{"title":"A Method of Building Safety Rule Base for Power Mobile Terminals","authors":"Nige Li, Lu Chen, Mu Chen, Ziang Lu","doi":"10.1109/ICSGEA.2018.00025","DOIUrl":null,"url":null,"abstract":"With the continuous emergence of professional vulnerability-researched organizations in the world, vulnerability mining technology has been rapidly improved, and the technology of vulnerability utilization is becoming more and more sophisticated. Timely and accurate grasp of the security vulnerabilities of electric power mobile terminals and targeted preventive work become the key to ensure the safety of power mobile terminals. This paper analyzes the security vulnerabilities of typical power mobile terminals. By studying the security rules extraction method of vulnerability text classification and code feature extraction, processing the text information related to vulnerabilities, including vulnerability number, category, descriptive text and so on, this paper describes the vulnerability information formally, extracts the typical code features of some vulnerable API with high risk artificially and abstracts the security detection rules of vulnerabilities, so as to build a security vulnerability detection rule base for power mobile terminals. It can help security analysts quickly discover and analyze targeted security vulnerabilities, effectively excavate power mobile terminals security vulnerabilities and repair in time before the attackers, to avoid causing more security events, and to have important preventive significance.","PeriodicalId":445324,"journal":{"name":"2018 International Conference on Smart Grid and Electrical Automation (ICSGEA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Smart Grid and Electrical Automation (ICSGEA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSGEA.2018.00025","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the continuous emergence of professional vulnerability-researched organizations in the world, vulnerability mining technology has been rapidly improved, and the technology of vulnerability utilization is becoming more and more sophisticated. Timely and accurate grasp of the security vulnerabilities of electric power mobile terminals and targeted preventive work become the key to ensure the safety of power mobile terminals. This paper analyzes the security vulnerabilities of typical power mobile terminals. By studying the security rules extraction method of vulnerability text classification and code feature extraction, processing the text information related to vulnerabilities, including vulnerability number, category, descriptive text and so on, this paper describes the vulnerability information formally, extracts the typical code features of some vulnerable API with high risk artificially and abstracts the security detection rules of vulnerabilities, so as to build a security vulnerability detection rule base for power mobile terminals. It can help security analysts quickly discover and analyze targeted security vulnerabilities, effectively excavate power mobile terminals security vulnerabilities and repair in time before the attackers, to avoid causing more security events, and to have important preventive significance.