当前位置:网站首页>Tencent security apkpecker launched dex-vmp automatic shelling service
Tencent security apkpecker launched dex-vmp automatic shelling service
2022-06-24 06:26:00 【Tencent security】
In recent days, , Tencent security Cohen lab ApkPecker Online automatic shelling service , Help security personnel to better conduct security audit . After a large-scale test, the results show that , ApkPecker The success rate of shelling is more than 85%.
Mobile application shelling is the most basic operation of mobile application reverse and malicious application analysis , Mainly in the process of mobile application security audit and virus analysis , Help the security personnel take off the shell code of the application , So as to analyze the key code . Mobile application shelling helps developers discover the security problems of the application development code itself in time, and examine and find malicious behavior . Enterprises, especially large-scale enterprises, often need to use the application security development and reinforcement services provided by the third-party supply chain , Security personnel need to verify its security , Mobile application shelling is one of the necessary steps .
Generally speaking , The safety personnel usually use the manual method for shelling , First, it is restricted by the level of security researchers themselves , Second, there is a lot of repetitive work , Consume enterprise safety manpower . The existing automatic shelling tools on the market can not solve the problem DEX Virtualization reinforcement solution , And the interpreter customized by the manufacturer will be replaced regularly Opcode The mapping table , As a result, many automatic shelling services cannot be restored completely and effectively DEX Code .
Based on this insight , Tencent security Cohen laboratory based on years of security research experience , Introduce advanced automatic shelling scheme , Support recovery of common DEX Encryption and instruction extraction . meanwhile , For manufacturers DEX Virtualization protection (DEX-VMP), ApkPecker Targeted shelling and recovery were also carried out .
ApkPecker On the basis of determining the format of manufacturer's bytecode , adopt AI Learn from the vendor interpreter binary opcode handler Runtime behavior for , So as to automatically restore the factory interpreter's opcode semantics , Restore the original Dalvik Bytecode , And rewrite DEX file .ApkPekcer Our shelling solution has solved opcode handler The difficulty of identification , Automated restore is DEX-VMP Protected code , Improve the integrity and automation of shelling . After a large-scale test, the results show that ,ApkPecker The success rate of shelling is more than 85%.
ApkPecker It is a fully automatic one developed by Tencent security Cohen laboratory Android Application vulnerability scanning tool , The system passes through Android Application lifecycle modeling and application attack surface modeling , Using static data flow analysis and Taint Analysis Technology , Improve the accuracy of vulnerability detection .ApkPecker Can output high quality vulnerability scanning report , Provide high quality vulnerability information and full path of vulnerability trigger , Pinpoint vulnerabilities and provide repair advice , Help mobile security personnel solve existing pain points , Enhance application security .
The automation of this launch APK Shelling service , It is also another upgrade of its overall capability .Apkpecke Dedicated to being a digital assistant for security researchers , The majority of mobile application developers can use ApkPecker Effectively defend against all kinds of mobile application risks , Build from APP Security management of the whole life cycle of products from development to user interaction , Carry out safety risk detection and control , For the user's mobile information 、 Property security escort .
边栏推荐
- 12. Tencent cloud IOT device side learning -- NTP function and Implementation
- MySQL forgets root password cracking root password cracking all user passwords, shell script
- Coding and codesign: make design and development easier
- The influence of TLS protocol and cipher on remote RDP
- How do I view the IP address of a domain name? What is the relationship between domain name and IP?
- TRTC applet custom message
- What is Druid
- Analysis of official template of wechat personnel recruitment management system (III)
- Brief introduction to the working principle of high frequency signal generator
- Water conservancy RTU telemetry terminal
猜你喜欢

Technology is a double-edged sword, which needs to be well kept

The product layout is strengthened, the transformation of digital intelligence is accelerated, and FAW Toyota has hit 2022million annual sales

ServiceStack. Source code analysis of redis (connection and connection pool)
![[fault announcement] one stored procedure brings down the entire database](/img/7c/e5adda73a077fe4b8f04b59d1e0e1e.jpg)
[fault announcement] one stored procedure brings down the entire database

Solution to the 39th weekly game of acwing

One line of keyboard

Manual for automatic testing and learning of anti stepping pits, one for each tester

What is the difference between a white box test and a black box test

A cigarette of time to talk with you about how novices transform from functional testing to advanced automated testing

Enter the software test pit!!! Software testing tools commonly used by software testers software recommendations
随机推荐
Enter the software test pit!!! Software testing tools commonly used by software testers software recommendations
"Adobe international certification" design white must understand the color theory, absolutely full of dry goods
Is IPFs a new national infrastructure project? What impact will the new infrastructure have on IPFs?
How is a Clickhouse query completed?
Text classification and fine tuning using transformer Bert pre training model
Tencent Security jointly established a data security committee
Quick reference table of PHP security configuration maintained by OWASP
Little transparent apprentice's way to go ashore
Semantic web, semantic web, linked data and knowledge map
The product layout is strengthened, the transformation of digital intelligence is accelerated, and FAW Toyota has hit 2022million annual sales
The difference between ArrayList and LinkedList and the principle of using scene locality
Why migrate dig to wire
Analysis of official template of micro build low code (I)
Technology is a double-edged sword, which needs to be well kept
Text classification and fine tuning using transformer Bert pre training model
Linux Apache setting compression and caching
Micro build low code supports Excel to import data source
How to resolve the domain name? How to choose a domain name?
SAP hum unbinds Hu from delivery order
A cigarette of time to talk with you about how novices transform from functional testing to advanced automated testing