Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting software loophole model based on loophole model

A model detection and software vulnerability technology, applied in the direction of instruments, electrical digital data processing, platform integrity maintenance, etc., can solve problems affecting detection speed, repetitive work, etc., and achieve the effect of improving reliability and quality

Inactive Publication Date: 2009-02-25
NANJING UNIV
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problems that there are a lot of repetitive work and affecting the detection speed in the current software vulnerability detection method, the present invention provides a software vulnerability model detection method based on the vulnerability model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting software loophole model based on loophole model
  • Method for detecting software loophole model based on loophole model
  • Method for detecting software loophole model based on loophole model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The working process of the inventive method is as Figure 1-Figure 6 shown.

[0018] figure 1 Shown is the overall structure and working principle of this method implementation. The method of the invention analyzes and detects the program to be detected according to the operations involved in the vulnerability model. Therefore, it is necessary to load the vulnerability model from the database into the memory so that it can be used as a reference when analyzing the program; in the first step of the model detection, the model detection work is performed in units of functions based on the vulnerability-related operations; in the latter step of the model detection, the main function is modeled. Detection, according to the vulnerability-related operations and the model detection results of the function in the previous section, perform status detection and report the existence of the vulnerability.

[0019] figure 2 Indicates the vulnerability model loading process. The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a software vulnerability model test method based on vulnerability models. The method comprises the following steps: 1) the vulnerability models are loaded into a flow process from a database, that is, the vulnerability models are put into a memory, and data structures of the vulnerability models are established and used for reference during analyses of programs; 2) in the previous step for testing the models, models are tested according to relevant operations of vulnerability based on functions; and 3) in the final step for testing the models, the models are tested for principal functions, the states are tested and the existence of vulnerability is reported according to relevant operations of vulnerability and the model test results in the previous step. The vulnerability model load flow is as follows: the vulnerability models consist of vulnerability state nodes and gathers with directed edges; a flow for operating transition tables retrieved according to the directed edge types is established in a memory; irrelevant operations are filtered and removed through abstracting and processing programs in an abstract manner; the operation sequence flow relative to the vulnerability models is abstracted; and each function program feature corresponds to an operation sequence linked list.

Description

technical field [0001] The invention relates to a method for detecting computer software loopholes, in particular to a method for detecting software loopholes based on a loophole model. Background technique [0002] As the size and complexity of software grow, so do the hidden security holes and the threat of loss from attacks. The fundamental solution to prevent system attacks and intrusions is to find and eliminate software defects before they are exploited. Software code detection for software security vulnerabilities is one of the important means to predict and prevent vulnerabilities. Vulnerability static detection is a more effective code vulnerability detection technology, and the vulnerability model detection method is one of the representative detection methods. We propose a model checking approach based on a state machine model of vulnerabilities to provide automatic detection of possible vulnerabilities in software code. [0003] The current software vulnerabil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/56
Inventor 曾庆凯张林
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products