CN114528205A - Android-based application program analysis method, device and medium - Google Patents

Android-based application program analysis method, device and medium Download PDF

Info

Publication number
CN114528205A
CN114528205A CN202210079572.8A CN202210079572A CN114528205A CN 114528205 A CN114528205 A CN 114528205A CN 202210079572 A CN202210079572 A CN 202210079572A CN 114528205 A CN114528205 A CN 114528205A
Authority
CN
China
Prior art keywords
android system
application program
report
calling
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202210079572.8A
Other languages
Chinese (zh)
Inventor
李彬
李锐
张晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Inspur Science Research Institute Co Ltd
Original Assignee
Shandong Inspur Science Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Inspur Science Research Institute Co Ltd filed Critical Shandong Inspur Science Research Institute Co Ltd
Priority to CN202210079572.8A priority Critical patent/CN114528205A/en
Publication of CN114528205A publication Critical patent/CN114528205A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/3624Software debugging by performing operations on the source code, e.g. via a compiler
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses an android-based application program analysis method, equipment and a medium, wherein the method comprises the following steps: acquiring an open source code of the android system; recompiling the open source code to record the calling state of a preset target in the android system; determining terminal equipment to which the recompiled android system is applied; compiling a report generating program and installing the report generating program in the terminal equipment; and installing the application program to be analyzed in the terminal equipment, and generating an analysis report aiming at the application program through the calling state recorded by the report generating program after the application program runs. By recompiling the android system and compiling the corresponding report generation program, the calling state of the preset target can be recorded, so that a user can timely and accurately acquire whether application programs such as malicious monitoring and illegal information acquisition exist in the terminal equipment of the user, and the protection of the privacy of the user is improved.

Description

Android-based application program analysis method, device and medium
Technical Field
The application relates to the field of computers, in particular to an android-based application program analysis method, equipment and medium.
Background
The android system source code (AOSP) uses the Apache 2.0 open source protocol, and can be modified and released or sold as an open source or commercial product when needed.
With continuous attention to data security issues, android software providers have also continuously updated user usage protocols, making commitments to the protection issues of user personal data. However, at present, no corresponding detection software exists, and the behavior of illegally acquiring user data is analyzed and detected, so that it is difficult for a user to determine whether the android program in the mobile phone has other illegal behaviors such as malicious monitoring.
Disclosure of Invention
In order to solve the above problem, the present application provides an android-based application program analysis method, including: acquiring an open source code of the android system; recompiling the open source code to record the calling state of a preset target in the android system; determining the terminal equipment of the android system after recompilation is applied; writing a report generating program and installing the report generating program in the terminal equipment; and installing an application program to be analyzed in the terminal equipment, and generating an analysis report aiming at the application program through the calling state recorded by the report generating program after the application program runs.
In one example, the recording the call state of the preset target in the android system specifically includes: recording the calling state of a sensitive interface in the android system, wherein the sensitive interface can call a corresponding module in the terminal equipment to acquire the privacy data of the user in the terminal equipment.
In one example, the sensitive interface comprises at least one of a camera interface, a microphone interface, an address book interface, a geographical location interface, a bluetooth interface, a read peripheral information interface, a network usage interface; the calling state comprises at least one of an input parameter and a return value.
In one example, writing a report generator and installing the report generator in the terminal device specifically includes: constructing an android project based on an integrated environment of an android programming language; writing a report generating program in the android project so that the report generating program can read the calling state of a preset target in the android system.
In one example, after the application program runs, generating an analysis report for the application program through the call state recorded by the report generator specifically includes: determining each running state of the application program in the running process; and for each running state, determining a corresponding partial calling state in the running state, and generating an analysis report for the application program in the running state according to the partial calling state.
In an example, the generating, according to the partial call state, an analysis report for the application program in the running state specifically includes: determining the user participation level corresponding to the running state; and generating an analysis report aiming at the application program in the running state according to the partial calling state, and generating an analysis result in the analysis report, wherein the lower the participation level of the user is, the higher the severity level of the analysis result is.
In one example, the recording the call state of the sensitive interface in the android system specifically includes: determining the calling frequency of all sensitive interfaces in the android system, wherein the calling frequency is generated based on the user requirement; sorting all the sensitive interfaces according to the calling frequency, and selecting a plurality of calling frequencies which are sorted at the top, wherein the lower the calling frequency is, the higher the sorting is; and recording the calling states of the selected calling frequencies.
In one example, the recompiling the open source code to record a calling state of a preset target in the android system specifically includes: modifying the implementation of the preset target in the open source code to add a record function capable of being called, so that the calling state of the preset target in the android system can be recorded; the determining of the terminal device to which the recompiled android system is applied specifically includes: and generating a flashing package according to the modified open source code, and flashing the recompiled android system into terminal equipment through the flashing package.
On the other hand, this application has also provided an android-based application program analysis device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to: acquiring an open source code of the android system; recompiling the open source code to record the calling state of a preset target in the android system; determining the terminal equipment of the android system after recompilation is applied; writing a report generating program and installing the report generating program in the terminal equipment; and installing an application program to be analyzed in the terminal equipment, and generating an analysis report aiming at the application program through the calling state recorded by the report generating program after the application program runs.
In another aspect, the present application further provides a non-volatile computer storage medium storing computer-executable instructions configured to: acquiring an open source code of the android system; recompiling the open source code to record the calling state of a preset target in the android system; determining the terminal equipment of the android system after recompilation is applied; writing a report generating program and installing the report generating program in the terminal equipment; and installing an application program to be analyzed in the terminal equipment, and generating an analysis report aiming at the application program through the calling state recorded by the report generating program after the application program runs.
The application program analysis method based on android can bring the following beneficial effects:
by recompiling the android system and compiling the corresponding report generation program, the calling state of the preset target can be recorded, so that a user can timely and accurately acquire whether application programs such as malicious monitoring and illegal information acquisition exist in the terminal equipment of the user, and the protection of the privacy of the user is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flow chart of an android-based application analysis method in an embodiment of the present application;
fig. 2 is a schematic diagram of an android-based application analysis device in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
As shown in fig. 1, an embodiment of the present application provides an android-based application program analysis method, including:
s101: and acquiring an open source code of the android system.
Android (Android) is a Linux kernel (containing no GNU components) based operating system of free and Open source code, also called Open source code (Open source code) or source code disclosure, which refers to a software distribution model. And the open source code of the android system can be downloaded and acquired by selecting the open source code of the android system of the required version on a corresponding website based on the requirements of the user.
S102: and re-compiling the open source code to record the calling state of a preset target in the android system.
Corresponding compiling software can be used in the compiling process, the preset target can be set based on the requirements of the user, and generally speaking, if the application program wants to acquire the information of the user, the application program needs to call the related target of the android system, and then the related information of the user can be acquired. At the moment, the preset target is set according to the requirement of the user, so that the android system can record and store the calling state of the preset target.
Specifically, the preset target may be a corresponding sensitive interface, and the sensitive interface may call a corresponding module in the terminal device to obtain the private data of the user in the terminal device. For example, the camera interface, the microphone interface, the address book interface, the geographic location interface, the bluetooth interface, the interface for reading peripheral information, the network use interface, etc. may select a part of the interfaces for recording based on the selection of the user through the camera interface, and the recorded call state may include data such as input parameters, return values, etc.
Further, when the sensitive interfaces are selected, the calling frequencies of all the sensitive interfaces can be predetermined, of course, the calling frequencies are generated based on the user requirements and are not generated by illegal behaviors, and the acquisition range can be terminal equipment of a user or whole equipment in a certain area range or a user group. And sequencing according to the calling frequency, wherein the lower the calling frequency is, the earlier the sequencing is, and then selecting a plurality of calling frequencies which are the most advanced to record the calling states of the calling frequencies. Generally speaking, the lower the frequency of calls, the less software that requires the interface, which may not be easily called because of the comparison kernel, and which, once called, is easily lost to the user and therefore needs to be recorded.
S103: and determining the terminal equipment to which the recompiled android system is applied.
In the process of recompiling the android system, the implementation of the preset target in the open source code is modified, so that a record function capable of being called is added, the calling state of the preset target in the android system can be recorded, at the moment, a flashing package is generated according to the modified open source code, and the recompiled android system is flashed into terminal equipment (such as a smart phone and a tablet personal computer) through the flashing package.
S104: writing a report generating program and installing the report generating program in the terminal device.
Firstly, an android project can be constructed based on an integrated environment (such as android idea) of an android programming language, and then a report generating program is written in the android project, so that the report generating program can read the calling state of a preset target in an android system, namely the writing of the report generating program is completed.
S105: and installing an application program to be analyzed in the terminal equipment, and generating an analysis report aiming at the application program through the calling state recorded by the report generating program after the application program runs.
Prior to actual use, tests may be performed to determine if the android system is stable, if the report generation procedure is accurate, and so forth. Since the android system has been recompiled, the report generator can record the call state, thereby generating an analysis report for the application.
By recompiling the android system and compiling the corresponding report generation program, the calling state of the preset target can be recorded, so that a user can timely and accurately acquire whether application programs such as malicious monitoring and illegal information acquisition exist in the terminal equipment of the user, and the protection of the privacy of the user is improved.
In one embodiment, in the process of generating the analysis report, the running states of the application program during running may be determined first, for example, the running states may include a foreground state, a background state, a dark screen state, and the like. Then, for each running state, a corresponding part of the calling states in the running state is determined, and all the calling states are not required to be collected, so that the use of computing resources of the system is reduced, for example, when the running state is not networked, the record of the network use interface is not required to be collected. And then generating an analysis report aiming at the application program in the running state according to the partial calling state.
Further, when the analysis report is generated, a user participation level corresponding to the running state may be determined, where the user participation level indicates a level at which a user can initiate participation in the application program in the current running state, and a higher level indicates a higher availability of the user. For example, the running state may include foreground, background, and dark screen, and the user participation levels thereof are foreground > background > dark screen, respectively. Then, when generating the analysis report, an analysis result may be generated therein, and if the user participation level is low in the running state, but the calling state indicates that the preset target is frequently called, it is highly likely that it is an illegal call made by the application itself. Thus, the lower the user engagement level, the higher the severity level of the analysis results.
As shown in fig. 2, an embodiment of the present application further provides an android-based application analysis device, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to perform:
acquiring an open source code of the android system;
recompiling the open source code to record the calling state of a preset target in the android system;
determining the terminal equipment of the android system after recompilation is applied;
writing a report generating program and installing the report generating program in the terminal equipment;
and installing an application program to be analyzed in the terminal equipment, and generating an analysis report aiming at the application program through the calling state recorded by the report generating program after the application program runs.
An embodiment of the present application further provides a non-volatile computer storage medium storing computer-executable instructions, where the computer-executable instructions are configured to:
acquiring an open source code of the android system;
recompiling the open source code to record the calling state of a preset target in the android system;
determining the terminal equipment of the android system after recompilation is applied;
writing a report generating program and installing the report generating program in the terminal equipment;
and installing an application program to be analyzed in the terminal equipment, and generating an analysis report aiming at the application program through the calling state recorded by the report generating program after the application program runs.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device and media embodiments, the description is relatively simple, as it is substantially similar to the method embodiments, and reference may be made to some description of the method embodiments for relevant points.
The device and the medium provided by the embodiment of the application correspond to the method one to one, so the device and the medium also have the similar beneficial technical effects as the corresponding method, and the beneficial technical effects of the method are explained in detail above, so the beneficial technical effects of the device and the medium are not repeated herein.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of the present application shall be included in the scope of the claims of the present application.

Claims (10)

1. An android-based application program analysis method is characterized by comprising the following steps:
acquiring an open source code of the android system;
recompiling the open source code to record the calling state of a preset target in the android system;
determining the terminal equipment of the android system after recompilation is applied;
writing a report generating program and installing the report generating program in the terminal equipment;
and installing an application program to be analyzed in the terminal equipment, and generating an analysis report aiming at the application program through the calling state recorded by the report generating program after the application program runs.
2. The method of claim 1, wherein the recording of the invocation state of the preset target in the android system specifically comprises:
recording the calling state of a sensitive interface in the android system, wherein the sensitive interface can call a corresponding module in the terminal equipment to acquire the privacy data of the user in the terminal equipment.
3. The method of claim 2, wherein the sensitive interface comprises at least one of a camera interface, a microphone interface, a contact list interface, a geographic location interface, a bluetooth interface, a read peripheral information interface, a network usage interface;
the calling state comprises at least one of an input parameter and a return value.
4. The method according to claim 1, wherein writing a report generator and installing the report generator in the terminal device specifically includes:
constructing an android project based on an integrated environment of an android programming language;
writing a report generating program in the android project so that the report generating program can read the calling state of a preset target in the android system.
5. The method according to claim 1, wherein the generating an analysis report for the application program through the call state recorded by the report generator after the application program runs includes:
determining each running state of the application program in the running process;
and for each running state, determining a corresponding partial calling state in the running state, and generating an analysis report for the application program in the running state according to the partial calling state.
6. The method according to claim 5, wherein generating an analysis report for the application program in the running state according to the partial call state specifically includes:
determining the user participation level corresponding to the running state;
and generating an analysis report aiming at the application program in the running state according to the partial calling state, and generating an analysis result in the analysis report, wherein the lower the participation level of the user is, the higher the severity level of the analysis result is.
7. The method of claim 2, wherein the recording of the call state of the sensitive interface in the android system specifically comprises:
determining the calling frequency of all sensitive interfaces in the android system, wherein the calling frequency is generated based on the user requirement;
sorting all the sensitive interfaces according to the calling frequency, and selecting a plurality of calling frequencies which are sorted at the top, wherein the lower the calling frequency is, the higher the sorting is;
and recording the calling states of the selected calling frequencies.
8. The method of claim 1, wherein the recompiling the open source code to record a calling state of a preset target in the android system specifically comprises:
modifying the implementation of the preset target in the open source code to add a record function capable of being called, so that the calling state of the preset target in the android system can be recorded;
the determining of the terminal device to which the recompiled android system is applied specifically includes:
and generating a flashing package according to the modified open source code, and flashing the recompiled android system into terminal equipment through the flashing package.
9. An android-based application analytics device, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to perform:
acquiring an open source code of the android system;
recompiling the open source code to record the calling state of a preset target in the android system;
determining the terminal equipment of the android system after recompilation is applied;
writing a report generating program and installing the report generating program in the terminal equipment;
and installing an application program to be analyzed in the terminal equipment, and generating an analysis report aiming at the application program through the calling state recorded by the report generating program after the application program runs.
10. A non-transitory computer storage medium storing computer-executable instructions, the computer-executable instructions configured to:
acquiring an open source code of the android system;
recompiling the open source code to record the calling state of a preset target in the android system;
determining the terminal equipment of the android system after recompilation is applied;
writing a report generating program and installing the report generating program in the terminal equipment;
and installing an application program to be analyzed in the terminal equipment, and generating an analysis report aiming at the application program through the calling state recorded by the report generating program after the application program runs.
CN202210079572.8A 2022-01-24 2022-01-24 Android-based application program analysis method, device and medium Withdrawn CN114528205A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210079572.8A CN114528205A (en) 2022-01-24 2022-01-24 Android-based application program analysis method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210079572.8A CN114528205A (en) 2022-01-24 2022-01-24 Android-based application program analysis method, device and medium

Publications (1)

Publication Number Publication Date
CN114528205A true CN114528205A (en) 2022-05-24

Family

ID=81620302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210079572.8A Withdrawn CN114528205A (en) 2022-01-24 2022-01-24 Android-based application program analysis method, device and medium

Country Status (1)

Country Link
CN (1) CN114528205A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106598974A (en) * 2015-10-15 2017-04-26 青岛海信移动通信技术股份有限公司 Android system application program data file generation and invocation method and device
CN107678834A (en) * 2017-09-30 2018-02-09 北京梆梆安全科技有限公司 A kind of Android simulator detection method and device based on hardware configuration
CN107729749A (en) * 2017-09-30 2018-02-23 北京梆梆安全科技有限公司 With reference to system information and the Android simulator detection method and device of ardware feature
CN108133139A (en) * 2017-11-28 2018-06-08 西安交通大学 A kind of Android malicious application detecting system compared based on more running environment behaviors
CN111353146A (en) * 2020-05-25 2020-06-30 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for detecting sensitive permission of application program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106598974A (en) * 2015-10-15 2017-04-26 青岛海信移动通信技术股份有限公司 Android system application program data file generation and invocation method and device
CN107678834A (en) * 2017-09-30 2018-02-09 北京梆梆安全科技有限公司 A kind of Android simulator detection method and device based on hardware configuration
CN107729749A (en) * 2017-09-30 2018-02-23 北京梆梆安全科技有限公司 With reference to system information and the Android simulator detection method and device of ardware feature
CN108133139A (en) * 2017-11-28 2018-06-08 西安交通大学 A kind of Android malicious application detecting system compared based on more running environment behaviors
CN111353146A (en) * 2020-05-25 2020-06-30 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for detecting sensitive permission of application program

Similar Documents

Publication Publication Date Title
CN109062582B (en) Encryption method and device for application installation package
CN108121633B (en) Abnormity capturing method and device
US9921827B1 (en) Developing versions of applications based on application fingerprinting
CN107608609B (en) Event object sending method and device
CN108134812B (en) Data processing method and device
CN112417461A (en) Fuzzy test method and system for equipment firmware
CN109710286B (en) System upgrading method, device, equipment and storage medium
CN111831396A (en) Docker software and hardware integration-based delivery method and device
CN109598526B (en) Method and device for analyzing media contribution
CN110046100B (en) Packet testing method, electronic device and medium
CN117241276B (en) Detection tool, detection method, detection system and detection equipment for mobile application
CN109522189B (en) Data monitoring method, device and system
CN112799778A (en) Container application starting method, device and medium
CN110968333B (en) Configuration information replacement method and device, machine-readable storage medium and processor
CN114528205A (en) Android-based application program analysis method, device and medium
CN108133123B (en) Application program identification method and system
CN108108258B (en) Memory leak repairing method and device
CN115730305A (en) Application program detection method and device, nonvolatile storage medium and processor
CN115688102A (en) Window processing method and device, processor and electronic equipment
CN110968377A (en) Interface display processing method and device
CN110502251B (en) Application installation method and device
CN114791884A (en) Test environment construction method and device, storage medium and electronic equipment
CN110633214A (en) Configuration method and device of internal test message
CN110968498B (en) Code checking method and device
CN110333985B (en) Method and device for recording operation information of mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20220524

WW01 Invention patent application withdrawn after publication