provided by the invention includes the following steps: acquiring a process identifier of a game process to be detected; according to the process identifier, an auxiliary test command set dynamic library and an interface server dynamic library are loaded to a process corresponding to the process identifier; and the interface client sends the test command provided by the auxiliary test command set dynamic library to the process through the interface server dynamic library.
In an embodiment of the present invention, before starting the test, a command set for implementing various auxiliary test functions and a command set for issuing commands to the interface server are compiled and generated into an auxiliary test command set dynamic library and an interface server dynamic library respectively for subsequent process injection operations. Wherein the auxiliary test command set dynamic library can be created based on objects (Type) encapsulating assemblies, modules and types provided by the C # reflection mechanism. Specifically, the reflection dynamically creates instances of the types within the game to be detected and invokes its methods or accesses its fields and properties by binding the types to, or retrieving the types from, existing objects. When an instance of an in-game type uses an attribute, the attribute may be accessed through a C # reflection mechanism. And the tester directly sends the command provided by the auxiliary test command set dynamic library to the game process to be tested based on the interface connection of the client and the operation interface of the client, and executes the test case.
Referring to fig. 2, a flowchart of another embodiment of a client security detection method proposed by the present invention is shown, in which a test command provided by sending an auxiliary test command set dynamic library to a process is exported as an external log file. The tester can verify the specific execution condition of the test case based on the external log file. For example, whether the execution steps described by the test case are completely covered; or in the process of executing the test, whether the game to be detected has the throwing abnormity or not is detected, so that the test process is interrupted, and the like. The log file may also be further used for regression testing.
Referring to fig. 3, which is a schematic diagram of a dynamic library injection process of the client security detection method provided by the present invention, in an embodiment of the present invention, after obtaining a process identifier of a game process to be detected, ptrace may be used to associate the game process to be detected, and further a process register and a process stack corresponding to the process identifier are obtained and saved. By modifying the process registers (e.g., executing a pre-written segment of shellcode), the auxiliary test command set dynamic library and the interface server dynamic library are loaded. And finally, according to the process register and the process stack which are stored in the front, restoring the game process register and the process stack to be detected and disassociating the process to be detected by the prace, so that the process to be detected continues to normally run to execute subsequent formal test work. After the interface client and the interface server are connected, a command can be sent to the interface server through the interface server dynamic library. The commands sent to the interface service may include commands for testing provided by a dynamic library of auxiliary test command sets.
Object class objects inherited from the Unity3D engine can be looked up due to the provided APIs of the Unity3D engine. Thus, in conjunction with the API provided by the Unity3D engine and the C # reflection mechanism, the helper test command set dynamic library may provide commands that:
● reading the assembly (assets) of the game to be tested;
● finding class instances (instances) within the game to be tested;
● view and/or modify properties (property) and fields (field) of an instance;
● call method of the instance;
for use by test personnel during the performance of the test.
For example, since in the Unity3D engine, the Camera class (Camera) decides the picture displayed by the game, and the object Unity engine in Unity3D inherits the object class object from Unity3D engine. Thus, a tester can use the dynamic library of auxiliary test command set to search the unitine camera class instance to perform specific game value memory security check and logic security check.
Specifically, in an embodiment of the present invention, after establishing a connection between an interface client and an interface server, the interface client searches for a unit engine category instance of a game to be tested based on a command provided by an auxiliary test command set dynamic library, after establishing a connection between the interface client and the interface server, the process corresponding to a process identifier to which the auxiliary test command set dynamic library and the interface server dynamic library are loaded; then the interface client sends out a command of modifying the position attribute of the instance of the UnityEngine, Camera class, and the height of the game picture is adjusted so as to simulate the abnormal condition caused by malicious modification of the client; and finally, confirming whether the client is safe or not by detecting whether the camera position can be automatically restored after being modified.
Further, in the above-described embodiments of the present invention, the attributes and fields read and written to the game class instance during the testing process are exported as an external log file. Specifically, the test case may be designed to read the attributes and fields of the game class instance before modification, then modify the attributes and fields of the game class instance, and read the attributes and fields of the game class instance before modification again after modification. And exporting the attributes and the fields read and written in the game class instances in the three operations as an external log file, and comparing whether the attributes and the fields of the game class instances read in the previous and next operations are the same to obtain a conclusion of safety.
Referring to fig. 4, a block diagram of an embodiment of a client security detection device according to the present invention is shown, and the present invention further provides a client security detection device based on an Android platform Unity3D game, including the following blocks: the monitoring module is used for acquiring a process identifier of a game process to be detected; the injection module is used for loading an auxiliary test command set dynamic library and an interface server dynamic library into a process corresponding to the process identifier according to the process identifier; and the sending module is used for sending the test command provided by the auxiliary test command set dynamic library to the process by the interface client through the interface server dynamic library.
In an embodiment of the invention, before starting the test, a command set for realizing various auxiliary test functions and a command set for sending commands to the interface server are respectively compiled and generated into an auxiliary test command set dynamic library and an interface server dynamic library, and the injection module is injected into the game process to be tested. Wherein the auxiliary test command set dynamic library can be created based on objects (Type) encapsulating assemblies, modules and types provided by the C # reflection mechanism. Specifically, the reflection dynamically creates instances of the types within the game to be detected and invokes its methods or accesses its fields and properties by binding the types to, or retrieving the types from, existing objects. When an instance of an in-game type uses an attribute, the attribute may be accessed through a C # reflection mechanism. And the tester directly sends the command provided by the auxiliary test command set dynamic library to the game process to be tested based on the interface connection of the client and the operation interface of the client, and executes the test case.
Referring to fig. 5, a block diagram of another embodiment of a client security detection apparatus according to the present invention is shown, in which the module further includes an export module, configured to export, as an external log file, a test command provided by sending an auxiliary test command set dynamic library to a process. The tester can verify the specific execution condition of the test case based on the external log file. For example, whether the execution steps described by the test case are completely covered; or in the process of executing the test, whether the game to be detected has the throwing abnormity or not is detected, so that the test process is interrupted, and the like. The log file may also be further used for regression testing.
In an embodiment of the present invention, after the monitoring module obtains the process identifier of the game process to be detected, the injection module may use ptrace to associate the game process to be detected, and further obtain and store the process register and the process stack corresponding to the process identifier. By modifying the process registers (e.g., executing a pre-written segment of shellcode), the auxiliary test command set dynamic library and the interface server dynamic library are loaded. And finally, according to the process register and the process stack which are stored in the front, restoring the game process register and the process stack to be detected and disassociating the process to be detected by the prace, so that the process to be detected continues to normally run to execute subsequent formal test work. After the interface client and the interface server are connected, the sending module can send a command to the interface server through the interface server dynamic library. The commands sent to the interface service may include commands for testing provided by a dynamic library of auxiliary test command sets.
Object class objects inherited from the Unity3D engine can be looked up due to the provided APIs of the Unity3D engine. Thus, in conjunction with the API provided by the Unity3D engine and the C # reflection mechanism, the helper test command set dynamic library may provide commands that:
● reading the assembly (assets) of the game to be tested;
● finding class instances (instances) within the game to be tested;
● view and/or modify properties (property) and fields (field) of an instance;
● call method of the instance;
for use by test personnel during the performance of the test.
For example, since in the Unity3D engine, the Camera class (Camera) decides the picture displayed by the game, and the object Unity engine in Unity3D inherits the object class object from Unity3D engine. Thus, a tester can use the dynamic library of auxiliary test command set to search the unitine camera class instance to perform specific game value memory security check and logic security check.
Specifically, in an embodiment of the present invention, after establishing a connection between an interface client and an interface server, the interface client searches for a unit engine category instance of a game to be tested based on a command provided by an auxiliary test command set dynamic library, after establishing a connection between the interface client and the interface server, the process corresponding to a process identifier to which the auxiliary test command set dynamic library and the interface server dynamic library are loaded; then the interface client sends out a command of modifying the position attribute of the instance of the UnityEngine, Camera class, and the height of the game picture is adjusted so as to simulate the abnormal condition caused by malicious modification of the client; and finally, confirming whether the client is safe or not by detecting whether the camera position can be automatically restored after being modified.
Further, in the above embodiment of the present invention, the export module may also export the attributes and fields read from and written to the game class instance during the test process as an external log file. Specifically, the test case may be designed to read the attributes and fields of the game class instance before modification, then modify the attributes and fields of the game class instance, and read the attributes and fields of the game class instance before modification again after modification. And exporting the attributes and the fields read and written in the game class instances in the three operations as an external log file, and comparing whether the attributes and the fields of the game class instances read in the previous and next operations are the same to obtain a conclusion of safety.
While the present invention has been described in considerable detail and with particular reference to a few illustrative embodiments thereof, it is not intended to be limited to any such details or embodiments or any particular embodiments, but it is to be construed as effectively covering the intended scope of the invention by providing a broad, potential interpretation of such claims in view of the prior art with reference to the appended claims. Furthermore, the foregoing describes the invention in terms of embodiments foreseen by the inventor for which an enabling description was available, notwithstanding that insubstantial modifications of the invention, not presently foreseen, may nonetheless represent equivalent modifications thereto.

Claims (3)

1. A client security detection method based on an Android platform Unity3D game is characterized by comprising the following steps:
acquiring a process identifier of a game process to be detected;
loading the auxiliary test command set dynamic library and the interface server dynamic library to a process corresponding to the process identifier;
the interface client sends a test command provided by the auxiliary test command set dynamic library to the process through the interface server dynamic library, and exports the test command provided by the auxiliary test command set dynamic library sent to the process and the attributes and fields read and written in the game instance in the test process into an external log; the interface server dynamic library is generated by compiling a command set which sends commands to the interface server; the dynamic library of auxiliary test command sets comprises: reading a command of a program set of the game, searching a command of a game class instance, calling a command of a method of the game class instance, and reading and writing a command of attributes and fields of the game class instance;
and verifying the coverage rate of the execution steps described by the test case through an external log, verifying whether the test case is interrupted in execution due to the abnormal throwing of the game process to be detected, and judging whether the client is safe according to the attribute of the game class example before and after the modification operation and the comparison result of the fields.
2. A client security detection device based on an Android platform Unity3D game is characterized by comprising the following modules:
the monitoring module is used for acquiring a process identifier of a game process to be detected;
the injection module is used for loading the auxiliary test command set dynamic library and the process corresponding to the process identifier loaded by the interface server dynamic library;
the sending module is used for sending the test command provided by the auxiliary test command set dynamic library to the process by the interface client through the interface server dynamic library, and exporting the test command provided by the auxiliary test command set dynamic library to the process and the attributes and fields read and written in the game instance in the test process into an external log; the interface server dynamic library is generated by compiling a command set which sends commands to the interface server, and the auxiliary test command set dynamic library comprises: reading commands of a program set of the game and commands of searching game class instances, and reading and writing commands of attributes and fields of the game class instances;
the export module is used for exporting the test command provided by the dynamic library of the auxiliary test command set sent to the process into an external log file;
and the safety detection module is used for verifying the coverage rate of the execution steps described by the test case through an external log, verifying whether the test case is interrupted in execution due to the fact that the game process to be detected throws the abnormity, and judging whether the client is safe according to the attribute of the game class example before and after the modification operation and the comparison result of the fields.
3. A computer-readable storage medium having stored thereon computer instructions, characterized in that the instructions, when executed by a processor, implement the steps of the method as claimed in claim 1.
CN201710951249.4A 2017-10-13 2017-10-13 Client security detection method and device based on Android platform Unity3D game Active CN107844703B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710951249.4A CN107844703B (en) 2017-10-13 2017-10-13 Client security detection method and device based on Android platform Unity3D game

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710951249.4A CN107844703B (en) 2017-10-13 2017-10-13 Client security detection method and device based on Android platform Unity3D game

Publications (2)

Publication Number Publication Date
CN107844703A CN107844703A (en) 2018-03-27
CN107844703B true CN107844703B (en) 2021-07-09

Family

ID=61661368

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710951249.4A Active CN107844703B (en) 2017-10-13 2017-10-13 Client security detection method and device based on Android platform Unity3D game

Country Status (1)

Country Link
CN (1) CN107844703B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108970122B (en) * 2018-06-28 2021-06-08 广州华多网络科技有限公司 Method, device, terminal and storage medium for preventing plug-in
CN109636907A (en) * 2018-12-13 2019-04-16 谷东科技有限公司 A kind of terrain reconstruction method and system based on AR glasses

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354133A (en) * 2015-09-28 2016-02-24 网易(杭州)网络有限公司 Game log data processing method and apparatus
CN105868111A (en) * 2016-03-29 2016-08-17 网易(杭州)网络有限公司 Automatic testing method and device for mobile terminal game
CN106126423A (en) * 2016-06-27 2016-11-16 华为技术有限公司 The method of testing of game application, Apparatus and system
CN106326113A (en) * 2016-08-16 2017-01-11 腾讯科技(深圳)有限公司 Game data monitoring method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354133A (en) * 2015-09-28 2016-02-24 网易(杭州)网络有限公司 Game log data processing method and apparatus
CN105868111A (en) * 2016-03-29 2016-08-17 网易(杭州)网络有限公司 Automatic testing method and device for mobile terminal game
CN106126423A (en) * 2016-06-27 2016-11-16 华为技术有限公司 The method of testing of game application, Apparatus and system
CN106326113A (en) * 2016-08-16 2017-01-11 腾讯科技(深圳)有限公司 Game data monitoring method and device

Also Published As

Publication number Publication date
CN107844703A (en) 2018-03-27

Similar Documents

Publication Publication Date Title
Kawakoya et al. Memory behavior-based automatic malware unpacking in stealth debugging environment
US20160300044A1 (en) Anti-debugging method
US9177136B2 (en) Information device, program, method, and computer readable recording medium for preventing execution of malicious program code
US9459991B2 (en) Heap dump object identification in a heap dump analysis tool
TW201220118A (en) A method and a system for automatically analyzing and classifying a malicious program
CN110209520B (en) Method and device for improving SSD (solid State disk) testing efficiency, computer equipment and storage medium
US9069894B2 (en) Data collisions in concurrent programs
CN105528284A (en) Kernel fault injection method and electronic device
CN108197476B (en) Vulnerability detection method and device for intelligent terminal equipment
CN110851352A (en) Fuzzy test system and terminal equipment
CN107844703B (en) Client security detection method and device based on Android platform Unity3D game
CA2811617C (en) Commit sensitive tests
CN105678160A (en) System and method for providing access to original routines of boot drivers
CN110928777B (en) Test case processing method, device, equipment and storage medium
CN101414328A (en) Apparatus and method for exuviations of file
CN111221721B (en) Automatic recording and executing method and device for unit test cases
WO2022237120A1 (en) Frame capture defense method and apparatus for game application, and storage medium and computer device
CN110704315A (en) Fault injection device for embedded software test
CN111291377A (en) Application vulnerability detection method and system
CN112199642A (en) Detection method for anti-debugging of android system, mobile terminal and storage medium
CN109726115B (en) Anti-debugging automatic bypass method based on tracking of Intel processor
CN108959070B (en) Python hook function method and device based on code object
US20190102541A1 (en) Apparatus and method for defending against unauthorized modification of programs
WO2021247074A1 (en) Resumable instruction generation
CN107742080B (en) Vulnerability mining method and device for virtualized environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 519000 Room 102, 202, 302 and 402, No. 325, Qiandao Ring Road, Tangjiawan Town, high tech Zone, Zhuhai City, Guangdong Province, Room 102 and 202, No. 327 and Room 302, No. 329

Patentee after: Zhuhai Jinshan Digital Network Technology Co.,Ltd.

Patentee after: Zhuhai Xishanju Digital Technology Co.,Ltd.

Address before: 519000 Jinshan software building, 8 Lanshan lane, Jida Jingshan Hill Road, Zhuhai, Guangdong

Patentee before: ZHUHAI KINGSOFT ONLINE GAME TECHNOLOGY Co.,Ltd.

Patentee before: ZHUHAI SEASUN MOBILE GAME TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address