Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for extracting operation sequence of software vulnerability characteristics

A software vulnerability and operation sequence technology, applied in the field of information security, can solve the problems of large redundancy of operation sequences, ineffective utilization, and lowering the efficiency of software vulnerability analysis, so as to overcome a lot of repetitive work, reduce mining time, and reduce search effect of space

Inactive Publication Date: 2010-06-09
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. Due to the large redundancy of the software vulnerability feature operation sequence extracted by the existing software vulnerability feature operation sequence extraction method, there is a lot of repetitive work when extracting these software vulnerability feature operation sequences, which affects the feature similarity matching speed and software Applicability of vulnerability analysis methods;
[0011] 2. Since the frequency of occurrence of each software vulnerability is different, that is, some software vulnerabilities occur frequently, and some software vulnerabilities occur less frequently. The existing methods do not treat this situation differently, which reduces the analysis of software vulnerabilities. s efficiency;
[0012] 3. Due to the incrementality of the software vulnerability program operation sequence set, the existing method for extracting software vulnerability characteristic operation sequences cannot effectively utilize the extracted software vulnerability characteristic operation sequences to accelerate the process of extracting new software vulnerability characteristic operation sequences , which affects the efficiency of the entire software vulnerability feature operation sequence extraction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for extracting operation sequence of software vulnerability characteristics
  • Method for extracting operation sequence of software vulnerability characteristics
  • Method for extracting operation sequence of software vulnerability characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The technical solutions of the present invention will be described in detail below in conjunction with specific embodiments.

[0060] Concrete operation steps of the present invention are as follows:

[0061] Step 1. Collect existing software vulnerability programs

[0062] Collect existing software vulnerability programs, such as buffer overflow, format string, integer overflow, etc., and store them in the database in the form of documents;

[0063] Step 2. Preprocess the software vulnerability programs collected in step 1, and filter out the function blocks and statements irrelevant to the software vulnerability analysis in the software vulnerability programs, such as the database name, database path, function call list, various string information;

[0064] Step 3, obtain the software vulnerability program operation sequence from the software vulnerability program preprocessed in step 2, and its specific operation steps are as follows:

[0065] Step 1: Load the vul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for extracting an operation sequence of software vulnerability characteristics, in particular to a method for extracting an operation sequence of software vulnerability characteristics mined based on a close sequence mode, and belongs to the technical field of information safety. According to the method, a software vulnerability procedure is processed by using a function call relationship analysis technique and is abstracted as a data mode of the operation sequence of the software vulnerability procedure; and a weighted closed sequence is mined by adopting a weighted closed sequence mode mining algorithm, so that the extracting efficiency for the operation sequence of software vulnerability characteristics is increased.

Description

technical field [0001] The invention relates to a method for extracting software vulnerability characteristic operation sequences, in particular to a method for extracting software vulnerability characteristic operation sequences based on closed sequence pattern mining, and belongs to the technical field of information security. Background technique [0002] With the increasing number of hacker attacks and the proliferation of worms on the Internet, information security has gradually become the focus of people's eyes. A core problem in information security is the software security loopholes in computer systems. Malicious attackers can use these security loopholes to elevate their privileges, access unauthorized resources, and even destroy sensitive data. The widespread application of computer software has brought more and more convenience to people and has increasingly affected people's daily life. However, there are a large number of errors and loopholes in computer softwar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36
Inventor 胡昌振任家东王崑声武群惠杨东旭
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products