期刊文献+

基于状态机的移动应用越权访问漏洞检测方法 被引量:3

Unauthorized access vulnerability detection method based on finite state machines for mobile applications
下载PDF
导出
摘要 为了解决移动应用平台缺乏权限验证所导致的越权访问问题,研究了一种基于状态机的移动应用越权访问漏洞检测方法。该文为不同角色的用户分别建立各自的有限状态机,并合成出移动应用的完整状态机。在此基础上,通过对完整状态机中的每个请求进行动态重构和执行结果分析实现越权访问漏洞的高效完备测试。选择企业内部移动应用进行实验,结果表明该方法能发现了隐藏的越权访问漏洞。检测方法能被用于准确地识别出越权访问漏洞。 In order to solve the problem of unauthorized access vulnerability in mobile applications due to the lack of permission verification in the background, this paper proposes a method of mobile applications unauthorized access vulnerability detection based on finite state machines. By constructing the finite state machines of different users, the complete state machine of mobile application is synthesized. Each request in the complete state machine is dynamically reconstructed and the execution result is analyzed to realize the efficient and complete test of the unauthorized access vulnerabilities. Internal mobile applications are selected to do experiments. The experimental results show that the proposed method finds all hidden unauthorized access vulnerabilities.Unauthorized access vulnerabilities can be accurately detected through the proposed unauthorized access vulnerability detection method.
出处 《南京理工大学学报》 EI CAS CSCD 北大核心 2017年第4期434-441,共8页 Journal of Nanjing University of Science and Technology
基金 国网江苏省电力公司科技项目资助(J2016022)
关键词 移动应用 状态机 越权访问 漏洞检测 动态重构 mobile applications finite state machines unauthorized access vulnerability detection dynamic reconstruction
  • 相关文献

参考文献7

二级参考文献247

  • 1戚湧,胡俊,於东军.基于自组织映射与概率神经网络的增量式学习算法[J].南京理工大学学报,2013,37(1):1-6. 被引量:7
  • 2工业信息化部电信研究.移动互联网白皮书[EB/OL].http://www.catr.cn/kxyj/qwtb/bps/201303/t20130301_907795.html,2013-3.
  • 3李洋.Android中的沙箱机制[EB/OL].http://mobile.51cto.com/abased-354672htm,2011.
  • 4张中文,雷灵光,王跃武.AndroidPemlission机制的实现与安全分析[C].第27次全国计算机安全学术交流会论文集,2012,(08):3-6.
  • 5Xu R, Saidi H, Anderson R. Aurasium: Practical policy enforcement for android applications[C]. Proceedings of the 21st USENIX conference on Security symposium. USENIX Association, 2012: 27-27.
  • 6Felt A P, Chin E, Hanna S, et al. Android permissions demystified[C]. Proceedings of the 18th ACM conference on Computer and communications security. ACM, 2011: 627-638.
  • 7Enck W, Octeau D, McDaniel P, et al. A Study of Android Application Security[C]. USENIX security symposimn. 2011.
  • 8Berthome P, Fecherolle T, Guilloteau N, et al. Repackaging Android Applications for Auditing Access to Private Data[C]. Availability, Reliability and Security (ARES), 2012 Seventh International Conference on. IEEE, 2012 : 388-396.
  • 9Nolan Godfrey. Decompiling Android[M]. New York: Apress, 2012.
  • 10Egham. Gartner says sales of smartphones grew 20 percent in third quarter of 2014 [EB/OL]. [2015-06-01]. http:// www. gartner, com/newsroom/id/2944819.

共引文献179

同被引文献28

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部