Method for detecting software loophole model based on loophole model
A model detection and software vulnerability technology, applied in the direction of instruments, electrical digital data processing, platform integrity maintenance, etc., can solve problems affecting detection speed, repetitive work, etc., and achieve the effect of improving reliability and quality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] The working process of the inventive method is as Figure 1-Figure 6 shown.
[0018] figure 1 Shown is the overall structure and working principle of this method implementation. The method of the invention analyzes and detects the program to be detected according to the operations involved in the vulnerability model. Therefore, it is necessary to load the vulnerability model from the database into the memory so that it can be used as a reference when analyzing the program; in the first step of the model detection, the model detection work is performed in units of functions based on the vulnerability-related operations; in the latter step of the model detection, the main function is modeled. Detection, according to the vulnerability-related operations and the model detection results of the function in the previous section, perform status detection and report the existence of the vulnerability.
[0019] figure 2 Indicates the vulnerability model loading process. The...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com