CN106548076A - Method and apparatus of the detection using bug code - Google Patents

Method and apparatus of the detection using bug code Download PDF

Info

Publication number
CN106548076A
CN106548076A CN201510613310.5A CN201510613310A CN106548076A CN 106548076 A CN106548076 A CN 106548076A CN 201510613310 A CN201510613310 A CN 201510613310A CN 106548076 A CN106548076 A CN 106548076A
Authority
CN
China
Prior art keywords
code
bug
sentence
application
default
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510613310.5A
Other languages
Chinese (zh)
Inventor
夏良钊
包沉浮
施敏
贾志军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201510613310.5A priority Critical patent/CN106548076A/en
Priority to PCT/CN2015/099900 priority patent/WO2017049800A1/en
Publication of CN106548076A publication Critical patent/CN106548076A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Abstract

This application discloses a kind of method and apparatus of detection using bug code.One specific embodiment of methods described includes:Obtain the application code of the application;The application code carries out decompiling, generates the intermediate code of predetermined format;Based on the function calling relationship in the intermediate code, whether comprising the sentence matched with default leak feature sentence in the detection intermediate code, if so, determine that the application includes suspicious bug code;The intermediate code is performed and is directed to the default Validation Code of the suspicious bug code, determine whether the suspicious bug code is definite bug code according to implementing result.The embodiment can improve effectiveness of the detection using bug code.

Description

Method and apparatus of the detection using bug code
Technical field
The application is related to field of computer technology, and in particular to code detection technical field, especially It is related to detect the method and apparatus using bug code.
Background technology
Leak refers to the weakness or defect of a system presence, and system is attacked to specific threat or endangered The sensitivity of dangerous event, or the probability of the threat effect attacked.Leak may be from should The mistake produced during with defect when software or operating system design or coding, it is also possible to from industry Design defect of the business in iterative process or the unreasonable part in logic flow.These lack Fall into, mistake or unreasonable part either intentionally or unintentionally may be utilized, so as to a tissue Assets or operation are adversely affected, and such as information system is attacked or controlled, and capsule information are stolen Take, user data is tampered, system is by as the springboard for invading other host computer systems.Wherein, The code for producing these defects, mistake or unreasonable part can be referred to as bug code.
However, existing detection is generally limited to by static analysis using the method for bug code Or dynamic analysing method finds bug code, and for the inspection and reparation of bug code, often Lack effective mechanism.For the developer of application can not have found or patching bugs code in time, The terminal of the application that operation has bug code will face the threat attacked or controlled.Therefore, This detection is asked using the effectiveness that the method for bug code has bug code detection is relatively low Topic.
The content of the invention
The purpose of the application is a kind of method and dress for proposing improved detection using bug code Put, solve the technical problem that background section above is mentioned.
In a first aspect, this application provides a kind of method detected using bug code, the side Method includes:Obtain the application code of the application;The application code is carried out into decompiling, it is raw Into the intermediate code of predetermined format;Based on the function calling relationship in the intermediate code, detect Whether comprising the sentence matched with default leak feature sentence in the intermediate code, if so, Determine that the application includes suspicious bug code;The intermediate code is performed for described suspicious Whether the default Validation Code of bug code, determine the suspicious bug code according to implementing result For definite bug code.
In certain embodiments, the function calling relationship based in the intermediate code, inspection Survey whether comprising the sentence matched with default leak feature sentence in the intermediate code, if It is to determine that the application includes comprising suspicious bug code:According to the function of the intermediate code Call relation is generated and calls path;According to the call relation respectively called on path, to the centre The sentence of code is matched with default leak feature sentence;If called on path at one Match the leak feature sentence of predetermined number, determine in the intermediate code comprising with it is default The sentence that leak feature sentence matches, and determine that the application includes suspicious bug code.
In certain embodiments, methods described also includes:If it is determined that the suspicious bug code For definite bug code, the intermediate code is repaired based on default reparation rule.
In certain embodiments, methods described is further included:If it is determined that the suspicious leak Code is definite bug code, and the leak title of the definite bug code is presented;In response to true The fixed operation repaired to the definite bug code, repairs institute based on default reparation rule State intermediate code.
In certain embodiments, the default reparation rule includes:By in the intermediate code The sentence matched with default leak feature sentence is revised as default reparation sentence;And/or, Increase default sentence in intermediate code;And/or, delete in intermediate code and default leakage The code that hole feature sentence matches.
In certain embodiments, methods described also includes:Intermediate code after reparation is compiled Translate, generate and repair application code.
In certain embodiments, it is described that the intermediate code was performed for the suspicious leak generation According to implementing result, the default Validation Code of code, determines whether the suspicious bug code is definite Bug code includes:The intermediate code is performed and is tested for the suspicious bug code is default Card code;Check whether the implementing result is leak behavior outcome, if so, determination is described can Doubtful bug code is definite bug code.
In certain embodiments, the application code include it is following at least one:Source code, peace Dress bag code or software tool kit code.
Second aspect, this application provides a kind of device of detection using bug code, the dress Put including:Acquisition module, is configured to obtain the application code of the application;Decompiling module, It is configured to for the application code to carry out decompiling, generates the intermediate code of predetermined format;Inspection Module is surveyed, is configured to based on the function calling relationship in the intermediate code, during detection is described Between in code whether comprising the sentence matched with default leak feature sentence, if so, determine The application includes suspicious bug code;Authentication module, is configured to hold the intermediate code The hand-manipulating of needle, can according to implementing result determines to the default Validation Code of the suspicious bug code Whether doubtful bug code is definite bug code.
In certain embodiments, the detection module includes:Coordinates measurement unit is called, is configured Path is called for generating according to the function calling relationship of the intermediate code;Matching unit, matches somebody with somebody Put for according to the call relation respectively called on path, to the sentence of the intermediate code with it is default Leak feature sentence matched;Determining unit, if being configured to call path at one On match the leak feature sentence of predetermined number, determine in the intermediate code comprising with it is default The sentence that matches of leak feature sentence, and determine that the application includes suspicious bug code.
In certain embodiments, described device also includes:Repair module, if be configured to really The fixed suspicious bug code is definite bug code, repairs described based on default reparation rule Intermediate code.
In certain embodiments, the repair module is further included:Display unit, configuration are used In if it is determined that the suspicious bug code is definite bug code, definite leak generation is presented The leak title of code;Unit is repaired, is configured in response to determining to the definite bug code The operation repaired, repairs the intermediate code based on default reparation rule.
In certain embodiments, the default reparation rule includes:By in the intermediate code The sentence matched with default leak feature sentence is revised as default reparation sentence;And/or, Increase default sentence in intermediate code;And/or, delete in intermediate code and default leakage The code that hole feature sentence matches.
In certain embodiments, described device also includes:Collector, is configured to repairing Intermediate code afterwards is compiled, and generates and repairs application code.
In certain embodiments, the authentication module includes:Performance element, is configured to institute State intermediate code execution and be directed to the default Validation Code of the suspicious bug code;Verification unit, It is configured to check whether the implementing result is leak behavior outcome, if so, determination is described can Doubtful bug code is definite bug code.
In certain embodiments, the application code include it is following at least one:Source code, peace Dress bag code or software tool kit code.
Method and apparatus of the detection of the application offer using bug code, by obtaining described answering Application code is then carried out decompiling by application code, generates the middle generation of predetermined format Whether code, then, based on the function calling relationship in intermediate code, wrap in detecting intermediate code Containing the sentence matched with default leak feature sentence, if so, determine that application includes suspicious leakage Hole code, and intermediate code is performed for the default Validation Code of suspicious bug code, according to Implementing result determines whether suspicious bug code is definite bug code, due to by static generation The detection method that code statement matching and the checking of dynamic Validation Code combine, can improve detection Using the effectiveness of bug code.
Description of the drawings
By reading the detailed description to non-limiting example made with reference to the following drawings, this The other features, objects and advantages of application will become more apparent upon:
Fig. 1 shows the exemplary system architecture that can apply the embodiment of the present application;
Fig. 2 is the stream of the one embodiment for the method that bug code is applied according to the detection of the application Cheng Tu;
Fig. 3 is an application scenarios of the method that bug code is applied according to the detection of the application Flow chart;
Fig. 4 is another embodiment of the method that bug code is applied according to the detection of the application Flow chart;
Fig. 5 is the knot of the one embodiment for the device that bug code is applied according to the detection of the application Structure schematic diagram;
Fig. 6 shows the computer system that is suitable to each device for realizing the embodiment of the present application Structural representation.
Specific embodiment
With reference to the accompanying drawings and examples the application is described in further detail.It is appreciated that , specific embodiment described herein is used only for explaining related invention, rather than to this Bright restriction.It also should be noted that, for the ease of description, illustrate only in accompanying drawing with About the related part of invention.
It should be noted that the embodiment and embodiment in the case where not conflicting, in the application In feature can be mutually combined.Below with reference to the accompanying drawings and in conjunction with the embodiments describing this in detail Application.
Fig. 1 shows the exemplary system architecture 100 that can apply the embodiment of the present application.
As shown in figure 1, system architecture 100 can include terminal unit 101,102, network 103 With server 104.Network 103 is between terminal unit 101,102 and server 104 The medium of communication link is provided.Network 103 can include various connection types, such as it is wired, Wireless communication link or fiber optic cables etc..
Terminal unit 101,102 can be interacted with server 104 by network 103, to receive Or send message etc..Various telecommunication customer end applications can be installed on terminal unit 101,102, For example bug code detection class application, antivirus class application, searching class application, social platform application, Mailbox client, JICQ etc..
Terminal unit 101,102 can support bug code detection class application, antivirus class application Etc. the various electronic equipments being mounted thereon, including but not limited to smart mobile phone, intelligent watch, Panel computer, personal digital assistant, E-book reader, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio frequency aspect 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert pressure Contracting standard audio aspect 4) player, pocket computer on knee and desk computer etc..
Server 104 can be to provide the server of various services.For example to terminal unit 101, 102 detection provides the background service supported using bug code class application, antivirus class application etc. Device etc..Server can be carried out storing to the data that receive, be generated etc. and processing, and will process As a result feed back to terminal unit.
It should be noted that the method that bug code is applied in the detection provided by the embodiment of the present application Can be performed by terminal unit 101,102, it is also possible to performed by server 104, can with by Terminal unit 101,102 and server 104 perform part steps therein respectively, for example, can So that " application code for obtaining application " is performed by terminal unit 101,102, by server 104 Perform " application code being carried out into decompiling, generate the intermediate code of predetermined format " etc..Accordingly Ground, detection can be arranged in terminal unit 101,102 using the device of bug code, also may be used To be arranged in server 104, can be with terminal unit 101,102 and server 104 In be respectively provided with part of module therein.
It should be understood that the number of the terminal unit, network and server in Fig. 1 is only illustrated Property.According to needs are realized, can have any number of terminal unit, network and server.
Fig. 2 is refer to, and detection is it illustrates using one embodiment of the method for bug code Flow process 200.The flow process 200 of the detection application bug code specifically can apply to electronic equipment In, the electronic equipment can be terminal unit (such as Fig. 1 with operation terminal applies ability Shown terminal unit 101, the detection application 102), or to run on terminal unit The application of bug code class provides the background server (such as the server 104 shown in Fig. 1) supported In, the application is not limited to this.The flow process 200 is comprised the following steps:
Step 201, obtains the application code of application.
In the present embodiment, electronic equipment can be from the application generation for locally or remotely obtaining application Code.Specifically, when electronic equipment, detection is run thereon using the application of bug code class During terminal unit, which can directly from locally obtaining above-mentioned application code;And working as electronic equipment is During the background server being supported using bug code class application to detection, which can be by having Line connected mode or radio connection obtain above-mentioned application code from terminal unit.Above-mentioned nothing Line connected mode includes but is not limited to 3G/4G connections, WiFi connections, bluetooth connection, WiMAX Connection, Zigbee connections, UWB (ultra wideband) connections, and other are currently known Or the radio connection developed in the future.
In some optional implementations of the present embodiment, the application code acquired in electronic equipment Can be source code, installation kit code or the software tool kit code of application.Wherein, source Code is the initial code that developer writes application, the sentence group such as expressed by C++ programming languages Into code;Using installation kit code be for installing simultaneously in the operating system of terminal unit The code of execution, the executable code that such as compilation of source code of application is formed (i.e. machine language The installation kit AndroidPackage of code, generally binary code, such as Android system, APK codes);Too development bag (Software Development Kit, SDK) is for specific Software kit, software frame, hardware platform, exploitation when operating system etc. sets up application software The set of instrument, software tool kit often encapsulate the letter that many application developments are called Number, and pass through application programming interface (Application Programming Interface, API) Form be supplied to programmer, software tool kit code can include these functions and interface.
Application code is carried out decompiling by step 202, generates the intermediate code of predetermined format.
In the present embodiment, electronic equipment then can be answered acquired by static analysis means It is compiled with code or decompiling, so as to generate the intermediate code of predetermined format.
Compiling can be the process for producing object code using compiler from source code.Compiling can Realize with by compiler.Assembler language or high-level [computer can be expressed by compiler Source code (Source program), translate into object language (Target language) expression Machine code.Source code generally high-level language (High-level language), such as Pascal, C, C++, Java, Chinese programming language or assembler language etc., and machine language is also referred to as machine Device code (Machine code), usually binary file.Compiler can be by applying journey Sequence is realizing, it is also possible to realized by hardware configuration.Further, decompiling can be compiled The inverse process translated.
Intermediate code can be the code represented by a certain predetermined programming language, for example The application code that Java language is represented;Can also be that the mathematical logic that can show application code is closed Other codes of system.In some implementations, application code can be the source code of application, now, Electronic equipment can be compiled with application code, be converted into intermediate form code.At other In realization, application code can be the installation kit code of application, and now, electronic equipment can be right Application code carries out decompiling, so as to application code is converted into intermediate form code.For should Include the situation of software tool kit code (can be machine code) with code, electronics sets It is standby decompiling to be carried out with application code, so as to application code is converted into intermediate form code.
Step 203, based on the function calling relationship in intermediate code, in detecting intermediate code be It is no comprising the sentence matched with default leak feature sentence, if so, determine above-mentioned application bag Containing suspicious bug code.
In the present embodiment, electronic equipment then can be by various Static Analysis Methods to centre Code is carried out, and is generated the function calling relationship of intermediate code, and then is closed according to these function calls Whether comprising the sentence matched with default leak feature sentence in system's detection intermediate code.
In the present embodiment, electronic equipment can not perform code by Static Analysis Method In the case of the issuable behavior of code is analyzed.Static Analysis Method can for example include But be not limited to unreachable code (all run under any circumstance less than code) minimizing technology, Constant propagation (constant propagation) method etc..Wherein, with unreachable code removal side As a example by a kind of realization of method, electronic equipment can be set up in being represented in the form of data structure chain Between code control flow chart (Control flow graph, CFG), it is true according to control flow chart The code of fixed isolated node section is unreachable code, and then unreachable code is removed.Its In, data structure chain can be generated by the following method:In being read in by character successively from left to right Between code, the character stream of intermediate code is scanned, by using matching regular expressions side Application code is converted to method the symbol stream of equivalence.Here, matching regular expressions method is to make A series of matching of character strings for meeting certain syntactic rule is described, is matched with single character string Method.
Further, electronic equipment can be according in the static analysis Procedure Acquisition to intermediate code Between call relation between function included in code, and according to function call order by centre The sentence of code is matched with default leak feature sentence.Wherein, leak feature sentence can To prestore on an electronic device.Leak feature sentence can have consistent with intermediate code Language rule and form, the sentence for for example both being reached by Java language code table.Here, The sentence of intermediate code can be realized by string matching with matching for leak feature sentence, can So that the sentence of intermediate code is matched, or in intermediate code with leak feature sentence Sentence in search the keyword of leak feature sentence, carried out when keyword is found again whole The matching of sentence, the application are not limited to this.If detected in the sentence of intermediate code The sentence matched with leak feature sentence, electronic equipment can determine that detected application is included Suspicious bug code.Alternatively, electronic equipment can preserve matched leak feature sentence Leak title or type, and intermediate code in include match with leak feature sentence Position that sentence is located etc..
Leak feature sentence can be obtained by number of ways, for example, by known leak Code and the leak behavior for causing are analyzed, and cause the root institute of leak behavior in determining code Code statement, as leak feature sentence;Or, from existing bug code data base Middle direct access leak feature sentence, etc., the application is not limited to this.Wherein, one A little to realize, leak feature sentence can be utilized to attack system in code Or the sentence of control.For example, the image loading in the USER32 storehouses of WINDOWS operating systems (LoadImage) application programming interface (Application Programming Interface, API the icon of one bmp, cur, ico or ani form of loading) is allowed being shown, and Picture size according to being given in picture format adds 4 to carry out the duplication of data, if will be given Text of the picture size for going out for bmp, cur, ico or ani form of 0xfffffffc-0xffffffff Part is embedded into HTML (HyperText Markup Language, HTML) page In face or mail, the terminal system for loading html page or receiving mail will be due to triggering integer Spilling causes stacker buffer to be capped, and then System Privileges can be obtained easily.In the type Leak in, can will realize " API allow loading one bmp, cur, ico or ani form Icon being shown, and add 4 to enter line number according to the picture size be given in picture format According to duplication " sentence as leak feature sentence.In other realizations, leak feature language Sentence can also be incorrect parameter setting sentence, such as the API for establishment file For " openFileOutput (String name, int mode) ", if application developer handle Mode parameters are set to MODE_WORLD_READABLE, then the file for being created is being created Can be read by arbitrarily application afterwards.In the bug code, will can realize " mode Parameter is set to MODE_WORLD_READABLE " sentence as leak feature sentence. In practice, there are other polytype leak feature sentences, here is no longer enumerated.
Step 204, performs for suspicious bug code default checking generation to above-mentioned intermediate code According to implementing result, code, determines whether suspicious bug code is definite bug code.
In the present embodiment, as static analysis rate of false alarm is higher, if it is determined that what is detected should With comprising suspicious bug code, electronic equipment can further can to this by dynamic test means Doubtful bug code is verified, to determine whether it is definite bug code.Here, it is definite to leak Hole code can represent necessary being, operationally can make using produce leak behavior generation Code.
Wherein, dynamic testing method is the method being analyzed to code by operation code.Electricity Sub- equipment can be set by simulator (simulator, such as Simulation Application), virtual machine or physics Standby (physical device, including the various equipment that mounted of hardware and operating system) operation institute The application code of detection application or the intermediate code generated according to application code.
Validation Code is the code verified to suspicious bug code, for example, be available with Lou The code that hole feature sentence application code is attacked or destroyed.For example, for refusal In the leak of service, such as Android system, if developer has used the API for obtaining incoming data " getSerializableExtra () ", without to obtain incoming data do abnormal judgement, then when When the API " getSerializableExtra () " receives undefined object in application code, Can cause using local refusal service, then the Validation Code for the bug code can be to this The Intent of the incoming empty data of API " getSerializableExtra () " (is intended to, answers for ARIXTRA Communication between every component).
Electronic equipment can according to intermediate code perform Validation Code implementing result with it is default Implementing result compares, to determine the suspicious bug code whether bug code as necessary being, I.e. definite bug code.Here, default implementing result can be the leak of suspicious bug code Behavior outcome, i.e. application code include implementing result during bug code, now, if performed As a result include default implementing result, it is determined that suspicious bug code is definite bug code, no Then, it is determined that the application for being detected does not include the suspicious bug code obtained by Static Analysis Method; Can also be application code do not include bug code when implementing result, now, if performing knot Fruit includes default implementing result, it is determined that the application for being detected does not include bug code, otherwise, Determine that suspicious bug code is definite bug code.
In some optional implementations of the present embodiment, can be by with lower section to step 203 Method is realized:First, electronic equipment can be generated according to the function calling relationship of intermediate code and be called Path, wherein, each function can call multiple functions, in addition to principal function, each function Path can also be called per bar to form " function A call functions B-letter by multiple function calls The call relation of number B call functions C-function C call functions D ... ";Then, electronics Equipment can according to the call relation respectively called on path, to the sentence of intermediate code with it is default Leak feature sentence is matched, and matching here can be along calling path to carry out, match party Method is consistent with aforesaid matching process;Then, if electronic equipment calls path at one Be fitted on the leak feature sentence of predetermined number (such as 3), it is determined that in intermediate code comprising with The sentence that default leak feature sentence matches, and determine using comprising suspicious bug code. Alternatively, when electronic equipment calls the leak feature sentence matched on path to include category at one When the leak feature sentence of the predetermined number of same leak, determine in intermediate code comprising with it is pre- If the sentence that matches of leak feature sentence, and determine using comprising suspicious bug code.
With continued reference to Fig. 3, Fig. 3 is to apply bug code method according to the detection of the present embodiment One schematic diagram of application scenarios.In the application scenarios of Fig. 3, in step 3001, user Terminal unit 301 is initiated through first initiates detection application bug code to background server 302 Request, in some implementations, background server 302 can also active request detection terminal set The application bug code of the terminal applies in standby 301, now, what step 3001 was not required; Then, by step 3002, background server 302 obtains to be detected from terminal unit 301 The application code of terminal applies;Then by step 3003, acquired in background server 302 pairs Application code carry out decompiling, generate the intermediate code of predetermined format;Then, by step 3004, background server 302 obtains the function call in intermediate code by static analysis means Relation, and the sentence in intermediate code is matched with default leak feature sentence, if It is fitted on and leak feature sentence identical sentence, in determining terminal applies, includes suspicious bug code; Then, in step 3005, background server 302 is by dynamic analysing method to intermediate code The default Validation Code of suspicious bug code for detecting is performed, is determined according to implementing result Whether suspicious bug code is definite bug code, also, in some implementations, background service Device 302 can be presented the result to terminal unit 301 by step 3006.
The method that above-described embodiment of the application is provided is by the suspicious bug code of Static Detection and moves State verifies that suspicious bug code combines, and improves effectiveness of the detection using bug code.
With further reference to Fig. 4, another enforcement of detection using bug code method is it illustrates The flow process 400 of example.The flow process 400 of the detection application bug code method, comprises the following steps:
Step 401, obtains the application code of application.
In the present embodiment, electronic equipment can be from the application generation for locally or remotely obtaining application Code.Specifically, when electronic equipment, detection is run thereon using the application of bug code class During terminal unit, which can directly from locally obtaining above-mentioned application code;And working as electronic equipment is During the background server being supported using bug code class application to detection, which can be by having Line connected mode or radio connection obtain above-mentioned application code from terminal unit.
Application code is carried out decompiling by step 402, generates the intermediate code of predetermined format.
In the present embodiment, electronic equipment then can be answered acquired by static analysis means It is compiled with code or decompiling, so as to generate the intermediate code of predetermined format.Here, in Between code can be the code represented by a certain predetermined programming language, such as Java language The application code of expression;Can also be the mathematical logic relation that can show application code other Code.Electronic equipment can be compiled with application code or decompiling, so as to be converted into centre Format code.
Step 403, based on the function calling relationship in intermediate code, in detecting intermediate code be It is no comprising the sentence matched with default leak feature sentence, if so, determine above-mentioned application bag Containing suspicious bug code.
In the present embodiment, electronic equipment then can be by various Static Analysis Methods to centre Code is carried out, and is generated the function calling relationship of intermediate code, and then is closed according to these function calls Whether comprising the sentence matched with default leak feature sentence in system's detection intermediate code.Electricity Sub- equipment be able to may be produced to code in the case where code is not performed by Static Analysis Method Behavior be analyzed.Static Analysis Method can for example include but is not limited to unreachable code ( All run in any case less than code) minimizing technology, constant propagation (constant propagation) method etc..Further, electronic equipment can be according to centre The call relation between function included in the static analysis Procedure Acquisition intermediate code of code, And the sentence of intermediate code and default leak feature sentence are carried out according to function call order Match somebody with somebody.
Step 404, performs for suspicious bug code default checking generation to above-mentioned intermediate code According to implementing result, code, determines whether suspicious bug code is definite bug code.
In the present embodiment, electronic equipment can be further suspicious to this by dynamic test means Bug code is verified, to determine whether it is definite bug code.Here, definite leak Code can represent necessary being, operationally can make using produce leak behavior code. Wherein, dynamic testing method is the method being analyzed to code by operation code.Electronics sets It is standby can pass through simulator, virtual machine or physical equipment run detected application application code or The intermediate code that person is generated according to application code.Validation Code is that suspicious bug code is tested The code of card, for example, be available with leak feature sentence application code and attacked or destroyed Code.In some implementations, if electronic equipment is performed for suspicious to above-mentioned intermediate code The implementing result of the default Validation Code of bug code is leak behavior outcome, it is determined that suspicious leakage Hole code is definite bug code.
Step 405, if it is determined that suspicious bug code is definite bug code, based on default Reparation rule repairs intermediate code.
In the present embodiment, the suspicious bug code in application is determined through verification step 404 After definite bug code, electronic equipment can be by default reparation rule to intermediate code Modify, so as to repair definite bug code.
Wherein, electronic equipment can be directed to different leak feature sentences, prestore corresponding Reparation rule, make code no longer produce leak behavior.Reparation rule can be including but not limited to Below at least one:The sentence matched with default leak feature sentence in intermediate code is repaiied It is changed to default reparation sentence;Increase default sentence in intermediate code;In intermediate code The code that deletion is matched with default leak feature sentence.For example, for for establishment file API " openFileOutput (String name, int mode) ", mode parameters are set as The definite bug code of MODE_WORLD_READABLE, default reparation rule can be with It is that mode parameters are revised as into " MODE by " MODE_WORLD_READABLE " PRIVATE ", the then file for being created arbitrarily can not be read;For in the application of Android system " used API " getSerializableExtra () ", without to obtain incoming data do It is abnormal judge " definite bug code, default reparation rule can be:Increase try catch Sentence does abnormal judgement, etc. to the incoming data that " getSerializableExtra () " obtains, Here will not enumerate.
In practice, user (such as developer) is likely to utilize some definite leaks intentionally Code is realizing some special functions.For example, certain intra-company is shared using an application File, can by the application code of the application by calling the API of establishment file " openFileOutput (String name, int mode) ", is set to mode parameters MODE_WORLD_READABLE, the then file for being created can be appointed after creation Meaning application is read, so as to reach the purpose of file-sharing.Now, if electronic equipment is from application Intermediate code in detect bug code and repaired, then the function of the Application share file Just without.Therefore, after it is determined that there is definite bug code in electronic equipment, can first to User is presented (for example present by dialog box, voice) vulnerability information of definite bug code, For example including but not limited to it is following at least one:Leak title, bug code are in application code Position (in certain function) of appearance etc..The vulnerability information is presented by electronic equipment can be with Receive the scheduled operation of user, for example, determine the operation repaired to definite bug code, prohibit Operation that only definite bug code is repaired etc..Determine to definite leak in response to receiving The operation repaired by code, electronic equipment can repair above-mentioned based on default reparation rule Intermediate code.
In some optional implementations of the present embodiment, also include:
Step 406, is compiled to the intermediate code after reparation, generates and repairs application code.
Here, electronic equipment further can enter to repairing the intermediate code after definite bug code Row is recompilated, and generates the application code repaired.The application code of reparation can be set with electronics Code that standby acquired application code is expressed using identical programming language, or by centre The executable code that code compilation is formed, the application are not limited to this.
In the fig. 4 embodiment, the above-mentioned step 401 realized in flow process, step 402, step 403 and step 404 respectively with previous embodiment in step 201, step 202, step 203 It is essentially identical with step 204, will not be described here.
Figure 4, it is seen that from unlike the corresponding embodiments of Fig. 2, in the present embodiment The flow process 400 of method of detection application bug code had more and repaiied based on default reparation rule The step of multiple intermediate code 405, can also include being compiled the intermediate code after reparation, Generate the step of repairing application code 406.The step of by increasing by 405, the present embodiment description Scheme is favorably improved the intellectuality repaired using bug code.The present embodiment can also be by increasing Plus step 406, the intermediate code after reparation is recompilated, artificial participation cost has been saved, So as to contribute to that detection is extended using the function of bug code method, inspection is further improved Survey the effectiveness using bug code.
Please further refer to Fig. 5, used as the realization to method shown in above-mentioned each figure, the application is carried A kind of detection has been supplied using one embodiment of the device of bug code, the device embodiment and figure Embodiment of the method shown in 2 is corresponding, and the device is specifically can apply in electronic equipment.
As shown in figure 5, detection includes using the device 500 of bug code:Acquisition module 501, Decompiling module 502, detection module 503 and authentication module 504.Wherein, acquisition module 501 May be configured to obtain the application code of application;Decompiling module 502 may be configured to by Application code carries out decompiling, generates the intermediate code of predetermined format;Detection module 503 can be with It is configured to based on the function calling relationship in above-mentioned intermediate code, in detecting above-mentioned intermediate code Whether comprising the sentence matched with default leak feature sentence, above-mentioned application is if so, determined Comprising suspicious bug code;Authentication module 504 may be configured to perform above-mentioned intermediate code For the default Validation Code of above-mentioned suspicious bug code, suspicious leak is determined according to implementing result Whether code is definite bug code.
Detection applies all modules described in the device 500 of bug code and with reference to Fig. 2 descriptions Each step in method is corresponding.Thus, answer for detection above in association with described by Fig. 2 The operation and feature described with the method for bug code is equally applicable to detect using bug code Device 500 and the module for wherein including or unit, will not be described here.
It will be understood by those skilled in the art that the device 500 of above-mentioned detection application bug code is also Including some other known features, such as processor, memorizer etc., in order to unnecessarily obscure Embodiment of the disclosure, structure known to these are not shown in Figure 5.
Below with reference to Fig. 6, the electronic equipment being suitable to for realizing the embodiment of the present application is it illustrates Computer system 600 structural representation.
As shown in fig. 6, computer system 600 includes CPU (CPU) 601, its Can be according to the program being stored in read only memory (ROM) 602 or from storage part 608 The program that is loaded in random access storage device (RAM) 603 and perform various appropriate actions And process.In RAM 603, the system that is also stored with 600 operates required various program sums According to.CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input / output (I/O) interface 605 is also connected to bus 604.
I/O interfaces 605 are connected to lower component:Including the importation 606 of keyboard, mouse etc.; Including cathode ray tube (CRT), liquid crystal display (LCD) etc. and speaker etc. Output par, c 607;Storage part 608 including hard disk etc.;And including such as LAN card, The communications portion 609 of the NIC of modem etc..Communications portion 609 is via such as The network of the Internet performs communication process.Driver 610 is also according to needing to be connected to I/O interfaces 605.Detachable media 611, such as disk, CD, magneto-optic disk, semiconductor memory etc., Be arranged in driver 610 as needed, in order to the computer program that reads from it according to Needs are mounted into storage part 608.
Especially, according to embodiments herein, can be with above with reference to the process of flow chart description It is implemented as computer software programs.For example, embodiments herein includes a kind of computer journey Sequence product, which includes the computer program being tangibly embodied on machine readable media, the meter Calculation machine program bag is containing the program code for the method shown in execution flow chart.In such enforcement In example, the computer program can be downloaded and installed from network by communications portion 609, And/or it is mounted from detachable media 611.
In the embodiment of the present application, involved unit can be realized by way of software, also may be used Realize with by way of hardware.Described unit can also be arranged within a processor, example Such as, can be described as:A kind of processor includes acquisition module, decompiling module, detection module And authentication module.Wherein, the title of these modules is not constituted under certain conditions to the module The restriction of itself, for example, acquisition module is also described as " being configured to obtain application The module of application code ".
On the other hand as, present invention also provides a kind of nonvolatile computer storage media, The nonvolatile computer storage media can be described in above-described embodiment included in device Nonvolatile computer storage media;Can also be individualism, without allocating terminal or service into Nonvolatile computer storage media in device.Above-mentioned nonvolatile computer storage media storage There is one or more program, when one or more of programs are performed by an equipment, So that the equipment:Obtain the application code of the application;Compiled the application code counter Translate, generate the intermediate code of predetermined format;Based on the function calling relationship in the intermediate code, Whether detect in the intermediate code comprising the sentence matched with default leak feature sentence, If so, determine that the application includes suspicious bug code;The intermediate code is performed for institute The default Validation Code of suspicious bug code is stated, the suspicious leak generation is determined according to implementing result Whether code is definite bug code.
Above description is only the preferred embodiment of the application and saying to institute's application technology principle It is bright.It will be appreciated by those skilled in the art that invention scope involved in the application, does not limit In the technical scheme of the particular combination of above-mentioned technical characteristic, at the same should also cover without departing from In the case of the inventive concept, combination in any is carried out by above-mentioned technical characteristic or its equivalent feature And other technical schemes for being formed.Such as features described above and (but not limited to) disclosed herein The technical scheme that technical characteristic with similar functions is replaced mutually and formed.

Claims (16)

1. a kind of method that bug code is applied in detection, it is characterised in that methods described includes:
Obtain the application code of the application;
The application code is carried out into decompiling, the intermediate code of predetermined format is generated;
Based on the function calling relationship in the intermediate code, whether detect in the intermediate code Comprising the sentence matched with default leak feature sentence, if so, determine that the application is included Suspicious bug code;
The intermediate code is performed and is directed to the default Validation Code of the suspicious bug code, root Determine whether the suspicious bug code is definite bug code according to implementing result.
2. method according to claim 1, it is characterised in that described based on the centre Function calling relationship in code, detect in the intermediate code whether comprising with default leak The sentence that feature sentence matches, if so, determines that the application includes comprising suspicious bug code:
Generated according to the function calling relationship of the intermediate code and call path;
According to the call relation respectively called on path, to the sentence of the intermediate code with it is default Leak feature sentence is matched;
If the leak feature sentence that predetermined number is matched on path is called at one, institute is determined State in intermediate code comprising the sentence matched with default leak feature sentence, and determine described Using comprising suspicious bug code.
3. method according to claim 1, it is characterised in that methods described also includes:
If it is determined that the suspicious bug code is definite bug code, advised based on default reparation The intermediate code is repaired then.
4. method according to claim 3, it is characterised in that methods described is further wrapped Include:
If it is determined that the suspicious bug code is definite bug code, the definite leak is presented The leak title of code;
In response to determining the operation repaired to the definite bug code, repaiied based on default Multiple rule repairs the intermediate code.
5. the method according to claim 3 or 4, it is characterised in that described default to repair Multiple rule includes:
The sentence matched with default leak feature sentence in the intermediate code is revised as pre- If reparation sentence;And/or
Increase default sentence in intermediate code;And/or
The code matched with default leak feature sentence is deleted in intermediate code.
6. the method according to claim 3 or 4, it is characterised in that methods described is also wrapped Include:Intermediate code after reparation is compiled, is generated and is repaired application code.
7. method according to claim 1, it is characterised in that described to the middle generation Code is performed and is directed to the default Validation Code of the suspicious bug code, determines institute according to implementing result State whether suspicious bug code is that definite bug code includes:
The intermediate code is performed and is directed to the default Validation Code of the suspicious bug code;
Check whether the implementing result is leak behavior outcome, if so, determine the suspicious leakage Hole code is definite bug code.
8. method according to claim 1, it is characterised in that the application code includes Below at least one:Source code, installation kit code or software tool kit code.
9. the device of bug code is applied in a kind of detection, it is characterised in that described device includes:
Acquisition module, is configured to obtain the application code of the application;
Decompiling module, is configured to for the application code to carry out decompiling, and generation is fixed in advance The intermediate code of formula;
Detection module, is configured to, based on the function calling relationship in the intermediate code, detect Whether comprising the sentence matched with default leak feature sentence in the intermediate code, if so, Determine that the application includes suspicious bug code;
Authentication module, is configured to perform for the suspicious bug code intermediate code According to implementing result, default Validation Code, determines whether the suspicious bug code is definite leakage Hole code.
10. device according to claim 9, it is characterised in that the detection module bag Include:
Coordinates measurement unit is called, the function calling relationship according to the intermediate code is configured to Path is called in generation;
Matching unit, is configured to according to the call relation respectively called on path, to the centre The sentence of code is matched with default leak feature sentence;
Determining unit, if being configured to call the leakage that predetermined number is matched on path at one Hole feature sentence, is determined in the intermediate code comprising being matched with default leak feature sentence Sentence, and determine the application include suspicious bug code.
11. devices according to claim 9, it is characterised in that described device also includes:
Repair module, be configured to if it is determined that the suspicious bug code be definite bug code, The intermediate code is repaired based on default reparation rule.
12. devices according to claim 11, it is characterised in that the repair module is entered One step includes:
Display unit, be configured to if it is determined that the suspicious bug code be definite bug code, The leak title of the definite bug code is presented;
Unit is repaired, is configured in response to determining what the definite bug code was repaired Operation, repairs the intermediate code based on default reparation rule.
13. devices according to claim 11 or 12, it is characterised in that described default Reparation rule include:
The sentence matched with default leak feature sentence in the intermediate code is revised as pre- If reparation sentence;And/or
Increase default sentence in intermediate code;And/or
The code matched with default leak feature sentence is deleted in intermediate code.
14. devices according to claim 11 or 12, it is characterised in that described device Also include:
Collector, is configured to be compiled the intermediate code after reparation, generates to repair and answers Use code.
15. devices according to claim 9, it is characterised in that the authentication module bag Include:
Performance element, is configured to perform for the suspicious bug code intermediate code Default Validation Code;
Verification unit, is configured to check whether the implementing result is leak behavior outcome, if It is to determine that the suspicious bug code is definite bug code.
16. devices according to claim 9, it is characterised in that the application code bag Include it is following at least one:Source code, installation kit code or software tool kit code.
CN201510613310.5A 2015-09-23 2015-09-23 Method and apparatus of the detection using bug code Pending CN106548076A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510613310.5A CN106548076A (en) 2015-09-23 2015-09-23 Method and apparatus of the detection using bug code
PCT/CN2015/099900 WO2017049800A1 (en) 2015-09-23 2015-12-30 Method and apparatus for detecting loophole code in application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510613310.5A CN106548076A (en) 2015-09-23 2015-09-23 Method and apparatus of the detection using bug code

Publications (1)

Publication Number Publication Date
CN106548076A true CN106548076A (en) 2017-03-29

Family

ID=58365085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510613310.5A Pending CN106548076A (en) 2015-09-23 2015-09-23 Method and apparatus of the detection using bug code

Country Status (2)

Country Link
CN (1) CN106548076A (en)
WO (1) WO2017049800A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107632901A (en) * 2017-09-25 2018-01-26 青岛海信移动通信技术股份有限公司 A kind of self-repair method and device of application program operation exception
CN108416216A (en) * 2018-02-28 2018-08-17 阿里巴巴集团控股有限公司 leak detection method, device and computing device
CN109829298A (en) * 2018-11-26 2019-05-31 努比亚技术有限公司 RAM leakage risk checking method, terminal and computer readable storage medium
CN110188544A (en) * 2019-05-30 2019-08-30 北京百度网讯科技有限公司 Leak detection method and device, equipment and storage medium
CN110619215A (en) * 2019-08-23 2019-12-27 苏州浪潮智能科技有限公司 Code security scanning method and system
CN110968874A (en) * 2019-11-28 2020-04-07 腾讯科技(深圳)有限公司 Vulnerability detection method, device, server and storage medium
CN111125644A (en) * 2018-11-01 2020-05-08 百度在线网络技术(北京)有限公司 Information hiding method and device for application product
CN111177733A (en) * 2019-12-30 2020-05-19 北京航空航天大学 Software patch detection method and device based on data flow analysis
CN112346818A (en) * 2020-11-02 2021-02-09 北京新媒传信科技有限公司 Container application deployment method and device, electronic equipment and storage medium
CN112528290A (en) * 2020-12-04 2021-03-19 扬州大学 Vulnerability positioning method, system, computer equipment and storage medium
CN112541179A (en) * 2020-11-27 2021-03-23 国网河南省电力公司电力科学研究院 Android application digital certificate verification vulnerability detection system and method
CN112632563A (en) * 2020-12-29 2021-04-09 北京梆梆安全科技有限公司 Vulnerability detection method and device, storage medium and electronic equipment
CN113672929A (en) * 2020-05-14 2021-11-19 阿波罗智联(北京)科技有限公司 Vulnerability characteristic obtaining method and device and electronic equipment

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107066302B (en) * 2017-04-28 2019-11-05 北京邮电大学 Defect inspection method, device and service terminal
US11741238B2 (en) * 2017-11-27 2023-08-29 Lacework, Inc. Dynamically generating monitoring tools for software applications
CN110363004B (en) * 2018-04-10 2023-01-03 腾讯科技(深圳)有限公司 Code vulnerability detection method, device, medium and equipment
CN109344611B (en) * 2018-09-06 2024-02-27 天翼安全科技有限公司 Application access control method, terminal equipment and medium
CN112711424A (en) * 2019-10-25 2021-04-27 腾讯科技(深圳)有限公司 Application risk problem determination method and device and storage medium
CN111090860A (en) * 2019-12-10 2020-05-01 北京邮电大学 Code vulnerability detection method and device based on deep learning
CN110991147B (en) * 2019-12-19 2023-07-07 五八有限公司 Font detection method and device, electronic equipment and storage medium
CN113946830A (en) * 2021-10-09 2022-01-18 暨南大学 Multi-mode detection-based Android APP vulnerability fine-grained detection method
CN116383834B (en) * 2023-06-02 2023-08-08 北京邮电大学 Detection method for source code vulnerability detection tool abnormality and related equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070240215A1 (en) * 2006-03-28 2007-10-11 Blue Coat Systems, Inc. Method and system for tracking access to application data and preventing data exploitation by malicious programs
CN103793650A (en) * 2013-12-02 2014-05-14 北京邮电大学 Static analysis method and static analysis device for Android application program
CN104021346A (en) * 2014-06-06 2014-09-03 东南大学 Method for detecting Android malicious software based on program flow chart

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070240215A1 (en) * 2006-03-28 2007-10-11 Blue Coat Systems, Inc. Method and system for tracking access to application data and preventing data exploitation by malicious programs
CN103793650A (en) * 2013-12-02 2014-05-14 北京邮电大学 Static analysis method and static analysis device for Android application program
CN104021346A (en) * 2014-06-06 2014-09-03 东南大学 Method for detecting Android malicious software based on program flow chart

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈平 等: "基于动静态程序分析的整形漏洞检测工具", 《电子学报》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107632901A (en) * 2017-09-25 2018-01-26 青岛海信移动通信技术股份有限公司 A kind of self-repair method and device of application program operation exception
CN108416216A (en) * 2018-02-28 2018-08-17 阿里巴巴集团控股有限公司 leak detection method, device and computing device
CN111125644A (en) * 2018-11-01 2020-05-08 百度在线网络技术(北京)有限公司 Information hiding method and device for application product
CN109829298A (en) * 2018-11-26 2019-05-31 努比亚技术有限公司 RAM leakage risk checking method, terminal and computer readable storage medium
CN110188544A (en) * 2019-05-30 2019-08-30 北京百度网讯科技有限公司 Leak detection method and device, equipment and storage medium
CN110619215B (en) * 2019-08-23 2021-08-20 苏州浪潮智能科技有限公司 Code security scanning method and system
CN110619215A (en) * 2019-08-23 2019-12-27 苏州浪潮智能科技有限公司 Code security scanning method and system
CN110968874A (en) * 2019-11-28 2020-04-07 腾讯科技(深圳)有限公司 Vulnerability detection method, device, server and storage medium
CN111177733A (en) * 2019-12-30 2020-05-19 北京航空航天大学 Software patch detection method and device based on data flow analysis
CN111177733B (en) * 2019-12-30 2022-06-21 北京航空航天大学 Software patch detection method and device based on data flow analysis
CN113672929A (en) * 2020-05-14 2021-11-19 阿波罗智联(北京)科技有限公司 Vulnerability characteristic obtaining method and device and electronic equipment
CN112346818A (en) * 2020-11-02 2021-02-09 北京新媒传信科技有限公司 Container application deployment method and device, electronic equipment and storage medium
CN112541179A (en) * 2020-11-27 2021-03-23 国网河南省电力公司电力科学研究院 Android application digital certificate verification vulnerability detection system and method
CN112528290A (en) * 2020-12-04 2021-03-19 扬州大学 Vulnerability positioning method, system, computer equipment and storage medium
CN112528290B (en) * 2020-12-04 2023-07-18 扬州大学 Vulnerability positioning method, vulnerability positioning system, computer equipment and storage medium
CN112632563A (en) * 2020-12-29 2021-04-09 北京梆梆安全科技有限公司 Vulnerability detection method and device, storage medium and electronic equipment
CN112632563B (en) * 2020-12-29 2023-11-21 北京梆梆安全科技有限公司 Vulnerability detection method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
WO2017049800A1 (en) 2017-03-30

Similar Documents

Publication Publication Date Title
CN106548076A (en) Method and apparatus of the detection using bug code
CN105068932B (en) A kind of detection method of Android application programs shell adding
KR101143999B1 (en) Apparatus and method for analyzing application based on application programming interface
CN103632096B (en) A kind of method and apparatus that safety detection is carried out to equipment
CN104517054B (en) Method, device, client and server for detecting malicious APK
CN104965712B (en) Application program method for reinforcing and protecting, device and mobile terminal
TWI575397B (en) Point-wise protection of application using runtime agent and dynamic security analysis
Lin et al. Automated forensic analysis of mobile applications on Android devices
CN104331662B (en) Android malicious application detection method and device
CN110414261B (en) Data desensitization method, device, equipment and readable storage medium
CN104685477B (en) Application security is tested
CN108009087A (en) Data library test method, device and computer-readable recording medium
Jiang et al. Feature-based software customization: Preliminary analysis, formalization, and methods
CN104537308B (en) System and method using security audit function is provided
CN107885995A (en) The security sweep method, apparatus and electronic equipment of small routine
CN104361285B (en) The safety detection method and device of mobile device application program
CN106055341A (en) Application installation package checking method and device
CN104063673B (en) A kind of method carrying out information input in a browser and browser device
CN107451474A (en) Software vulnerability restorative procedure and device for terminal
JP2012234401A (en) Application analysis device and program
CN105793862A (en) Directed execution of dynamic programs in isolated environments
CN110297776A (en) Examining report generation, method of reseptance, device, equipment and storage medium
CN106682491A (en) Application downloading method and device
CN104375935B (en) The test method and device of SQL injection attack
CN110427757A (en) A kind of Android leak detection method, system and relevant apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170329