CN109284611B - Test system based on Metasplait framework and method for realizing network security test - Google Patents

Test system based on Metasplait framework and method for realizing network security test Download PDF

Info

Publication number
CN109284611B
CN109284611B CN201811100719.7A CN201811100719A CN109284611B CN 109284611 B CN109284611 B CN 109284611B CN 201811100719 A CN201811100719 A CN 201811100719A CN 109284611 B CN109284611 B CN 109284611B
Authority
CN
China
Prior art keywords
attack
test
module
target
tools
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811100719.7A
Other languages
Chinese (zh)
Other versions
CN109284611A (en
Inventor
常承伟
施雪成
贾琼
曾淑娟
吴明杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Computer Technology and Applications
Original Assignee
Beijing Institute of Computer Technology and Applications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Computer Technology and Applications filed Critical Beijing Institute of Computer Technology and Applications
Priority to CN201811100719.7A priority Critical patent/CN109284611B/en
Publication of CN109284611A publication Critical patent/CN109284611A/en
Application granted granted Critical
Publication of CN109284611B publication Critical patent/CN109284611B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to a test system based on a Metasplait framework and a method for realizing network security test, and relates to the technical field of information security. The testing process is realized by calling penetration attack tools in the Metasplait framework in batches; and verifying the test effect of the penetration attack tool by selecting a specific typical attack load and the penetration attack tool. According to the invention, a test system for target computer bugs and network security equipment is constructed, and a large number of penetration attack tools and attack loads integrated in a Metasplait framework are utilized, and other related test tools are combined to realize security test on a target network.

Description

Test system based on Metasplait framework and method for realizing network security test
Technical Field
The invention relates to the technical field of information security, in particular to a testing system based on a Metasplait framework and a method for realizing network security testing by using the testing system.
Background
With the continuous development of information technology, the information environment of the devices in the internet and each local area network is more and more complex, active and passive attacks occur on the network every minute and second, the devices in the network need to bear various attacks and illegal scans in the network, aiming at the attack behaviors, the security protection devices in the network are used for protecting the network at present, so that higher requirements are provided for the detection of abnormal data flow of the network, and in order to test the protection capability of computers and the security protection devices in various attacks, a corresponding test system needs to be considered to be designed, the devices are subjected to penetration test, and the state of the devices under attack is verified. Because of numerous vulnerability exploiting means for various operating systems in the network, the simple vulnerability exploiting collecting means is too complicated to realize the testing process.
Disclosure of Invention
Technical problem to be solved
The technical problem to be solved by the invention is as follows: aiming at the construction requirements of a test system in network test and countermeasure research and development, the problem of resource composition and calling of a penetration attack tool in the test system is solved, and the test system based on the Metasplait framework and the penetration attack tool integrated calling and the method for realizing the network security test by using the system are provided.
(II) technical scheme
In order to solve the technical problem, the invention provides a test system based on a Metasplait framework, which comprises a penetration attack module, an attack load module, an auxiliary tool module and a console module, wherein the penetration attack module is used for detecting the penetration attack load;
the penetration attack module is a set of multiple penetration attack tools, the penetration attack tools are attack codes for destroying system security, namely, the penetration attack tools are vulnerability utilization tools running in the test system, and corresponding vulnerabilities in a target network can be triggered through the penetration attack module to realize remote code execution;
the attack load module is a collection of multiple attack loads, is a code for completing an actual attack function, runs after a vulnerability is successfully infiltrated, can establish a connection between an attacker and a target network, is a program remotely executed in the target network after the vulnerability in the target network is triggered by the penetration attack module, and can realize the collection of the execution effect of a test behavior by executing the program so as to judge whether the target network receives the influence of a corresponding penetration attack tool in the penetration attack module;
the auxiliary tool module is a set of a plurality of auxiliary tools, the auxiliary tools are information collection and target scanning tools for assisting the test process, and the auxiliary tools are executed and relevant results are collected through calling, so that the test process can be guided;
the console module can be deployed in a notebook computer, and the penetration attack module and the attack load module can be called by calling the integrated Metaploit service, so that the test task is configured.
Preferably, the console module is specifically configured to implement an attack function on a target network, and configure resources and related parameters that need to be called by a test task through task configuration in an attack execution process; the corresponding combined customization of the attack load is realized through the combined customization of the attack load; the control management of the test process is realized through a test execution control function, wherein the interactive process with the target network attack load is encrypted; meanwhile, the penetration attack module, the attack load module and the auxiliary tool module are maintained and upgraded through tool load upgrading; the test execution control function selects penetration attack tools of corresponding categories according to the characteristics of a target network, calls the penetration attack tools in batches, does not specifically execute subsequent attack loads according to a Metasplait framework, and selects a plurality of payload for judging whether the execution is successful or not and collecting results.
Preferably, the console module can be deployed in a notebook, which serves as a carrier for attack execution, and also runs related tools in the penetration attack module and the auxiliary tool module, and drives the attack load to run in the target network.
The invention also provides a configuration and test method for carrying out security test on a target network by using the test system, which comprises the following steps:
step 1: installing Metasplait into the notebook;
step 2: sorting the data in the Metasplait, acquiring information of all the applications and payloads, including names, types, descriptions and parameter information required to be configured, and storing the information in a database form;
and step 3: writing related software codes to call the exploloid in the Metasplaint, and realizing the following contents: listing all the names of the applets for selection of an operator, performing union processing on the necessary parameters of all the selected applets needing configuration, and enabling the operator to configure all the listed parameters;
and 4, step 4: writing related software codes to realize the following functions: the combination of payload can be implemented for the selected explicit, thus implementing the following: selecting a plurality of specified payloads for a target operating system of each selected explicit, and using the corresponding explicit and payload to realize an attack process according to a combined mode of Metasplaint;
step 5, connecting the notebook computer provided with the console module with a test target through a network link, and connecting the notebook computer used for attack with the target network through the link or directly connecting the notebook computer with safety protection equipment of the target network;
step 6: detecting and scanning a target network by using an auxiliary tool, and collecting information of a test target;
and 7: selecting a penetration attack tool executed in batches in the Metasplaint framework according to the type of a test target, selecting one or more explicit resources in the Metasplaint framework, and using the selected vulnerability resources for testing vulnerability of the target;
and 8: according to the selected explicit, the test system selects a union set of parameters which are necessary to be configured for an operator to configure the necessary parameters, the parameters which are necessary for all the explicit execution can be provided by configuring according to the parameters of the union set, the test system configures a plurality of payloads for combined execution according to the selected explicit, and the execution process is driven by a Metasplat framework;
and step 9: and (3) sorting the results of the test behaviors from the angle of the test initiating end, judging the execution result corresponding to the explicit according to the execution result returned by the payload, and calculating the successful execution proportion of the whole test process to measure the safety of the test target.
Preferably, in step 2, when the information of all apploids and payloads is obtained, the included parameters of the required configuration include essential parameters and non-essential parameters.
Preferably, in step 5, the notebook is connected to the target network through the wired network.
Preferably, in step 5, the notebook is connected to the target network through the wireless WiFi network.
Preferably, the information collected in step 6 for the test target includes operating system type, deployment device information.
Preferably, the test system configures 5 payload groups for combined execution according to the selected explicit in step 8.
(III) advantageous effects
The testing process is realized by calling penetration attack tools in the Metasplait framework in batches; and verifying the test effect of the penetration attack tool by selecting a specific typical attack load and the penetration attack tool. The design of the test system based on the Metasplait framework provided by the invention references a large number of vulnerability utilization tools integrated by the Metasplait framework, and tests the safety protection capability of the target computer from a vulnerability level; the method for executing the explotides in the Metasplait framework in batch solves the problem that the explotides and the payload in single configuration Metasplait are too complex and cumbersome, and realizes batch configuration by directly configuring the union of parameters; in the invention, the collection of the test result is realized by directly using the typical payload corresponding to the explicit, whether the vulnerability utilization is successful is verified, whether the payload function is realized is not required, and the configuration flow of the Metasplat is simplified. According to the invention, a test system for target computer bugs and network security equipment is constructed, and a large number of penetration attack tools and attack loads integrated in a Metasplait framework are utilized, and other related test tools are combined to realize security test on a target network.
Drawings
FIG. 1 is a simplified diagram of the test system of the present invention;
FIG. 2 is a block diagram of the test system of the present invention;
FIG. 3 is a flow chart of a test process implemented using the test system of the present invention;
FIG. 4 is a diagram of an exemplary operating topology of the test system of the present invention.
Detailed Description
In order to make the objects, contents, and advantages of the present invention clearer, the following detailed description of the embodiments of the present invention will be made in conjunction with the accompanying drawings and examples.
The test system comprises a penetration attack module, an attack load module, an auxiliary tool module and a console module, and is realized by integrating open-source products such as Metasplaiot and the like and a self-research mode, and a hardware carrier of the test system can be a notebook, as shown in figure 1.
The concept of the penetration attack tool in the invention corresponds to the explopoit in Metasplaoi (an attack code which is designed by an attacker or a tester aiming at a leak in a system and is used for destroying the security of the system), namely a leak utilization tool running in a test computer, and the penetration attack module can trigger the corresponding leak in a tested machine to realize remote code execution;
the attack load module is a set of multiple attack loads, the concept of the attack load in the invention corresponds to payload in Metasplait (a code for completing an actual attack function can run on a system after a bug is successfully infiltrated, and the most common purpose is to establish a connection between an attacker and a target machine), namely a program which is remotely executed in a target computer after the bug in the target computer is triggered by the infiltration attack module, and the collection of the execution effect of a test behavior is realized by executing the program so as to judge whether the target computer receives the influence of a corresponding infiltration attack tool in the infiltration attack module;
the auxiliary tool module is a set of a plurality of auxiliary tools, the auxiliary tools in the invention are tools for carrying out auxiliary multi-information collection and target scanning on the test process, and the test system calls and executes the auxiliary tools and collects related results to guide and improve the test process;
the console module is a core module of the invention, is deployed in a notebook computer, realizes the calling of the penetration attack module and the attack load module by calling the integrated Metaploit service, and realizes the whole process of configuration, calling execution and result collection and display of a test task;
the notebook computer is used as a carrier for executing the attack, carries an operation console module, operates related tools in the penetration attack module and the auxiliary tool module, and drives the attack load to operate in the target machine.
The test system is embodied as shown in fig. 2.
The console module realizes an attack function on a target network, and configures resources and related parameters to be called by a test task through a task configuration function in the attack execution process; the corresponding combined customization of the attack load is realized through an attack load combined customization function; the control management of the test process is realized through test execution control, wherein the interactive process with the attack load of the target computer is encrypted through a communication management function, so that the communication safety is ensured; and meanwhile, the penetration attack module, the attack load module and the auxiliary tool module are maintained and upgraded through the tool load upgrading function.
It should be noted that:
the test system is added with a test execution control function, different from the infiltration attack by using the Metasplait, the test system selects infiltration attack tools of corresponding categories according to the characteristics of a test target, calls the infiltration attack tools in batches, does not specifically execute subsequent attack loads according to the Metasplait framework, but selects a plurality of typical payload to simply judge whether the execution is successful and collects a finishing result.
Referring to fig. 3, the configuration and testing process for performing the security test on the target network by using the testing system of the present invention is as follows:
step 1: installing Metasplaint into a test system (notebook), and starting related services;
step 2: sorting the data in the Metasplait, acquiring information of all the applications and payloads, including names, types, descriptions and information of parameters (including necessary parameters and unnecessary parameters) required to be configured, and storing the information in a database form;
and step 3: writing related software codes to call the exploloid in the Metasplaint, and realizing the following contents: listing all the names of the applets for the selection of a software operator, and carrying out union processing on the necessary parameters of all the selected applets needing configuration so as to allow the operator to configure all the listed parameters;
and 4, step 4: writing related software codes to realize the following functions: the combination of payload can be implemented for the selected explicit, thus implementing the following: selecting a plurality of specified typical payloads for a target operating system of each selected explicit, and using the corresponding explicit and payload to realize an attack process according to a combined mode of Metasplaint;
and 5, connecting the notebook computer provided with the console module with the test target through a network link. A typical working topology of the test system of the present invention is shown in fig. 4, and the notebook for attack is connected to the target network through a link (wired network or wireless WiFi network) or directly connected to the security protection device of the target network.
Step 6: the auxiliary tools are used for detecting and scanning the target network, and simple condition collection (information such as operating system type, deployment equipment and the like) is carried out on the test target, so that guidance is provided for the subsequent test process;
and 7: selecting a penetration attack tool executed in batches in the Metasplaint framework according to the type of a test target, selecting one or more explicit resources in the Metasplaint framework, and using the selected vulnerability resources for testing vulnerability of the target;
and 8: according to the selected explicit, the test system selects a union set of parameters which must be configured for an operator to configure the necessary parameters, the parameters required by the execution of all the explicit can be provided by configuring according to the parameters of the union set, the test system configures a plurality of (for example, 5) typical payload according to the selected explicit to perform combined execution, and the execution process is driven by a Metasplat framework;
and step 9: and (3) sorting the results of the test behaviors from the angle of the test initiating end, judging the execution result corresponding to the explicit according to the execution result returned by the payload, and calculating the successful execution proportion of the whole test process to measure the safety of the test target.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (8)

1. A test system based on a Metasplait framework is characterized by comprising a penetration attack module, an attack load module, an auxiliary tool module and a console module;
the penetration attack module is a set of multiple penetration attack tools, the penetration attack tools are attack codes for destroying system security, namely, the penetration attack tools are vulnerability utilization tools running in the test system, and corresponding vulnerabilities in a target network can be triggered through the penetration attack module to realize remote code execution;
the attack load module is a collection of multiple attack loads, is a code for completing an actual attack function, runs after a vulnerability is successfully infiltrated, can establish a connection between an attacker and a target network, is a program remotely executed in the target network after the vulnerability in the target network is triggered by the penetration attack module, and can realize the collection of the execution effect of a test behavior by executing the program so as to judge whether the target network receives the influence of a corresponding penetration attack tool in the penetration attack module;
the auxiliary tool module is a set of a plurality of auxiliary tools, the auxiliary tools are information collection and target scanning tools for assisting the test process, and the auxiliary tools are executed and relevant results are collected through calling, so that the test process can be guided;
the control console module can be deployed in a notebook computer, and realizes the calling of the penetration attack module and the attack load module by calling the integrated Metaploit service, so as to realize the configuration of the test task;
the control console module is specifically used for realizing an attack function on a target network and configuring resources and related parameters to be called by a test task through task configuration in the attack execution process; the corresponding combined customization of the attack load is realized through the combined customization of the attack load; the control management of the test process is realized through a test execution control function, wherein the interactive process with the target network attack load is encrypted; meanwhile, the penetration attack module, the attack load module and the auxiliary tool module are maintained and upgraded through tool load upgrading; the test execution control function selects penetration attack tools of corresponding categories according to the characteristics of a target network, calls the penetration attack tools in batches, does not specifically execute subsequent attack loads according to a Metasplait framework, and selects a plurality of payload for judging whether the execution is successful or not and collecting results.
2. The system of claim 1, wherein the console module is deployable in a notebook that acts as a vehicle for attack execution, and also runs the associated tools in the penetration attack module and the accessibility module, and drives the attack payload to run in the target network.
3. A method for configuring and testing a security test of a target network using the test system of claim 1, comprising the steps of:
step 1: installing Metasplait into the notebook;
step 2: sorting the data in the Metasplait, acquiring information of all the applications and payloads, including names, types, descriptions and parameter information required to be configured, and storing the information in a database form;
and step 3: writing related software codes to call the exploloid in the Metasplaint, and realizing the following contents: listing all the names of the applets for selection of an operator, performing union processing on the necessary parameters of all the selected applets needing configuration, and enabling the operator to configure all the listed parameters;
and 4, step 4: writing related software codes to realize the following functions: the combination of payload can be implemented for the selected explicit, thus implementing the following: selecting a plurality of specified payloads for a target operating system of each selected explicit, and using the corresponding explicit and payload to realize an attack process according to a combined mode of Metasplaint;
step 5, connecting the notebook computer provided with the console module with a test target through a network link, and connecting the notebook computer used for attack with the target network through the link or directly connecting the notebook computer with safety protection equipment of the target network;
step 6: detecting and scanning a target network by using an auxiliary tool, and collecting information of a test target;
and 7: selecting a penetration attack tool executed in batches in the Metasplaint framework according to the type of a test target, selecting one or more explicit resources in the Metasplaint framework, and using the selected vulnerability resources for testing vulnerability of the target;
and 8: according to the selected explicit, the test system selects a union set of parameters which are necessary to be configured for an operator to configure the necessary parameters, the parameters which are necessary for all the explicit execution can be provided by configuring according to the parameters of the union set, the test system configures a plurality of payloads for combined execution according to the selected explicit, and the execution process is driven by a Metasplat framework;
and step 9: and (3) sorting the results of the test behaviors from the angle of the test initiating end, judging the execution result corresponding to the explicit according to the execution result returned by the payload, and calculating the successful execution proportion of the whole test process to measure the safety of the test target.
4. The method as claimed in claim 3, wherein in step 2, when obtaining the information of all applets and payloads, the included parameters of the required configuration include essential parameters and non-essential parameters.
5. The method of claim 3, wherein in step 5, the notebook is connected to the target network through a wired network.
6. The method of claim 3, wherein in step 5, the notebook is connected to the target network through a wireless WiFi network.
7. The method of claim 3, wherein the information collected at step 6 for the test target includes operating system type, deployment device information.
8. The method of claim 3, wherein the test system performs in combination 5 payloads according to the selected explicit configuration in step 8.
CN201811100719.7A 2018-09-20 2018-09-20 Test system based on Metasplait framework and method for realizing network security test Active CN109284611B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811100719.7A CN109284611B (en) 2018-09-20 2018-09-20 Test system based on Metasplait framework and method for realizing network security test

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811100719.7A CN109284611B (en) 2018-09-20 2018-09-20 Test system based on Metasplait framework and method for realizing network security test

Publications (2)

Publication Number Publication Date
CN109284611A CN109284611A (en) 2019-01-29
CN109284611B true CN109284611B (en) 2021-05-18

Family

ID=65181668

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811100719.7A Active CN109284611B (en) 2018-09-20 2018-09-20 Test system based on Metasplait framework and method for realizing network security test

Country Status (1)

Country Link
CN (1) CN109284611B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111488577B (en) * 2019-01-29 2023-05-26 北京金睛云华科技有限公司 Model building method and risk assessment method and device based on artificial intelligence
CN111030834B (en) * 2019-04-26 2023-09-05 北京安天网络安全技术有限公司 Threat prediction method and device based on load propagation behavior and storage equipment
CN110413525B (en) * 2019-07-29 2023-05-23 国网新疆电力有限公司电力科学研究院 Safety testing method and device
CN114244578B (en) * 2021-11-24 2024-05-10 浙江中控技术股份有限公司 Method, system, equipment and medium for testing protection capability of communication card

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998039527A1 (en) * 1997-03-07 1998-09-11 Supersafe Ltd. Structural protective system and method
CN103532793A (en) * 2013-10-28 2014-01-22 中国航天科工集团第二研究院七〇六所 Automatic penetration testing method for information system security
CN104200167A (en) * 2014-08-05 2014-12-10 杭州安恒信息技术有限公司 Automatic penetration testing method and system
CN104410617A (en) * 2014-11-21 2015-03-11 西安邮电大学 Information safety attack and defense system structure of cloud platform
CN105827642A (en) * 2016-05-16 2016-08-03 深圳市安络科技有限公司 Automatic penetration testing method and system
CN107426227A (en) * 2017-08-02 2017-12-01 江苏省邮电规划设计院有限责任公司 One kind automation safe penetration method of testing
CN108540491A (en) * 2018-04-27 2018-09-14 四川长虹电器股份有限公司 Semi-automatic Permeation Test System based on drive sweep and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998039527A1 (en) * 1997-03-07 1998-09-11 Supersafe Ltd. Structural protective system and method
CN103532793A (en) * 2013-10-28 2014-01-22 中国航天科工集团第二研究院七〇六所 Automatic penetration testing method for information system security
CN104200167A (en) * 2014-08-05 2014-12-10 杭州安恒信息技术有限公司 Automatic penetration testing method and system
CN104410617A (en) * 2014-11-21 2015-03-11 西安邮电大学 Information safety attack and defense system structure of cloud platform
CN105827642A (en) * 2016-05-16 2016-08-03 深圳市安络科技有限公司 Automatic penetration testing method and system
CN107426227A (en) * 2017-08-02 2017-12-01 江苏省邮电规划设计院有限责任公司 One kind automation safe penetration method of testing
CN108540491A (en) * 2018-04-27 2018-09-14 四川长虹电器股份有限公司 Semi-automatic Permeation Test System based on drive sweep and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
网络渗透测试综合实验平台技术研究与实现;赵文哲;《中国优秀硕士学位论文全文数据库》;20160331;1-5章 *

Also Published As

Publication number Publication date
CN109284611A (en) 2019-01-29

Similar Documents

Publication Publication Date Title
CN109284611B (en) Test system based on Metasplait framework and method for realizing network security test
CN106828362B (en) Safety testing method and device for automobile information
US7979532B2 (en) Systems and methods for using an access point for testing multiple devices and using several consoles
CN104573494B (en) A kind of mobile security office procedure based on WMI software white list mechanism
CN108268371B (en) Intelligent fuzzy test method for Android application
CN103019942B (en) Method and system for automatically testing applications to be tested based on android system
CN104765692A (en) Method and equipment for automatically testing software
CN102468985A (en) Method and system for carrying out penetration test on network safety equipment
CN111984975B (en) Vulnerability attack detection system, method and medium based on mimicry defense mechanism
US9769046B2 (en) Sensor-based detection and remediation system
CN110851841B (en) Penetration test method, device and storage medium
CN112906011B (en) Vulnerability discovery method, testing method, security testing method, related device and platform
CN105389263A (en) Method, system and equipment for monitoring application software permissions
CN112906010A (en) Automatic attack testing method and automatic safety testing method based on same
CN103051627A (en) Rebound trojan horse detection method
CN112579453A (en) Task testing method, device, equipment and storage medium
CN115563618A (en) Penetration testing method and device based on central computing platform
CN109818972B (en) Information security management method and device for industrial control system and electronic equipment
CN113934642B (en) Software compatibility testing method based on dynamic and static combination
CN115543812A (en) Code coverage rate testing method, device, system and medium based on dynamic injection
CN115098116A (en) Simulation operation method and device of application program, terminal and storage medium
CN111797016B (en) Application program testing method, device, storage medium and device
CN104424440A (en) Apparatus and method for multi-checking for mobile malware
Veeraraghava Security analysis of vehicle to vehicle arada locomate on board unit
CN109933990B (en) Multi-mode matching-based security vulnerability discovery method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant