• Login
  • Register
  • Search

Research on security classification and evaluation methods of application programs

Yi Liu, Jianping Hong

Abstract


In the existing research of Application security detection, mainly through the “APP self-check” function of the “risk self_x005fcheck” option group of the National Anti-Fraud Center APP(Application), the installed application in the mobile terminal and the stored
application installation self-check. The standard of application detection is limited to whether there are suspected fraud and malicious
programs, which leads to the lack of comprehensive security detection. To solve the above problems, this paper proposes a security detection
method for application programs, including: running at least one target application; Detect whether there is malicious behavior in the target
application program. If the malicious behavior occurs when the target application program is running, add the target application program to
the fi rst detection list; Detect the permission information of the target application program, if there is an unauthorized behavior, the target
application program is added to the second detection list; Detect all third party SDKS of the target application for the existence of third party
advertising SDKS, and if so, add the target application to the third detection list; Determine the risk level of the target application according
to the fi rst test list, the second test list and the third test list. This method solves the technical problem that the security detection of the
application program is not comprehensive.

Keywords


Application program; Security; detection

Full Text:

PDF

Included Database


References


[1] Luying Han. Technical analysis of Java Web Application Security [J]. Information recording materials, 2021, 22 (8) : 115-116. The DOI: 10.16009 / j.carol

carroll nki cn13-1295 / tq. 2021.08.052.

[2] Yang Wenbo. Several safety analysis of mobile application technology research [D]. Shanghai jiaotong university, 2020. The DOI: 10.27307 /, dc nki.

Gsjtu. 2020.000266.

[3] Heng Zhao.Java Web Application Security Technology [J]. Electronic Technology and Software Engineering,2019(04):194.

[4] Wenzhu Li,Changlin Zhao. Eff ective application security testing [J]. Network Security and Informatization,2018(07):110-111.

[5] Chengcai Z hang. Research and application of safety risk hierarchical management and control Method in coal mine [J]. China Science and Technology

Journal Database Industry A, 2023(2):4.




DOI: http://dx.doi.org/10.18686/modern-management-forum.v8i2.12339

Refbacks