CN112632553A - Vulnerability processing method and related product - Google Patents

Vulnerability processing method and related product Download PDF

Info

Publication number
CN112632553A
CN112632553A CN201910956321.1A CN201910956321A CN112632553A CN 112632553 A CN112632553 A CN 112632553A CN 201910956321 A CN201910956321 A CN 201910956321A CN 112632553 A CN112632553 A CN 112632553A
Authority
CN
China
Prior art keywords
vulnerability
file
server
processing
strategy file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910956321.1A
Other languages
Chinese (zh)
Inventor
郑健平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oppo Chongqing Intelligent Technology Co Ltd
Original Assignee
Oppo Chongqing Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo Chongqing Intelligent Technology Co Ltd filed Critical Oppo Chongqing Intelligent Technology Co Ltd
Priority to CN201910956321.1A priority Critical patent/CN112632553A/en
Publication of CN112632553A publication Critical patent/CN112632553A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Abstract

The embodiment of the application discloses a vulnerability processing method and related products, which are applied to first electronic equipment in a vulnerability processing system, wherein the vulnerability processing system comprises the first electronic equipment and a server which are in communication connection, and the method comprises the following steps: and when the vulnerability processing strategy file is detected, downloading the vulnerability processing strategy file, when the vulnerability processing strategy file is determined to meet the preset conditions, installing the vulnerability processing strategy file, wherein the preset conditions are used for restricting the security and effectiveness of the vulnerability strategy file, and finally, plugging the vulnerability according to the vulnerability processing strategy file. The embodiment of the application is beneficial to improving the effectiveness of vulnerability processing and improving the safety of the electronic equipment.

Description

Vulnerability processing method and related product
Technical Field
The application relates to the technical field of electronic equipment, in particular to a vulnerability processing method and a related product.
Background
In an electronic device, if a security policy of a system is defective, the security policy may become a system bug, so that an attacker can access or destroy the system of the electronic device by using the bug without authorization, and therefore, the Android mobile phone may use a selinux policy to limit processing of the bug. In the prior art, a system version upgrading mode is often adopted to update the selinux strategy, the version upgrading process is too slow, and an upgrading path cannot be effective due to attack of an attacker, so that a leak cannot be plugged immediately and effectively.
Disclosure of Invention
The embodiment of the application provides a vulnerability processing method and a related product, so as to improve the effectiveness of vulnerability processing and improve the safety of electronic equipment.
In a first aspect, an embodiment of the present application provides a vulnerability processing method, which is applied to a first electronic device in a vulnerability processing system, where the vulnerability processing system includes the first electronic device and a server, and the first electronic device and the server are in communication connection, where the method includes:
when a vulnerability processing strategy file is detected, downloading the vulnerability processing strategy file, wherein the vulnerability processing strategy file is generated by the server according to vulnerability information of the first electronic equipment;
determining whether the vulnerability processing policy file meets a preset condition, wherein the preset condition is used for restricting the security and effectiveness of the vulnerability policy file;
if yes, installing the vulnerability processing strategy file;
and plugging the loophole according to the loophole processing strategy file.
In a second aspect, an embodiment of the present application provides a vulnerability processing method, which is applied to a server in a vulnerability processing system, where the vulnerability processing system includes the first electronic device and the server, and the first electronic device and the server are communicatively connected, where the method includes:
acquiring vulnerability information;
generating a vulnerability processing strategy file according to the vulnerability information, wherein the vulnerability processing strategy file is used for indicating the electronic equipment corresponding to the vulnerability information to seal the corresponding vulnerability;
and sending the vulnerability handling strategy file to the corresponding electronic equipment.
In a third aspect, an embodiment of the present application provides a vulnerability processing apparatus, which is applied to a first electronic device in a vulnerability processing system, where the vulnerability processing system includes the first electronic device and a server, and the first electronic device and the server are communicatively connected, and the apparatus includes: a processing unit and a communication unit, wherein,
the processing unit is used for downloading the vulnerability processing strategy file through the communication unit when the vulnerability processing strategy file is detected, wherein the vulnerability processing strategy file is generated by the server according to vulnerability information of the first electronic device; the vulnerability processing method comprises the steps of determining whether the vulnerability processing strategy file meets preset conditions or not, wherein the preset conditions are used for restricting the security and the effectiveness of the vulnerability processing strategy file; if yes, installing the vulnerability processing strategy file; and the method is used for plugging the vulnerability according to the vulnerability processing strategy file.
In a fourth aspect, an embodiment of the present application provides an vulnerability processing apparatus, which is applied to a server in a vulnerability processing system, where the vulnerability processing system includes the first electronic device and the server, where the first electronic device and the server are communicatively connected, and the apparatus includes: a processing unit and a communication unit, wherein,
the processing unit is used for acquiring vulnerability information through the communication unit; generating a vulnerability processing strategy file according to the vulnerability information, wherein the vulnerability processing strategy file is used for indicating the electronic equipment corresponding to the vulnerability information to seal the corresponding vulnerability; and sending the vulnerability handling strategy file to the corresponding electronic equipment.
In a fifth aspect, an embodiment of the present application provides a vulnerability handling system, which includes a first electronic device and a server, where the server is in communication connection with the first electronic device;
the first electronic device is configured to perform the steps of the method according to any one of the first aspect;
the server is configured to perform the steps of the method according to the second aspect.
In a sixth aspect, this application provides a first electronic device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for performing the steps of any of the methods of the first aspect of this application.
In a seventh aspect, embodiments of the present application provide a server, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for performing the steps of any of the methods of the second aspects of the embodiments of the present application.
In an eighth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program makes a computer perform part or all of the steps described in the method according to any one of the first aspect or the second aspect of the embodiments of the present application, and the computer includes an electronic device.
In a ninth aspect, embodiments of the present application provide a computer program product, wherein the computer program product comprises a non-transitory computer-readable storage medium storing a computer program, the computer program being operable to cause a computer to perform some or all of the steps as described in any of the methods of the first or second aspects of the embodiments of the present application. The computer program product may be a software installation package.
It can be seen that, in the embodiment of the application, the electronic device first downloads the vulnerability processing policy file when detecting the vulnerability processing policy file, and installs the vulnerability processing policy file when determining that the vulnerability processing policy file meets the preset conditions, where the preset conditions are used to constrain the security and effectiveness of the vulnerability policy file, and finally, seals the vulnerability according to the vulnerability processing policy file. Therefore, the electronic equipment can dynamically acquire the vulnerability processing strategy file, and process the corresponding vulnerability according to the vulnerability processing strategy file after ensuring the security and the effectiveness of the vulnerability processing strategy file, so that the vulnerability processing effectiveness can be improved, and the security of the electronic equipment can be further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a vulnerability processing system according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a vulnerability handling method disclosed in an embodiment of the present application;
fig. 3 is a schematic flowchart of another vulnerability handling method disclosed in the embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device disclosed in an embodiment of the present application;
FIG. 5 is a schematic structural diagram of a server disclosed in an embodiment of the present application;
fig. 6 is a block diagram illustrating functional units of a vulnerability processing apparatus according to an embodiment of the present disclosure;
fig. 7 is a block diagram illustrating functional units of another vulnerability processing apparatus according to an embodiment of the present disclosure.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The electronic device according to the embodiments of the present application may be an electronic device with communication capability, and the electronic device may include various handheld devices with wireless communication function, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of User Equipment (UE), Mobile Stations (MS), terminal equipment (terminal), and so on.
Referring to fig. 1, fig. 1 is a schematic view of a vulnerability processing system, and as shown in fig. 1, a vulnerability processing system 10 includes an electronic device 101 and a server 102, where the electronic device 101 and the server 102 can be in communication connection, and data interaction is performed between the electronic device 101 and the server 102 in a vulnerability processing process. The server related to the embodiment of the application is an android version mobile phone.
At present, a local vulnerability processing strategy is often updated by adopting a system version upgrading mode for electronic equipment, the version upgrading process is too slow, and an upgrading path cannot be effective due to attack of an attacker, so that vulnerabilities cannot be immediately and effectively plugged, and potential safety hazards exist in the electronic equipment.
In view of the above problems, the present application provides a vulnerability handling method, and the following describes an embodiment of the present application in detail with reference to the accompanying drawings.
Referring to fig. 2, fig. 2 is a schematic flowchart of a vulnerability processing method applied to a first electronic device, where the first electronic device is connected to a server, and as shown in fig. 2, the vulnerability processing method includes:
s101, when detecting a vulnerability processing strategy file, the first electronic device downloads the vulnerability processing strategy file, wherein the vulnerability processing strategy file is generated by the server according to vulnerability information of the first electronic device.
The vulnerability refers to a defect of the first electronic device in a system security policy, so that an attacker can access or destroy the system without authorization. For example, the vulnerability may be a back door program in the first electronic device system, which is a way for a particular user to control the computer system in a particular manner. During the development phase of the software, a programmer creates back-door programs within the software to modify bugs in the programming, but when an attacker discovers these back-door programs, it is possible to raise the rights with these back-door programs.
The vulnerability processing strategy file is a file which is generated by the server according to vulnerability information and comprises a vulnerability blocking strategy after the server acquires the vulnerability information of the first electronic device.
Optionally, the obtaining, by the server, the vulnerability information of the first electronic device may be: when the first electronic equipment is in self-checking, if the first electronic equipment finds that the local terminal has a bug, acquiring bug information; sending the vulnerability information to a server, namely, when the vulnerability processing policy file is detected, before determining whether the vulnerability processing policy file meets a preset condition, the method further comprises the following steps: when detecting that a local terminal has a bug, the first electronic equipment acquires bug information and a bug processing request of the bug; and the first electronic equipment sends the vulnerability information and the vulnerability processing request to the server.
Optionally, the obtaining, by the server, the vulnerability information of the first electronic device may further be: the security feedback mechanism acquires vulnerability information of the first electronic device; and the security feedback mechanism sends the vulnerability information of the first electronic device to the server. The security feedback mechanism may be a third-party detection electronic device for finding a vulnerability of the first electronic device, and the security feedback mechanism may acquire vulnerability information of the first electronic device by the security mechanism traversing all programs in the first electronic device, detecting all programs, and acquiring corresponding vulnerability information if it is detected that the program is a vulnerability.
As can be seen, in this example, the electronic device obtains the vulnerability processing policy file of the server dynamically, and obtains the vulnerability processing policy file in real time to prevent unauthorized users from using the vulnerability to privilege.
S102, the first electronic device determines whether the vulnerability processing policy file meets a preset condition, wherein the preset condition is used for restricting the security and effectiveness of the vulnerability policy file.
The vulnerability policy file may or may not be an encrypted file.
As can be seen, in this example, the electronic device is able to determine whether the vulnerability handling policy file is safe and valid.
And S103, if yes, installing the vulnerability handling strategy file.
As can be seen, in this example, the electronic device can be loaded when it is determined that the vulnerability processing policy file meets the preset condition, so as to ensure the security of the vulnerability processing policy file.
And S104, the first electronic equipment seals the loophole according to the loophole processing strategy file.
The first electronic device sealing the vulnerability according to the vulnerability processing policy file means that the first electronic device restricts the use of a program corresponding to the vulnerability according to the vulnerability processing policy file to perform an authorization operation, and the program can be a backdoor program.
Therefore, in the example, the electronic equipment can immediately plug the leak, and the security of the mobile phone is improved.
It can be seen that, in the embodiment of the application, the electronic device first downloads the vulnerability processing policy file when detecting the vulnerability processing policy file, and installs the vulnerability processing policy file when determining that the vulnerability processing policy file meets the preset conditions, where the preset conditions are used to constrain the security and effectiveness of the vulnerability policy file, and finally, seals the vulnerability according to the vulnerability processing policy file. Therefore, the electronic equipment can dynamically acquire the vulnerability processing strategy file, and process the corresponding vulnerability according to the vulnerability processing strategy file after ensuring the security and the effectiveness of the vulnerability processing strategy file, so that the vulnerability processing effectiveness can be improved, and the security of the electronic equipment can be further improved.
In one possible example, the determining, by the first electronic device, whether the vulnerability handling policy file satisfies a preset condition includes: the first electronic equipment judges whether the vulnerability processing strategy file is complete or not; if the vulnerability processing strategy file is complete, carrying out a new allow check on the vulnerability processing strategy file to obtain a check result; and if the checking result meets a preset checking result, determining that the vulnerability handling strategy file meets a preset condition.
The implementation manner of the first electronic device determining whether the vulnerability handling policy file is complete may be: sending a vulnerability handling policy file integrity verification request to the server; acquiring integrity verification information of a vulnerability handling policy file sent by the server, wherein the verification information comprises an integrity verification policy and reference information; and carrying out integrity check on the vulnerability processing strategy file according to the check information so as to determine whether the vulnerability processing strategy file is complete.
Optionally, the reference information is a reference length of the vulnerability processing policy file, where the reference length is a length of the vulnerability processing policy file recorded by the server after the vulnerability processing policy file is generated, and the integrity detection policy includes: the method comprises the steps that first electronic equipment determines the length of a vulnerability processing strategy file downloaded to a local terminal; and if the length is the same as the reference length, determining that the vulnerability processing strategy file is complete. For example, if the reference length of the vulnerability processing policy file provided by the server is 255 and the length of the vulnerability processing policy file downloaded to the local terminal is determined to be 256 by the first electronic device, it is determined that the vulnerability processing policy file downloaded to the local terminal is incomplete, at this time, the downloaded vulnerability processing policy file is not installed, and the downloaded vulnerability processing policy file is deleted.
Optionally, the reference information is a reference MD5 code of the vulnerability handling policy file, the reference MD5 code is a reference MD5 code of the vulnerability handling policy file that is generated and recorded by the server after the vulnerability handling policy file is generated, and the integrity detection policy includes: the first electronic equipment determines an MD5 code of a vulnerability handling strategy file downloaded to a local terminal; and if the MD5 code is successfully matched with the reference MD5 code, determining that the vulnerability processing strategy file is complete.
The implementation manner of the first electronic device that performs a new allow check on the vulnerability handling policy file to obtain a check result may be: the first electronic equipment judges whether a policy violating a reverse low statement exists in the vulnerability processing policy file; if not, determining that the checking result meets a preset checking result, and determining that the vulnerability handling policy file meets a preset condition.
Further, after the first electronic device determines that the vulnerability handling policy file is incomplete, the first electronic device generates warning information; the first electronic device outputs the warning information. For example, after the first electronic device determines that the vulnerability handling policy file is incomplete, warning information such as "finding the vulnerability handling policy file, but the vulnerability handling policy file is incomplete" may be generated and displayed on the current interface of the first electronic device, or broadcasted through a buzzer.
Further, after the first electronic device determines that a policy violating a reverse low statement exists in the vulnerability handling policy file, the first electronic device generates warning information; the first electronic device outputs the warning information. For example, after the first electronic device determines that a policy violating a reverse low statement exists in the vulnerability handling policy file, warning information that the vulnerability handling policy file is found but violates a reverse low rule may be generated and displayed on a current interface of the first electronic device, or broadcasted through a buzzer.
As can be seen, in this example, the electronic device determines that the vulnerability processing policy file is safe and effective by determining that the vulnerability processing policy file is complete and satisfying the newall rule, so as to improve the effectiveness of vulnerability processing.
In this possible embodiment, the vulnerability handling policy file is obtained by the server executing the following operations: acquiring vulnerability information; generating a first file according to the vulnerability information, wherein the first file comprises a new allow rule; and adding a preset file to the first file for verification to obtain the vulnerability handling strategy file.
Therefore, in this example, the server can obtain the vulnerability processing policy file according to the vulnerability information of the terminal device, and immediately push the vulnerability processing policy file to the terminal device, so that the vulnerability processing efficiency is improved.
In one possible example, the determining, by the first electronic device, whether the vulnerability handling policy file satisfies a preset condition includes: the first electronic equipment judges whether the vulnerability processing strategy file is encrypted or not; if the vulnerability processing strategy file is encrypted, the first electronic equipment decrypts the vulnerability processing strategy file and judges whether the vulnerability processing strategy file is complete or not; if the vulnerability processing strategy file is complete, carrying out a new allow check on the vulnerability processing strategy file to obtain a check result; and if the checking result meets a preset checking result, determining that the vulnerability handling strategy file meets a preset condition.
Wherein the determining, by the first electronic device, whether the vulnerability handling policy file is encrypted comprises: the first electronic equipment executes opening operation on the vulnerability processing strategy file; and if the vulnerability processing strategy file is detected to be opened only by decryption, determining that the vulnerability processing strategy file is encrypted.
The first electronic device decrypts the vulnerability handling policy file in an implementation manner that: the first electronic equipment sends a decryption request of the vulnerability handling policy file to the server; the first electronic equipment acquires a file password from the server; and the first electronic equipment decrypts the vulnerability handling strategy file through the file password. It should be noted that, if the password of the vulnerability processing policy file is tampered with, the first electronic device cannot decrypt the vulnerability processing policy file through the file password, and at this time, it is determined that the vulnerability processing policy file is tampered with.
As can be seen, in this example, if the electronic device can decrypt the encrypted vulnerability processing policy file, the security of the vulnerability processing policy file is further determined.
In this possible embodiment, the vulnerability handling policy file is obtained by the server executing the following operations: acquiring vulnerability information; generating a first file according to the vulnerability information, wherein the first file comprises a new allow rule; adding a preset file to the first file for verification to obtain a second file; and encrypting the second file to obtain the vulnerability handling strategy file.
Optionally, before the server encrypts the second file, the method further includes: the server determines terminal equipment corresponding to the vulnerability information; the server determines the security level of the electronic equipment corresponding to the vulnerability information; and when the server determines that the security level of the electronic equipment is high, the server determines to encrypt the vulnerability handling policy file. The security level can be set by a user, and the terminal equipment with the high security level is encrypted.
Therefore, in this example, the server can obtain the vulnerability processing policy file according to the vulnerability information and the electronic device corresponding to the vulnerability information, so as to further improve the security of vulnerability processing.
In one possible example, the vulnerability handling policy file includes a vulnerability handling policy, the vulnerability handling policy including: the first electronic equipment monitors a program corresponding to the vulnerability; and if the program executes the right-offering operation, the first electronic equipment limits the right-offering action.
For example, if the Program corresponding to the bug is a backdoor Program critical Program a, the unauthorized user will raise the authority through action C to resource B by using the backdoor Program, and when detecting that the backdoor Program has the authority raised through action C to resource B, the action C is restricted.
As can be seen, in this example, the first electronic device can dynamically install the vulnerability handling policy file, and immediately monitor the corresponding vulnerability.
Referring to fig. 3, fig. 3 is a schematic flowchart of another vulnerability processing method provided in the embodiment of the present application, which is applied to a server connected to a first electronic device, and as shown in fig. 3, the vulnerability processing method includes:
s201, a server acquires vulnerability information;
s202, the server generates a vulnerability processing strategy file according to the vulnerability information, wherein the vulnerability processing strategy file is used for indicating the electronic equipment corresponding to the vulnerability information to seal corresponding vulnerabilities;
s203, the server sends the vulnerability handling strategy file to the corresponding electronic equipment.
It can be seen that, in the embodiment of the present application, the server first obtains the vulnerability information, then generates a vulnerability processing policy file according to the vulnerability information, where the vulnerability processing policy file is used to indicate the electronic device corresponding to the vulnerability information to block a corresponding vulnerability, and finally sends the vulnerability processing policy file to the corresponding electronic device. Therefore, the server can obtain the vulnerability information, generate a corresponding vulnerability processing strategy according to the vulnerability information, and immediately send the vulnerability processing strategy to the corresponding electronic equipment, so that the corresponding electronic equipment processes the corresponding vulnerability according to the vulnerability processing strategy file, the vulnerability processing effectiveness is favorably improved, and the safety of the electronic equipment is further improved.
In one possible example, the server generates an vulnerability handling policy file according to the vulnerability information, including: the server generates a first file according to the vulnerability information, wherein the first file comprises a new allow rule; and the server adds a preset file to the first file for verification to obtain the vulnerability handling strategy file.
In one possible example, the server generates an vulnerability handling policy file according to the vulnerability information, including: the server generates a first file according to the vulnerability information, wherein the first file comprises a new allow rule; the server adds a preset file to the first file for verification to obtain a second file; and the server encrypts the second file to obtain the vulnerability processing strategy file.
In one possible example, before the server encrypts the second file, the method further comprises: the server determines terminal equipment corresponding to the vulnerability information; the server determines the security level of the electronic equipment corresponding to the vulnerability information; and when the server determines that the security level of the corresponding electronic equipment is high, the server determines to encrypt the vulnerability handling policy file.
In one possible example, the vulnerability handling policy file includes a vulnerability handling policy, the vulnerability handling policy including: the corresponding electronic equipment monitors a program corresponding to the vulnerability; and if the program executes the right-offering operation, the corresponding electronic equipment limits the right-offering action.
Referring to fig. 4 in accordance with the embodiment shown in fig. 2, fig. 4 is a schematic structural diagram of an electronic device 400 provided in an embodiment of the present application, as shown in fig. 4, the electronic device 400 includes an application processor 410, a memory 420, a communication interface 430, and one or more programs 421, where the one or more programs 421 are stored in the memory 420 and configured to be executed by the application processor 410, and the one or more programs 421 include instructions for performing the following steps;
when a vulnerability processing strategy file is detected, downloading the vulnerability processing strategy file, wherein the vulnerability processing strategy file is generated by the server according to vulnerability information of the first electronic equipment;
determining whether the vulnerability processing policy file meets a preset condition, wherein the preset condition is used for restricting the security and effectiveness of the vulnerability policy file;
if yes, installing the vulnerability processing strategy file;
and plugging the loophole according to the loophole processing strategy file.
It can be seen that, in the embodiment of the application, the electronic device first downloads the vulnerability processing policy file when detecting the vulnerability processing policy file, and installs the vulnerability processing policy file when determining that the vulnerability processing policy file meets the preset conditions, where the preset conditions are used to constrain the security and effectiveness of the vulnerability policy file, and finally, seals the vulnerability according to the vulnerability processing policy file. Therefore, the electronic equipment can dynamically acquire the vulnerability processing strategy file, and process the corresponding vulnerability according to the vulnerability processing strategy file after ensuring the security and the effectiveness of the vulnerability processing strategy file, so that the vulnerability processing effectiveness can be improved, and the security of the electronic equipment can be further improved.
In one possible example, in the determining whether the vulnerability handling policy file meets the preset condition, the instructions of the one or more programs 421 are specifically configured to perform the following steps: judging whether the vulnerability processing strategy file is complete or not; if the vulnerability processing strategy file is complete, carrying out a new allow check on the vulnerability processing strategy file to obtain a check result; and if the checking result meets a preset checking result, determining that the vulnerability handling strategy file meets a preset condition.
In one possible example, the vulnerability handling policy file is obtained by the server performing the following operations: acquiring vulnerability information; generating a first file according to the vulnerability information, wherein the first file comprises a new allow rule; and adding a preset file to the first file for verification to obtain the vulnerability handling strategy file.
In one possible example, in terms of determining whether the vulnerability handling policy file meets the preset condition, the instructions of the one or more programs 421 are specifically configured to perform the following steps: judging whether the vulnerability processing strategy file is encrypted or not; if the vulnerability processing strategy file is encrypted, decrypting the vulnerability processing strategy file and judging whether the vulnerability processing strategy file is complete or not; if the vulnerability processing strategy file is complete, carrying out a new allow check on the vulnerability processing strategy file to obtain a check result; and if the checking result meets a preset checking result, determining that the vulnerability handling strategy file meets a preset condition.
In one possible example, the vulnerability handling policy file is obtained by the server performing the following operations: acquiring vulnerability information; generating a first file according to the vulnerability information, wherein the first file comprises a new allow rule; adding a preset file to the first file for verification to obtain a second file; and encrypting the second file to obtain the vulnerability handling strategy file.
In one possible example, the vulnerability handling policy file includes a vulnerability handling policy, the vulnerability handling policy including: monitoring a program corresponding to the vulnerability; and if the program executes the right-offering operation, limiting the right-offering action.
In one possible example, the one or more programs 421 further include instructions for performing the steps of: when a vulnerability processing strategy file is detected, before the vulnerability processing strategy file is downloaded, and when a local terminal is detected to have a vulnerability, acquiring vulnerability information and a vulnerability processing request of the vulnerability; and sending the vulnerability information and the vulnerability processing request to the server.
Referring to fig. 5 in accordance with the embodiment shown in fig. 3, fig. 5 is a schematic structural diagram of a server 500 provided in an embodiment of the present application, and as shown in fig. 5, the server 500 includes an application processor 510, a memory 520, a communication interface 530, and one or more programs 521, where the one or more programs 521 are stored in the memory 520 and configured to be executed by the application processor 510, and the one or more programs 521 include instructions for performing the following steps;
acquiring vulnerability information;
generating a vulnerability processing strategy file according to the vulnerability information, wherein the vulnerability processing strategy file is used for indicating the electronic equipment corresponding to the vulnerability information to seal the corresponding vulnerability;
and sending the vulnerability handling strategy file to the corresponding electronic equipment.
It can be seen that, in the embodiment of the present application, the server first obtains the vulnerability information, then generates a vulnerability processing policy file according to the vulnerability information, where the vulnerability processing policy file is used to indicate the electronic device corresponding to the vulnerability information to block a corresponding vulnerability, and finally sends the vulnerability processing policy file to the corresponding electronic device. Therefore, the server can obtain the vulnerability information, generate a corresponding vulnerability processing strategy according to the vulnerability information, and immediately send the vulnerability processing strategy to the corresponding electronic equipment, so that the corresponding electronic equipment processes the corresponding vulnerability according to the vulnerability processing strategy file, the vulnerability processing effectiveness is favorably improved, and the safety of the electronic equipment is further improved.
In one possible example, in terms of the server generating the vulnerability handling policy file according to the vulnerability information, the instructions in the one or more programs 521 are specifically configured to: generating a first file according to the vulnerability information, wherein the first file comprises a new allow rule; and adding a preset file to the first file for verification to obtain the vulnerability handling strategy file.
In one possible example, in terms of the server generating the vulnerability handling policy file according to the vulnerability information, the instructions in the one or more programs 521 are specifically configured to: generating a first file according to the vulnerability information, wherein the first file comprises a new allow rule; adding a preset file to the first file for verification to obtain a second file; and encrypting the second file to obtain the vulnerability handling strategy file.
In one possible example, the one or more programs 521 further include instructions for performing the steps of: before the server encrypts the second file, determining terminal equipment corresponding to the vulnerability information; determining the security level of the electronic equipment corresponding to the vulnerability information; and when the security level of the corresponding electronic equipment is determined to be high, encrypting the vulnerability handling strategy file is determined.
In one possible example, the vulnerability handling policy file includes a vulnerability handling policy, the vulnerability handling policy including: the corresponding electronic equipment monitors a program corresponding to the vulnerability; and if the program executes the right-offering operation, the corresponding electronic equipment limits the right-offering action.
Referring to fig. 6 in accordance with the foregoing embodiment 2, fig. 6 is a block diagram of functional units of a vulnerability processing apparatus according to an embodiment of the present application, and as shown in fig. 6, the vulnerability processing apparatus 600 is applied to a first electronic device, the first electronic device is connected to a server and includes a processing unit 601 and a communication unit 602, wherein,
the processing unit 601 is configured to obtain vulnerability information through the communication unit 602; generating a vulnerability processing strategy file according to the vulnerability information, wherein the vulnerability processing strategy file is used for indicating the electronic equipment corresponding to the vulnerability information to seal the corresponding vulnerability; and sending the vulnerability handling strategy file to the corresponding electronic equipment.
The apparatus 600 may further include a storage unit 603 for storing program codes and data of the electronic device. The processing unit 601 may be a processor, the communication unit 602 may be an internal communication interface, and the storage unit 603 may be a memory.
It can be seen that, in the embodiment of the application, the electronic device first downloads the vulnerability processing policy file when detecting the vulnerability processing policy file, and installs the vulnerability processing policy file when determining that the vulnerability processing policy file meets the preset conditions, where the preset conditions are used to constrain the security and effectiveness of the vulnerability policy file, and finally, seals the vulnerability according to the vulnerability processing policy file. Therefore, the electronic equipment can dynamically acquire the vulnerability processing strategy file, and process the corresponding vulnerability according to the vulnerability processing strategy file after ensuring the security and the effectiveness of the vulnerability processing strategy file, so that the vulnerability processing effectiveness can be improved, and the security of the electronic equipment can be further improved.
In a possible example, in terms of determining whether the vulnerability handling policy file satisfies a preset condition, the processing unit 601 is specifically configured to: judging whether the vulnerability processing strategy file is complete or not; if the vulnerability processing strategy file is complete, carrying out a new allow check on the vulnerability processing strategy file to obtain a check result; and if the checking result meets a preset checking result, determining that the vulnerability handling strategy file meets a preset condition.
In one possible example, the vulnerability handling policy file is obtained by the server performing the following operations: acquiring vulnerability information; generating a first file according to the vulnerability information, wherein the first file comprises a new allow rule; and adding a preset file to the first file for verification to obtain the vulnerability handling strategy file.
In a possible example, in terms of determining whether the vulnerability handling policy file satisfies a preset condition, the processing unit 601 is specifically configured to: judging whether the vulnerability processing strategy file is encrypted or not; if the vulnerability processing strategy file is encrypted, decrypting the vulnerability processing strategy file and judging whether the vulnerability processing strategy file is complete or not; if the vulnerability processing strategy file is complete, carrying out a new allow check on the vulnerability processing strategy file to obtain a check result; and if the checking result meets a preset checking result, determining that the vulnerability handling strategy file meets a preset condition.
In one possible example, the vulnerability handling policy file is obtained by the server performing the following operations: acquiring vulnerability information; generating a first file according to the vulnerability information, wherein the first file comprises a new allow rule; adding a preset file to the first file for verification to obtain a second file; and encrypting the second file to obtain the vulnerability handling strategy file.
In one possible example, the vulnerability handling policy file includes a vulnerability handling policy, the vulnerability handling policy including: monitoring a program corresponding to the vulnerability; and if the program executes the right-offering operation, limiting the right-offering action.
In one possible example, the processing unit 601 is further configured to: when a vulnerability processing strategy file is detected, before the vulnerability processing strategy file is downloaded, and when a local terminal is detected to have a vulnerability, acquiring vulnerability information and a vulnerability processing request of the vulnerability; and sending the vulnerability information and the vulnerability processing request to the server.
Referring to fig. 7, fig. 7 is a block diagram of functional units of a vulnerability processing apparatus according to an embodiment of the present application, and as shown in fig. 7, the vulnerability processing apparatus 700 is applied to a server, and the server is connected to an electronic device; comprising a processing unit 701 and a communication unit 702, wherein,
the processing unit 701 is configured to download, through the communication unit 702, a vulnerability processing policy file when the vulnerability processing policy file is detected, where the vulnerability processing policy file is generated by the server according to vulnerability information of the first electronic device; the vulnerability processing method comprises the steps of determining whether the vulnerability processing strategy file meets preset conditions or not, wherein the preset conditions are used for restricting the security and the effectiveness of the vulnerability processing strategy file; if yes, installing the vulnerability processing strategy file; and the method is used for plugging the vulnerability according to the vulnerability processing strategy file.
The apparatus 700 may further include a storage unit 703 for storing program codes and data of the electronic device. The processing unit 701 may be a processor, the communication unit 702 may be an internal communication interface, and the storage unit 703 may be a memory.
It can be seen that, in the embodiment of the present application, the server first obtains the vulnerability information, then generates a vulnerability processing policy file according to the vulnerability information, where the vulnerability processing policy file is used to indicate the electronic device corresponding to the vulnerability information to block a corresponding vulnerability, and finally sends the vulnerability processing policy file to the corresponding electronic device. Therefore, the server can obtain the vulnerability information, generate a corresponding vulnerability processing strategy according to the vulnerability information, and immediately send the vulnerability processing strategy to the corresponding electronic equipment, so that the corresponding electronic equipment processes the corresponding vulnerability according to the vulnerability processing strategy file, the vulnerability processing effectiveness is favorably improved, and the safety of the electronic equipment is further improved.
In a possible example, in terms of the server generating the vulnerability handling policy file according to the vulnerability information, the processing unit 701 is specifically configured to: generating a first file according to the vulnerability information, wherein the first file comprises a new allow rule; and adding a preset file to the first file for verification to obtain the vulnerability handling strategy file.
In a possible example, in terms of the server generating the vulnerability handling policy file according to the vulnerability information, the processing unit 701 is specifically configured to: generating a first file according to the vulnerability information, wherein the first file comprises a new allow rule; adding a preset file to the first file for verification to obtain a second file; and encrypting the second file to obtain the vulnerability handling strategy file.
In one possible example, the processing unit 701 is further configured to: before the server encrypts the second file, determining terminal equipment corresponding to the vulnerability information; determining the security level of the electronic equipment corresponding to the vulnerability information; and when the security level of the corresponding electronic equipment is determined to be high, encrypting the vulnerability handling strategy file is determined.
In one possible example, the vulnerability handling policy file includes a vulnerability handling policy, the vulnerability handling policy including: the corresponding electronic equipment monitors a program corresponding to the vulnerability; and if the program executes the right-offering operation, the corresponding electronic equipment limits the right-offering action.
Embodiments of the present application also provide a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, the computer program causes a computer to execute part or all of the steps of any one of the methods described in the method embodiments, and the computer includes an electronic device.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as recited in the method embodiments. The computer program product may be a software installation package, said computer comprising electronic means.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-only memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash memory disks, Read-only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The electronic device according to the embodiments of the present application may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of User Equipment (UE), Mobile Stations (MS), terminals (terminal), and so on.

Claims (14)

1. The vulnerability processing method is applied to first electronic equipment in a vulnerability processing system, the vulnerability processing system comprises the first electronic equipment and a server, and the first electronic equipment and the server are in communication connection, and the method comprises the following steps:
when a vulnerability processing strategy file is detected, downloading the vulnerability processing strategy file, wherein the vulnerability processing strategy file is generated by the server according to vulnerability information of the first electronic equipment;
determining whether the vulnerability processing policy file meets a preset condition, wherein the preset condition is used for restricting the security and effectiveness of the vulnerability policy file;
if yes, installing the vulnerability processing strategy file;
and plugging the loophole according to the loophole processing strategy file.
2. The method of claim 1, wherein the determining whether the vulnerability handling policy file meets a preset condition comprises:
judging whether the vulnerability processing strategy file is complete or not;
if the vulnerability processing strategy file is complete, carrying out a new allow check on the vulnerability processing strategy file to obtain a check result;
and if the checking result meets a preset checking result, determining that the vulnerability handling strategy file meets a preset condition.
3. The method of claim 2, wherein the vulnerability handling policy file is obtained by the server performing the following operations:
acquiring vulnerability information;
generating a first file according to the vulnerability information, wherein the first file comprises a new allow rule;
and adding a preset file to the first file for verification to obtain the vulnerability handling strategy file.
4. The method of claim 1, wherein the determining whether the vulnerability handling policy file meets a preset condition comprises:
judging whether the vulnerability processing strategy file is encrypted or not;
if the vulnerability processing strategy file is encrypted, decrypting the vulnerability processing strategy file and judging whether the vulnerability processing strategy file is complete or not;
if the vulnerability processing strategy file is complete, carrying out a new allow check on the vulnerability processing strategy file to obtain a check result;
and if the checking result meets a preset checking result, determining that the vulnerability handling strategy file meets a preset condition.
5. The method of claim 4, wherein the vulnerability handling policy file is obtained by the server performing the following operations:
acquiring vulnerability information;
generating a first file according to the vulnerability information, wherein the first file comprises a new allow rule;
adding a preset file to the first file for verification to obtain a second file;
and encrypting the second file to obtain the vulnerability handling strategy file.
6. The method of any of claims 1-5, wherein the vulnerability handling policy file comprises a vulnerability handling policy, the vulnerability handling policy comprising:
monitoring a program corresponding to the vulnerability;
and if the program executes the right-offering operation, limiting the right-offering action.
7. The method according to any one of claims 1-5, wherein before downloading the vulnerability handling policy file when the vulnerability handling policy file is detected, the method further comprises:
when detecting that a local terminal has a bug, acquiring bug information and a bug processing request of the bug;
and sending the vulnerability information and the vulnerability processing request to the server.
8. The vulnerability processing method is applied to a server in a vulnerability processing system, the vulnerability processing system comprises the first electronic device and the server, and the first electronic device is in communication connection with the server, and the method comprises the following steps:
acquiring vulnerability information;
generating a vulnerability processing strategy file according to the vulnerability information, wherein the vulnerability processing strategy file is used for indicating the electronic equipment corresponding to the vulnerability information to seal the corresponding vulnerability;
and sending the vulnerability handling strategy file to the corresponding electronic equipment.
9. An apparatus for vulnerability handling, wherein a first electronic device in a vulnerability handling system, the vulnerability handling system comprising the first electronic device and a server, the first electronic device and the server are communicatively connected, the apparatus comprising: a processing unit and a communication unit, wherein,
the processing unit is used for downloading the vulnerability processing strategy file through the communication unit when the vulnerability processing strategy file is detected, wherein the vulnerability processing strategy file is generated by the server according to vulnerability information of the first electronic device; the vulnerability processing method comprises the steps of determining whether the vulnerability processing strategy file meets preset conditions or not, wherein the preset conditions are used for restricting the security and the effectiveness of the vulnerability processing strategy file; if yes, installing the vulnerability processing strategy file; and the method is used for plugging the vulnerability according to the vulnerability processing strategy file.
10. The vulnerability processing device is applied to a server in a vulnerability processing system, wherein the vulnerability processing system comprises a first electronic device and the server, the first electronic device and the server are in communication connection, and the vulnerability processing device comprises: a processing unit and a communication unit, wherein,
the processing unit is used for acquiring vulnerability information through the communication unit; generating a vulnerability processing strategy file according to the vulnerability information, wherein the vulnerability processing strategy file is used for indicating the electronic equipment corresponding to the vulnerability information to seal the corresponding vulnerability; and sending the vulnerability handling strategy file to the corresponding electronic equipment.
11. The vulnerability processing system is characterized by comprising a first electronic device and a server, wherein the first electronic device is in communication connection with the server;
the first electronic device is configured to perform the steps of the method of any one of claims 1 to 7;
the server is adapted to perform the steps of the method of claim 8.
12. An electronic device comprising a processor, a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps in the method of any of claims 1-7.
13. A server comprising a processor, a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps in the method of claim 8.
14. A computer-readable storage medium, characterized in that a computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method according to any one of claims 1-8.
CN201910956321.1A 2019-10-09 2019-10-09 Vulnerability processing method and related product Withdrawn CN112632553A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910956321.1A CN112632553A (en) 2019-10-09 2019-10-09 Vulnerability processing method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910956321.1A CN112632553A (en) 2019-10-09 2019-10-09 Vulnerability processing method and related product

Publications (1)

Publication Number Publication Date
CN112632553A true CN112632553A (en) 2021-04-09

Family

ID=75283386

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910956321.1A Withdrawn CN112632553A (en) 2019-10-09 2019-10-09 Vulnerability processing method and related product

Country Status (1)

Country Link
CN (1) CN112632553A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923170A (en) * 2021-09-30 2022-01-11 深信服科技股份有限公司 Application identification management method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007004291A (en) * 2005-06-21 2007-01-11 Mitsubishi Electric Corp Fragility diagnostic method, fragility diagnostic device to be used for the same, fragility diagnostic program and recording medium with its program recorded, diagnostic report preparing device, diagnostic report preparing program and recording medium with its program recorded
US20080104665A1 (en) * 2006-10-31 2008-05-01 Microsoft Corporation Analyzing access control configurations
CN102156649A (en) * 2011-03-01 2011-08-17 奇智软件(北京)有限公司 Patch installation method and device thereof
AU2012200003A1 (en) * 2012-01-03 2013-07-18 Bryan P. Chapman Multiface document
CN105468980A (en) * 2015-11-16 2016-04-06 华为技术有限公司 Security control method, device and system
WO2019004503A1 (en) * 2017-06-29 2019-01-03 라인 가부시키가이샤 Application vulnerability detection method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007004291A (en) * 2005-06-21 2007-01-11 Mitsubishi Electric Corp Fragility diagnostic method, fragility diagnostic device to be used for the same, fragility diagnostic program and recording medium with its program recorded, diagnostic report preparing device, diagnostic report preparing program and recording medium with its program recorded
US20080104665A1 (en) * 2006-10-31 2008-05-01 Microsoft Corporation Analyzing access control configurations
CN102156649A (en) * 2011-03-01 2011-08-17 奇智软件(北京)有限公司 Patch installation method and device thereof
AU2012200003A1 (en) * 2012-01-03 2013-07-18 Bryan P. Chapman Multiface document
CN105468980A (en) * 2015-11-16 2016-04-06 华为技术有限公司 Security control method, device and system
WO2019004503A1 (en) * 2017-06-29 2019-01-03 라인 가부시키가이샤 Application vulnerability detection method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
FANGLU GUO;YANG YU: "Automated and vulnerability assessment", 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pages 159 *
刘莉: "网络漏洞扫描器的设计与实现", 信息科技, no. 6, pages 20 - 30 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923170A (en) * 2021-09-30 2022-01-11 深信服科技股份有限公司 Application identification management method and system

Similar Documents

Publication Publication Date Title
US10503904B1 (en) Ransomware detection and mitigation
Sufatrio et al. Securing android: a survey, taxonomy, and challenges
EP2425367B1 (en) Method and apparatus for improving code and data signing
Shabtai et al. Google android: A comprehensive security assessment
US9058504B1 (en) Anti-malware digital-signature verification
KR101503785B1 (en) Method And Apparatus For Protecting Dynamic Library
JP2019505887A (en) Mobile device with reliable execution environment
EP3270318B1 (en) Dynamic security module terminal device and method for operating same
CN109284585B (en) Script encryption method, script decryption operation method and related device
CN104751049A (en) Application program installing method and mobile terminal
CN108229144B (en) Verification method of application program, terminal equipment and storage medium
CN106548065B (en) Application program installation detection method and device
CN109918948A (en) APK integrity checking method, computer program based on national secret algorithm SM3
Zheng et al. Security analysis of modern mission critical android mobile applications
CN112613037A (en) Code checking method and device
CN107257282B (en) Code full-package encryption method based on RC4 algorithm
CN112231702A (en) Application protection method, device, equipment and medium
Lim et al. Structural analysis of packing schemes for extracting hidden codes in mobile malware
CN115640572A (en) Safety detection and reinforcement method for iPhone end sandbox application
KR101451323B1 (en) Application security system, security server, security client apparatus, and recording medium
CN112632553A (en) Vulnerability processing method and related product
CN107766061A (en) The installation method and installation system of a kind of Android application program
CN110619194B (en) Upgrade package encryption and decryption methods and devices
KR101638257B1 (en) Method for protecting source code of application and apparatus for performing the method
CN115964681A (en) Generation method of certificate file of target application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210409