UAF vulnerability exploitation judgement method and device

The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory distribution manner of a mobile terminal operationsystem, a function of a UAF vulnerability in the system, parameters of the function and a using scene...

Full description

Saved in:
Bibliographic Details
Main Authors QIU FENG, ZHU DALI, FENG WEIMIAO, LI YING, MA LUPING
Format Patent
LanguageChinese
English
Published 09.01.2018
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory distribution manner of a mobile terminal operationsystem, a function of a UAF vulnerability in the system, parameters of the function and a using scene of the function, and constructing a first function sequence operation sample which is used for covering an abnormally released memory area; operating the first function sequence operation sample and confirming that the memory area is successfully covered; analyzing content of a controllable objectgenerated by the first function sequence operation sample in an operation process, and constructing a second function sequence operation sample which is used for controlling an execution process of asystem process; and operating the second function sequence operation sample and confirming that the UAF vulnerability can be exploited. According to the UAF vulnerability exploitation judgement method and device, exploitabilit
AbstractList The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory distribution manner of a mobile terminal operationsystem, a function of a UAF vulnerability in the system, parameters of the function and a using scene of the function, and constructing a first function sequence operation sample which is used for covering an abnormally released memory area; operating the first function sequence operation sample and confirming that the memory area is successfully covered; analyzing content of a controllable objectgenerated by the first function sequence operation sample in an operation process, and constructing a second function sequence operation sample which is used for controlling an execution process of asystem process; and operating the second function sequence operation sample and confirming that the UAF vulnerability can be exploited. According to the UAF vulnerability exploitation judgement method and device, exploitabilit
Author FENG WEIMIAO
ZHU DALI
MA LUPING
LI YING
QIU FENG
Author_xml – fullname: QIU FENG
– fullname: ZHU DALI
– fullname: FENG WEIMIAO
– fullname: LI YING
– fullname: MA LUPING
BookMark eNrjYmDJy89L5WSwCnV0UygrzclLLUpMyszJLKlUSK0oyMnPLEksyczPU8gqTUlPzU3NK1HITS3JyE9RSMxLUUhJLctMTuVhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfHOfoYG5qZmRmaGZo7GxKgBAKDcMRA
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
Physics
DocumentTitleAlternate 种UAF漏洞利用判断方法及装置
ExternalDocumentID CN107562616A
GroupedDBID EVB
ID FETCH-epo_espacenet_CN107562616A3
IEDL.DBID EVB
IngestDate Fri Jul 19 17:01:03 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language Chinese
English
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_CN107562616A3
Notes Application Number: CN20171601966
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180109&DB=EPODOC&CC=CN&NR=107562616A
ParticipantIDs epo_espacenet_CN107562616A
PublicationCentury 2000
PublicationDate 20180109
PublicationDateYYYYMMDD 2018-01-09
PublicationDate_xml – month: 01
  year: 2018
  text: 20180109
  day: 09
PublicationDecade 2010
PublicationYear 2018
RelatedCompanies INSTITUTE OF INFORMATION ENGINEERING, CAS
RelatedCompanies_xml – name: INSTITUTE OF INFORMATION ENGINEERING, CAS
Score 3.245347
Snippet The invention provides a UAF vulnerability exploitation judgement method and device. The method comprises the following steps of: analyzing a memory...
SourceID epo
SourceType Open Access Repository
SubjectTerms CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
Title UAF vulnerability exploitation judgement method and device
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180109&DB=EPODOC&locale=&CC=CN&NR=107562616A
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwED_m_HzTquj8IIL0rdivda1QZEtXhrBuyCZ7G23SMod0w3WK_vVess75oq8XOJKQu8slv_sdwK3OEp2bmYu5iWVqdh2PsddgsdZIdJfbns5cRxQKdyOnM7QfR_VRBabrWhjJE_ohyRHRohjaeyH99XzziBVIbOXiLnlB0ewhHPiBWmbHhit-etSg5bf7vaBHVUp9GqnRk-itipHeMZzmFmzjNbohrKH93BJVKfPfISU8hJ0-asuLI6h8TRTYp-vOawrsdcsPbwV2JUKTLVBYWuHiGO6HzZC8L18FYbTEtn6SVEDpSrptMl3yFaKFrPpDkzjnhKfCJ5zATdge0I6G0xn_rH1Mo83MrVOo5rM8PQOSOnHKdGYbXpzZCa9jimu5GeOmEScYdbNzqP2tp_bf4AUciH2UrwzeJVSLt2V6hXG3SK7lhn0DZCaHTQ
link.rule.ids 230,309,783,888,25576,76876
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dT8IwEL8gfuCbokTxqyZmb8QNxthMFgMdy1QYxIDhjWztFiVmEBka_eu9liG-6Os1ubRN767X_u53AFcqC1VejU3MTWrVil7HY2w1WFBphKrJdUtlpiEKhbu-4Q31-1F9lIPJqhZG8oR-SHJEtCiG9p5Kfz1bP2I5Els5vw5fUDS9dQe2o2TZsWaKnx7Fadntfs_pUYVSm_qK_yh6q2KkNzSjuQGbeMVuCGtoP7VEVcrsd0hx92Crj9qSdB9yX89FKNBV57Ui7HSzD-8ibEuEJpujMLPC-QHcDJsueV-8CsJoiW39JJGA0mV022Sy4EtEC1n2hyZBwgmPhE84hEu3PaBeBacz_ln7mPrrmddKkE-mSXQEJDKCiKlM16wg1kNexxS3ZsaMV7UgxKgbH0P5bz3l_wYvoOANup1x585_OIFdsafyxcE6hXz6tojOMAan4bncvG_oJ4pA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=UAF+vulnerability+exploitation+judgement+method+and+device&rft.inventor=QIU+FENG&rft.inventor=ZHU+DALI&rft.inventor=FENG+WEIMIAO&rft.inventor=LI+YING&rft.inventor=MA+LUPING&rft.date=2018-01-09&rft.externalDBID=A&rft.externalDocID=CN107562616A