UAF vulnerability exploitation judgement method and device

The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory distribution manner of a mobile terminal operationsystem, a function of a UAF vulnerability in the system, parameters of the function and a using scene...

Full description

Saved in:
Bibliographic Details
Main Authors QIU FENG, ZHU DALI, FENG WEIMIAO, LI YING, MA LUPING
Format Patent
LanguageChinese
English
Published 09.01.2018
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory distribution manner of a mobile terminal operationsystem, a function of a UAF vulnerability in the system, parameters of the function and a using scene of the function, and constructing a first function sequence operation sample which is used for covering an abnormally released memory area; operating the first function sequence operation sample and confirming that the memory area is successfully covered; analyzing content of a controllable objectgenerated by the first function sequence operation sample in an operation process, and constructing a second function sequence operation sample which is used for controlling an execution process of asystem process; and operating the second function sequence operation sample and confirming that the UAF vulnerability can be exploited. According to the UAF vulnerability exploitation judgement method and device, exploitabilit
Bibliography:Application Number: CN20171601966