UAF vulnerability exploitation judgement method and device
The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory distribution manner of a mobile terminal operationsystem, a function of a UAF vulnerability in the system, parameters of the function and a using scene...
Saved in:
Main Authors | , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
09.01.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory distribution manner of a mobile terminal operationsystem, a function of a UAF vulnerability in the system, parameters of the function and a using scene of the function, and constructing a first function sequence operation sample which is used for covering an abnormally released memory area; operating the first function sequence operation sample and confirming that the memory area is successfully covered; analyzing content of a controllable objectgenerated by the first function sequence operation sample in an operation process, and constructing a second function sequence operation sample which is used for controlling an execution process of asystem process; and operating the second function sequence operation sample and confirming that the UAF vulnerability can be exploited. According to the UAF vulnerability exploitation judgement method and device, exploitabilit |
---|---|
AbstractList | The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory distribution manner of a mobile terminal operationsystem, a function of a UAF vulnerability in the system, parameters of the function and a using scene of the function, and constructing a first function sequence operation sample which is used for covering an abnormally released memory area; operating the first function sequence operation sample and confirming that the memory area is successfully covered; analyzing content of a controllable objectgenerated by the first function sequence operation sample in an operation process, and constructing a second function sequence operation sample which is used for controlling an execution process of asystem process; and operating the second function sequence operation sample and confirming that the UAF vulnerability can be exploited. According to the UAF vulnerability exploitation judgement method and device, exploitabilit |
Author | FENG WEIMIAO ZHU DALI MA LUPING LI YING QIU FENG |
Author_xml | – fullname: QIU FENG – fullname: ZHU DALI – fullname: FENG WEIMIAO – fullname: LI YING – fullname: MA LUPING |
BookMark | eNrjYmDJy89L5WSwCnV0UygrzclLLUpMyszJLKlUSK0oyMnPLEksyczPU8gqTUlPzU3NK1HITS3JyE9RSMxLUUhJLctMTuVhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfHOfoYG5qZmRmaGZo7GxKgBAKDcMRA |
ContentType | Patent |
DBID | EVB |
DatabaseName | esp@cenet |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: EVB name: esp@cenet url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Chemistry Sciences Physics |
DocumentTitleAlternate | 种UAF漏洞利用判断方法及装置 |
ExternalDocumentID | CN107562616A |
GroupedDBID | EVB |
ID | FETCH-epo_espacenet_CN107562616A3 |
IEDL.DBID | EVB |
IngestDate | Fri Jul 19 17:01:03 EDT 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | Chinese English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-epo_espacenet_CN107562616A3 |
Notes | Application Number: CN20171601966 |
OpenAccessLink | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180109&DB=EPODOC&CC=CN&NR=107562616A |
ParticipantIDs | epo_espacenet_CN107562616A |
PublicationCentury | 2000 |
PublicationDate | 20180109 |
PublicationDateYYYYMMDD | 2018-01-09 |
PublicationDate_xml | – month: 01 year: 2018 text: 20180109 day: 09 |
PublicationDecade | 2010 |
PublicationYear | 2018 |
RelatedCompanies | INSTITUTE OF INFORMATION ENGINEERING, CAS |
RelatedCompanies_xml | – name: INSTITUTE OF INFORMATION ENGINEERING, CAS |
Score | 3.245347 |
Snippet | The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory... |
SourceID | epo |
SourceType | Open Access Repository |
SubjectTerms | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
Title | UAF vulnerability exploitation judgement method and device |
URI | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180109&DB=EPODOC&locale=&CC=CN&NR=107562616A |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwED_m_HzTquj8IIL0rdivda1QZEtXhrBuyCZ7G23SMod0w3WK_vVess75oq8XOJKQu8slv_sdwK3OEp2bmYu5iWVqdh2PsddgsdZIdJfbns5cRxQKdyOnM7QfR_VRBabrWhjJE_ohyRHRohjaeyH99XzziBVIbOXiLnlB0ewhHPiBWmbHhit-etSg5bf7vaBHVUp9GqnRk-itipHeMZzmFmzjNbohrKH93BJVKfPfISU8hJ0-asuLI6h8TRTYp-vOawrsdcsPbwV2JUKTLVBYWuHiGO6HzZC8L18FYbTEtn6SVEDpSrptMl3yFaKFrPpDkzjnhKfCJ5zATdge0I6G0xn_rH1Mo83MrVOo5rM8PQOSOnHKdGYbXpzZCa9jimu5GeOmEScYdbNzqP2tp_bf4AUciH2UrwzeJVSLt2V6hXG3SK7lhn0DZCaHTQ |
link.rule.ids | 230,309,783,888,25576,76876 |
linkProvider | European Patent Office |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dT8IwEL8gfuCbokTxqyZmb8QNxthMFgMdy1QYxIDhjWztFiVmEBka_eu9liG-6Os1ubRN767X_u53AFcqC1VejU3MTWrVil7HY2w1WFBphKrJdUtlpiEKhbu-4Q31-1F9lIPJqhZG8oR-SHJEtCiG9p5Kfz1bP2I5Els5vw5fUDS9dQe2o2TZsWaKnx7Fadntfs_pUYVSm_qK_yh6q2KkNzSjuQGbeMVuCGtoP7VEVcrsd0hx92Crj9qSdB9yX89FKNBV57Ui7HSzD-8ibEuEJpujMLPC-QHcDJsueV-8CsJoiW39JJGA0mV022Sy4EtEC1n2hyZBwgmPhE84hEu3PaBeBacz_ln7mPrrmddKkE-mSXQEJDKCiKlM16wg1kNexxS3ZsaMV7UgxKgbH0P5bz3l_wYvoOANup1x585_OIFdsafyxcE6hXz6tojOMAan4bncvG_oJ4pA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=UAF+vulnerability+exploitation+judgement+method+and+device&rft.inventor=QIU+FENG&rft.inventor=ZHU+DALI&rft.inventor=FENG+WEIMIAO&rft.inventor=LI+YING&rft.inventor=MA+LUPING&rft.date=2018-01-09&rft.externalDBID=A&rft.externalDocID=CN107562616A |