Bug excavation method based on executable code conversed analysis
A technology of reverse analysis and vulnerability mining, applied in the field of vulnerability mining, can solve the problems of single type of vulnerability and inability to know other problems, achieve a good vulnerability detection rate and make up for blindness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.
[0016] Based on the present invention, a loophole mining method for reverse analysis of executable codes is developed, which mainly performs reverse analysis and detection of loopholes in executable codes, performs gray box detection processing on inherent loopholes and logical loopholes that may occur, and judges and locates loopholes location and associated hazards. The specific implementation method is described below:
[0017] For executable code files, it mainly refers to executable PE files under Windows. For the specific detection process, see figure 1 .
[...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com