发明名称 SYSTEM FOR AUTOMATICALLY GENERATING AN ATTACKER APPLICATION TARGETED TO A VICTIM APPLICATION
摘要 A system for automatically generating an attacker application to perform vulnerability analysis on a victim application is disclosed. The system includes a memory unit, a processor that executes the set of modules. The set of modules includes a victim application permissions reading module, a permission obtaining module, a configuration file updating module, and a targeted attacker application creation module. The permission obtaining module is configured to obtain a list of permissions to exploit the victim application based on the list of permissions. The configuration file updating module is configured to update a configuration file of a template attacker application with the list of permissions to generate an attacker application that is specific to the victim application. The targeted attacker application creation module is configured to create the attacker application based on the list of permissions to attack the victim application.
申请公布号 US2017061134(A1) 申请公布日期 2017.03.02
申请号 US201514880602 申请日期 2015.10.12
申请人 Wegilant Net Solutions Private Limited 发明人 Sharma Toshendra Kumar;Valluri Bhanu Prakash
分类号 G06F21/57 主分类号 G06F21/57
代理机构 代理人
主权项 1. A system for automatically generating an attacker application targeted to a victim application, comprising: a memory unit that stores a database that comprises a template attacker application, a set of modules and instructions; and a processor which when configured by said instructions executes said set of modules, wherein said set of modules comprise: a victim application permissions reading module, implemented by said processor, that reads a list of permissions associated with a framework of said victim application that are declared in said victim application; a permission obtaining module, implemented by said processor, that obtains said list of permissions to exploit said victim application based on said list of permissions; a configuration file updating module, implemented by said processor, that updates a configuration file of said template attacker application with said list of permissions to generate an attacker application that is specific to said victim application; and a targeted attacker application creation module, implemented by said processor, that creates said attacker application, wherein said attacker application comprises a plurality of attack vectors targeted to attack said victim application based on said list of permissions.
地址 Gurgaon IN