Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

49results about How to "Improve vulnerability detection efficiency" patented technology

Android application privilege disclosure vulnerability detection method based on static stain analysis

The invention provides an Android application privilege disclosure vulnerability detection method, which is used for solving the technical problems of low efficiency of application privilege disclosure vulnerability detection and incomplete detection result in the prior art. The method includes: extracting each application programming interface corresponding to an Android sensitive privilege froman Android system source code, and configuring pollution source functions and trap functions; performing reverse engineering on an application to be detected, analyzing the obtained resource file, andobtaining an application component with the risk of privilege disclosure; then, constructing a detection flow method of static stain analysis of the application component with the risk of privilege disclosure; performing the static stain analysis on the basis of the method, and obtaining a privilege disclosure path list of the application to be detected; finally, outputting the detection result of privilege disclosure vulnerability of the application to be detected. The invention can comprehensively and efficiently detect the Android application privilege disclosure vulnerability, and can beused for the analysis and research of the Android application privilege disclosure vulnerability.
Owner:XIDIAN UNIV

Vulnerability detection system and method of Android hybrid-application code injection

The invention discloses a vulnerability detection system and method of Android hybrid-application code injection. The system includes a permission feature extraction module, a data channel feature extraction module and a vulnerability detection module. The permission feature extraction module is used for extracting a sensitive permission application set of a to-be-detected hybrid application fromto-be-detected hybrid-application code. The data channel feature extraction module is used for extracting a source point set and a receiving point set of data channels from the to-be-detected hybrid-application code. A first input end of the vulnerability detection module is connected to the output end of the permission feature extraction module, and the second input end thereof is connected to the output end of the data channel feature extraction module. The vulnerability detection module is used for according to sensitive permissions and the source point set and the receiving point set of the data channels, using a vulnerability detection model to determine whether vulnerability code injection of the to-be-detected hybrid application exists. Compared with traditional detection methods based on control flow and program call graphs, the method of the invention has higher efficiency, is very high in classification accuracy, and has very good usability.
Owner:HUAZHONG UNIV OF SCI & TECH

Vulnerability detection method and device, server and storage medium

The invention provides a vulnerability detection method and device, a server and a storage medium. The method includes: generating a source code set of an application by decompiling an application installation package; scanning file content of a source code file in the source code set to judge whether the source code file carries a first vulnerability feature or not; under the condition that the source code file carries the first vulnerability feature, performing semantic analysis on the source code file, detecting whether the source code file carries a second vulnerability feature matched with the first vulnerability feature based on a semantic analysis result of the source code file, and if the source code file carries the second vulnerability feature matched with the first vulnerabilityfeature, determining that the source code file has a vulnerability. According to the invention, whether the source code file possibly has the vulnerability or not is determined through the first vulnerability feature irrelevant to semantics; semantic analysis is performed on the source code file to determine whether the source code file really has the vulnerability on the basis that the source code file possibly has the vulnerability, so that the vulnerability detection of the source code file can be realized, and the vulnerability detection efficiency can be effectively improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Vulnerability management system based on network assets

The invention discloses a vulnerability management system based on network assets. The system comprises a vulnerability library module, a vulnerability information display module, a vulnerability retrieval module, a vulnerability library updating module and a vulnerability library exporting module; wherein the vulnerability library module classifies the detected vulnerability information; the vulnerability information display module displays specific vulnerability information under three different classifications of CNNVD, CNVD and CVE; the vulnerability retrieval module performs HTML (Hypertext Markup Language) analysis and arrangement on the screened information; the vulnerability library updating module stores the obtained useful information in a MongoDB database; the increment detection module completes increment update detection; the vulnerability library export module exports vulnerabilities. According to the method, automatic detection is performed on the network assets through the Scrapy framework, so that excessive dependence on manual detection is avoided; and then the network assets are continuously detected, and the vulnerability library is updated in time, so that the hysteresis of the database is effectively avoided, and meanwhile, the vulnerability information is favorably exported from the MongoDB database and is analyzed, and the security threat is solved.
Owner:HUANENG POWER INTERNATIONAL +1

Zero false alarm detection method for Android App vulnerabilities

The invention discloses a zero false alarm detection method for Android App vulnerabilities, which comprises the following steps of: 1) analyzing experience knowledge (such as vulnerability attack paths, CVE reports and the like) of the Android App vulnerabilities, and summarizing, detecting and triggering comprehensive description of the vulnerabilities; 2) App feature extraction: statically searching vulnerability attributes and constructing field values required by a test case and a trigger; 3) performing exploration path constraints by using symbols, and filtering invalid field values in the step 2); 4) dynamically generating a test case and a trigger, and triggering the target App; 5) performing dynamic binary instrumentation on the entry function and the target function of the targetApp; 6), if the behavior of the target function is matched with the vulnerability behavior, judging that the vulnerability exists. According to the zero false alarm detection method, the informationfor detecting and triggering the vulnerability is summarized by analyzing the experience knowledge of the vulnerability; meanwhile, static analysis, symbolic execution and the dynamic binary instrumentation technology are combined for detecting and verifying the vulnerability, and the zero-false-alarm detection effect is achieved.
Owner:北京九州正安科技有限公司

Router automation vulnerability utilization method and system, and electronic device

The invention provides a router automation vulnerability utilization method and system and electronic equipment, and the method comprises the steps: obtaining a to-be-detected router, and determiningthe target version information of the to-be-detected router; determining a target vulnerability detection and identification method corresponding to the target version information in a router vulnerability utilization library according to the target version information; carrying out vulnerability detection on the to-be-detected router through a target vulnerability detection and identification method; and under the condition that the to-be-detected router has the vulnerability through detection, performing vulnerability utilization attack on the to-be-detected router through the target vulnerability utilization code corresponding to the target vulnerability detection and identification method. According to the invention, the vulnerability of the to-be-detected router can be automatically identified and utilized based on the router vulnerability utilization library, so that the router vulnerability detection efficiency is improved, the security of the Internet of Things equipment is improved, and the technical problem of low efficiency of an existing manual router vulnerability detection mode is relieved.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

Vulnerability detection method and device based on optimization variation strategy, equipment and medium

The invention provides a vulnerability detection method and device based on an optimization variation strategy, equipment and a medium. The method comprises the following steps: acquiring a source code of a target application program; compiling and instrumenting the source code to obtain an internal variable and a judgment condition of each branch in the structure of the source code, and forming a branch-internal variable mapping relationship; performing byte-by-byte change on each input byte included in an input variable of the target application program, determining an internal variable which changes along with the changed input byte in the source code, and obtaining an input byte-internal variable mapping relationship; based on the branch-internal variable mapping relationship and the input byte-internal variable mapping relationship, generating the optimization variation strategy about the input bytes; and performing fuzzy testing on the source code based on the optimization variation strategy to obtain a vulnerability detection result. According to the method and the device, rapid vulnerability detection of the source code of the application program is realized, the security of the application program is ensured from the source, and the vulnerability detection efficiency is improved.
Owner:NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1

Equipment protocol vulnerability detection method and device

The invention provides an equipment protocol vulnerability detection method and device, and the method comprises the steps: determining a to-be-detected protocol type of to-be-detected equipment, and obtaining a protocol message corresponding to the to-be-detected protocol type in a system where the to-be-detected equipment is located; obtaining a relationship between fields in the protocol message; performing protocol state machine learning on a system where the to-be-detected equipment is located according to the protocol message, and obtaining a state machine path of the system where the to-be-detected equipment is located; determining a test case generation method according to the state paths, and generating test cases corresponding to the state paths according to the test case generation method in combination with the relationship between the fields; and inputting the test case into the to-be-detected equipment, and obtaining a protocol vulnerability detection result of the to-be-detected equipment according to the working state of the to-be-detected equipment. According to the method and the device, the test cases are generated in combination with the relationship among the fields in the protocol message and the state path, so that a large number of redundant test cases are prevented from being generated, the code coverage rate is improved, and the vulnerability detection efficiency is improved.
Owner:GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2

Bug checking method and device and continuously integrated code bug checking method and device

The invention discloses a vulnerability checking method and device and a vulnerability checking method and device for continuously integrating codes, and the method comprises the steps: detecting whether a code checking switch is turned on or not when a merging request is monitored; if the code review switch is turned on, judging whether the to-be-merged code passes code review or not; if the codecheck is passed, judging whether a vulnerability test switch is turned on; if the vulnerability test switch is turned on, obtaining a vulnerability test result of the to-be-merged code, and judging whether the vulnerability test result exceeds a preset detection threshold value or not; and if the vulnerability test result is smaller than the detection threshold, determining that vulnerability test check succeeds. By implementing the method and the device, the problems of high hardware resource consumption and server jamming caused by centralized triggering of vulnerability scanning due to large task concurrency at the same time are avoided, the situation that hardware and software resources are wasted when a project without code change is executed is avoided, the vulnerability detection efficiency is improved, the code integration efficiency is improved, and the labor cost is reduced.
Owner:北京自如信息科技有限公司

Out-of-authority vulnerability automatic detection method, equipment and medium

The invention discloses an unauthorized vulnerability automatic detection method, electronic equipment and a computer storage medium, relates to the technical field of network security, and aims to solve the problem of low unauthorized vulnerability detection efficiency. The method comprises the following steps: acquiring an original request packet and an original response packet of a Web application and HTML data of the original response packet; storing the HTML data of the original request packet, the original response packet and the original response packet; reading the original request packet, identifying parameters in the original request packet and corresponding parameter values, and performing screening and filtering operation on the parameters in the original request packet to obtain user identification parameters in the original request packet; replacing the user identification parameters in the original request packet to obtain a constructed request packet; sending the constructed request packet, and receiving a new response packet; and reading the original response packet and the new response packet for comparison, and if the original response packet and the new responsepacket are inconsistent, judging that the Web application has an unauthorized vulnerability.
Owner:GUANGTONGTIANXIA NETWORK TECH CO LTD

WASM smart contract vulnerability detection method based on symbolic execution

ActiveCN113672515AImprove vulnerability detection efficiencyRealize smart contract security vulnerability detection and analysisSoftware testing/debuggingEnergy efficient computingPathPingTerm memory
The invention provides a WASM smart contract vulnerability detection method based on symbolic execution, and belongs to the technical field of software testing. The method comprises the steps: constructing executable examples through WebAssembly byte codes of a to-be-analyzed smart contract, calling an initialization function in each example to initialize the state of a running environment, and filling numerical values of a memory area and a data area of the running environment; and further calling a function body to perform symbolic execution according to an index in a function signature, traversing an execution path of the byte code level smart contract to explore a possible state of the smart contract during actual operation, and analyzing potential security vulnerabilities of the smart contract according to the state. In addition, a general function interface and a special function are used for realizing simulation support for library functions of different block chain platforms, so that the integrity of a symbolic execution process is ensured. By setting a circulation upper limit and a branch access upper limit, the path explosion problem and the coverage rate problem in symbolic execution are solved.
Owner:BEIHANG UNIV

Weblogic deserialization vulnerability scanning detection method and tool

The invention discloses a Weblogic deserialization vulnerability scanning detection method and tool, the tool comprises a vulnerability detection tool body, a vulnerability scanning host, a vulnerability detection module and a deserialization processing module, the vulnerability detection tool body is internally provided with the vulnerability scanning host, the vulnerability scanning host is connected with the deserialization processing module, and the deserialization processing module is connected with the vulnerability detection module. The input end of the vulnerability scanning host is connected with the input end of the vulnerability detection server, and the deserialization processing module is adopted to initialize the vulnerability scanning interface, so that the detection interface, the domain name address, the detection result and the user instruction are recovered to the initial running state at the same time; by adopting the mode, the detection interface, the domain name address, the detection result and the user instruction can be in the initial state before each vulnerability scanning, so that the vulnerability scanning detection tool does not need to be initialized by manually inputting the instruction, and the subsequent vulnerability detection efficiency of other Weblogic servers is effectively improved.
Owner:厦门农芯数字科技有限公司

Vulnerability detection system and method for android hybrid application code injection

ActiveCN108647517BVulnerability detection worksConfusion resistancePlatform integrity maintainanceFeature extractionCall graph
The invention discloses a loophole detection system and method for Android mixed application code injection. The system includes an authority feature extraction module, a data channel feature extraction module and a vulnerability detection module. The authority feature extraction module is used to extract the mixed application code to be detected The sensitive permission application set of the hybrid application; the data channel feature extraction module is used to extract the source point set and the receiving point set of the data channel from the mixed application code to be detected; the first input terminal of the vulnerability detection module is the same as the output of the permission feature extraction module The second input terminal is connected to the output terminal of the data channel feature extraction module, which is used to determine whether there is vulnerability code injection in the mixed application to be detected by using the vulnerability detection model according to the sensitive authority and the source point set and the receiving point set of the data channel . Compared with the traditional detection method based on control flow and program call graph, it has higher efficiency, high classification accuracy and good usability.
Owner:HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products