首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于Fuzzing的Android应用通信过程漏洞挖掘技术
作者姓名:王凯  刘奇旭  张玉清
作者单位:中国科学院大学 国家计算机网络入侵防范中心, 北京 101408
基金项目:国家自然科学基金(61272481,61303239)、北京市自然科学基金(4122089)、国家发改委信息安全专项(发改办高技[2012]1424号)和中国科学院大学校长基金资助
摘    要:在通信过程中,如果Android应用对其私有组件保护不充分,会导致组件暴露漏洞的存在.以往针对Android应用通信过程的漏洞挖掘方法不能准确发现这种安全威胁.为解决上述问题,提出一种结合Fuzzing技术和逆向分析的漏洞挖掘方法,设计并实现了漏洞挖掘工具KMDroid.实验结果表明,KMDroid可以有效挖掘应用通信过程中存在的安全漏洞.

关 键 词:Android    Fuzzing    逆向分析    应用通信    安全漏洞
收稿时间:2013-09-27
修稿时间:2014-01-03

Android inter-application communication vulnerability mining technique based on Fuzzing
Authors:WANG Kai  LIU Qixu  ZHANG Yuqing
Institution:National Computer Network Intrusion Protection Center, University of Chinese Academy of Science, Beijing 101408, China
Abstract:If an Android application could not protect its private components well in the process of inter-application communication, there would exist exposed component vulnerabilities. The current vulnerability mining technique cannot identify such vulnerabilities accurately. To solve this problem, we propose a new vulnerability mining method which combines Fuzzing with reverse analysis, and design a vulnerability mining tool named KMDroid. Experimental results show that KMDroid can discover the vulnerability of inter-application communication effectively.
Keywords:Android                                                                                                                        Fuzzing                                                                                                                        reverse analysis                                                                                                                        inter-application communication                                                                                                                        vulnerabilities
点击此处可从《》浏览原始摘要信息
点击此处可从《》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号