Detected object program feature extraction method for vulnerability detection

A technology for detecting objects and program features, applied in the field of computer software detection, can solve the problems of inaccurate parameter analysis, affecting the detection speed, etc., to achieve the effect of overcoming repeated work

Inactive Publication Date: 2012-07-25
NANJING UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The object of the present invention is: facing the target of software vulnerability model detection based on the vulnerability model, aiming at the problems of a large amount of repetitive work, affecting the detection speed, and inaccurate parameter analysis in the current software vulnerability detection method, based on the state machine model of the software vulnerability, the utilization control Flow graph and data flow analysis technology, centering on the key detection objects, extracts the program features related to the state machine model of software vulnerabilities, and abstracts the software code to model, which can be used for static detection of vulnerabilities to judge whether the vulnerability model is presence in code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detected object program feature extraction method for vulnerability detection
  • Detected object program feature extraction method for vulnerability detection
  • Detected object program feature extraction method for vulnerability detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The working process of the inventive method is as Figure 1-Figure 6 shown.

[0022] figure 1 Shown is the overall structure and working principle of this method implementation. The purpose of this method is to analyze and filter the program to be detected according to the operations involved in the vulnerability model, and obtain program characteristics related to vulnerability detection. In order to improve the processing speed, it is necessary to load the vulnerability model from the database into the memory so that it can be used as a reference when analyzing the program. In the process of program loading and feature analysis, the necessary program operations are extracted according to the information related to the operation of the vulnerability model, the abstraction of the program is completed, and the program characteristics related to the vulnerability are obtained, that is, the operation sequence based on the detection object.

[0023] figure 2 Indicates ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a detected object program feature extraction method for vulnerability detection, which comprises the following steps of: 1) loading vulnerability, namely establishing a data structure of a vulnerability model consisting of a set of states of a vulnerability state machine and a set of operation of the vulnerability state machine, wherein the states represent the state of the state machine and each state has state number, type and feature attributes; and 2) loading a program and analyzing and extracting features, namely carrying out abstraction on a software code which is subjected to gcc compilation, constructing a program feature sequence for detection of the vulnerability model based on a detected object, extracting program feature information related to the vulnerability state from a program control flow graph, organizing the program feature information by taking a function as a unit and organizing each function into a plurality of operation sequence link list indexed by the detected object. The method solves the problems of a great amount of repeated work, influence on detection speed and inaccurate parameter analysis of the conventional software vulnerability detection method so as to judge whether the vulnerability model exists in the code or not.

Description

technical field [0001] The invention relates to a method for detecting computer software, in particular to a method for detecting software loopholes. Background technique [0002] Software suffers losses due to the existence of hidden security loopholes, which are easy to be attacked, and its security threats tend to increase continuously. Discovering and eliminating security loopholes in software is one of the important means to reduce security threats and security risks by performing vulnerability detection on software codes. Vulnerability model detection is a representative code vulnerability detection method. In order to conduct vulnerability detection based on the vulnerability state machine model, we propose a program feature extraction method for vulnerability model detection, which is used to abstract the program code to be tested and establish a program feature model for vulnerability detection. [0003] The current vulnerability model software vulnerability detec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
Inventor 曾庆凯
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products