{"title":"Research and Practical Exploration of Mobile Application Software Security Detection Technology","authors":"Xianghui Miao","doi":"10.1109/ICMSSE53595.2021.00009","DOIUrl":null,"url":null,"abstract":"This article analyzes the common threats during the operation of mobile applications. The research content of this paper includes computer viruses, private information leakage, private information theft, malicious access/attack. The author has studied the key points of technical application such as grammar security detection technology, dynamic security detection technology, SMOTE detection technology, machine learning algorithm detection, static security detection technology, hybrid security detection technology, Web security detection technology, fault injection security detection, fuzzing security detection. The author sorted out how to do a good job in data encryption, optimize the content of network protocols, and improve port identity authentication. The purpose of this article is to improve the application effect of detection technology and improve the security of the mobile terminal application software operation process.","PeriodicalId":331570,"journal":{"name":"2021 International Conference on Management Science and Software Engineering (ICMSSE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Management Science and Software Engineering (ICMSSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMSSE53595.2021.00009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This article analyzes the common threats during the operation of mobile applications. The research content of this paper includes computer viruses, private information leakage, private information theft, malicious access/attack. The author has studied the key points of technical application such as grammar security detection technology, dynamic security detection technology, SMOTE detection technology, machine learning algorithm detection, static security detection technology, hybrid security detection technology, Web security detection technology, fault injection security detection, fuzzing security detection. The author sorted out how to do a good job in data encryption, optimize the content of network protocols, and improve port identity authentication. The purpose of this article is to improve the application effect of detection technology and improve the security of the mobile terminal application software operation process.