Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software vulnerability detection method based on behavioral characteristic automaton model

An automaton model and software vulnerability technology, applied in computer security devices, instruments, program/content distribution protection, etc., can solve problems such as fuzzy description of behavior characteristics, simple classification and quantification results, and unclear essential connection of vulnerabilities, etc., to improve Effects on Reliability and Safety

Active Publication Date: 2012-09-26
SHANGHAI YUNJIAN INFORMATION TECH CO LTD
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] To sum up, on the basis of tracking the current research status at home and abroad, the existing bottleneck problems are found: the description of behavioral characteristics of known vulnerabilities is too vague, the classification and quantification of characteristics are too simple, and the essential relationship between behavioral characteristics and vulnerabilities is not clear , so it is impossible to reason and detect unknown vulnerabilities based on these features

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software vulnerability detection method based on behavioral characteristic automaton model
  • Software vulnerability detection method based on behavioral characteristic automaton model
  • Software vulnerability detection method based on behavioral characteristic automaton model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0026] Such as figure 1 As shown, a software vulnerability detection method based on behavioral feature automaton model, the method includes the following steps:

[0027] 1) Representation of known vulnerability behavior characteristics in the vulnerability behavior characteristic database;

[0028] 11) Build an automaton model BAR with data constraints:

[0029] BAR = function(Behavior(), Automaton(), reasoning())

[0030] Behavior=B(Judge, In, Out, State, Action)

[0031] Automaton=(FSM(In, Out, State, f(In), g(s)), BM(Behavior))

[0032] Re asoning(Logic(FSM(), NoClassicalLogic(BM()))

[0033] Among them, Behavior represents the expression of behavior characteristics, Automaton represents automata, and reasoning represents reasoning; behavior characteristics are expressed as functions related to constraints Judge, input In, output Out, state State and behavior Action; automata include finite state automata FSM (In , Out, State, f(In), g(s)) and behavioral characteristi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a software vulnerability detection method based on a behavioral characteristic automaton model, comprising the steps of 1), loading the automaton model with data constraint to the flow from the vulnerability behavioral characteristic library, building an automaton model with data constraint; 2), converting the behavioral characteristic sequence in the vulnerability behavioral characteristic library into behavioral characteristic language by the automaton model; 3), cyclically judging if the behavioral characteristic has uniqueness or measuring similarity among measurement behavioral characteristic individuals by the automaton model; if the behavioral characteristic has uniqueness, detecting software state based on mathematical logic and reporting existence of the software vulnerability by the automaton model; if the behavioral characteristic has similarity, detecting software state based on Bayesian logic and reporting existence of the software vulnerability by the automaton model. Compared with the prior art, the method has the advantages of improving software vulnerability detection efficiency of a computer, etc.

Description

technical field [0001] The invention relates to a method for detecting computer software loopholes, in particular to a method for detecting software loopholes based on a behavioral feature automaton model. Background technique [0002] A software vulnerability is a security risk existing in a program. If it is exploited by a computer virus, it will cause serious harm to the system. Although many vulnerabilities have been discovered and a vulnerability database has been established, the description of the behavior of known vulnerabilities is not perfect. In the process of discovering unknown vulnerabilities based on these descriptions, a large amount of manual judgment is required, and the degree of automated reasoning is low. [0003] Main problems (1) The semantics of behavioral feature descriptions in the vulnerability database are too vague, and it is impossible to use the existing feature descriptions to judge the existence of unknown vulnerabilities in the software. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/10
Inventor 王勇王威谷大武吴亮成贵学黄亮亮
Owner SHANGHAI YUNJIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products