Detection object-based software vulnerability model detection method

A detection object and model detection technology, applied in software testing/debugging, etc., can solve problems such as repetitive work, affecting detection speed, and low accuracy

Inactive Publication Date: 2010-12-29
NANJING UNIV
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problems of a lot of repetitive work, affecting the detection speed and low accuracy in the current software vulnerability detection method, the present invention provides a software vulnerability model detection method based on the vulnerability model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection object-based software vulnerability model detection method
  • Detection object-based software vulnerability model detection method
  • Detection object-based software vulnerability model detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The working process of the inventive method is as Figure 1-Figure 5 shown.

[0020] figure 1 Shown is the overall structure and working principle of this method implementation. The purpose of this method is to analyze and detect the program to be detected according to the operations involved in the vulnerability model, and report the discovered vulnerabilities. In order to improve the processing speed, the vulnerability model needs to be loaded into the memory from the database, so that it can be used as a reference when analyzing the program. During the vulnerability model detection process, the model detection work is carried out step by step according to the vulnerability-related operations in units of functions. Vulnerability model detection starts from the main function, and performs state detection and reports the existence of vulnerabilities according to the model detection results of vulnerability-related operations and step-by-step functions.

[0021] f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a detection object-based software vulnerability model detection method, which comprises the following steps: (1) flow of loading vulnerability in which a data structure of a vulnerability model is established, wherein the vulnerability model is composed of a state set and an operation set of a vulnerability state machine, and the state represents the state of the state machine; 2) flow of vulnerability model detection processing; 3) flow of analyzing function program operation sequence, namely a process of analyzing the function program sequence aiming at the detection object; and 4) process of operated state conversion processing in which the operated conversion state is calculated. The invention provides a vulnerability model-based software vulnerability model detection method. The software vulnerability-based state machine model is centered on a key detection object, which abstracts and models the software codes, performs vulnerability static detection only on the program operation sequence associated with the vulnerability state and judges the existence of the vulnerability model in the codes. The invention solves the problems that a lot of repeated work needs to be done, the detection speed is influenced and the accuracy is not high in the prior art.

Description

technical field [0001] The invention relates to a computer software detection method, in particular to a software vulnerability model detection method. Background technique [0002] Software suffers losses due to the existence of hidden security loopholes, which are easy to be attacked, and its security threats tend to increase continuously. Discovering and eliminating software security vulnerabilities is one of the important means to reduce security threats and reduce security risks through vulnerability detection of software codes. Vulnerability model detection is a representative code vulnerability detection method. We propose a detection object-based vulnerability model detection method for automatic detection of possible vulnerabilities in software codes. [0003] The current vulnerability model software vulnerability detection method has shortcomings such as repeated inspection and inaccuracy in the detection process, and the detection speed and accuracy are insuffic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
Inventor 曾庆凯
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products