Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software vulnerability analytical method based on scene model

A scenario model and software vulnerability technology, applied in the field of network security, can solve the problems of lack of comprehensive use of multiple analysis methods and lack of in-depth testing.

Active Publication Date: 2013-04-03
706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
View PDF6 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Lack of in-depth testing: Vulnerability analysis technology is mainly aimed at specific interfaces and data, and conducts vulnerability analysis based on specific code patterns and behavior patterns, lacking the comprehensive use of multiple analysis methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software vulnerability analytical method based on scene model
  • Software vulnerability analytical method based on scene model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] A scenario-based software vulnerability analysis system includes: a software static analysis module 1, a scenario modeling module 2, a test control module 3, a test data loading module 4, a software operation monitoring module 5, and a software communication module 6.

[0062] (1) Software static analysis module

[0063] The main function of the software static analysis module is to analyze the executable code statements of the software one by one to obtain the execution path of the software, mark the man-machine interface code of the software and the data interface code interacting with other software, and obtain the software development language, operating platform, database, Constituent files, function call parameters, user interface and other information.

[0064] (2) Scene modeling module

[0065] The main function of the scene modeling module is to establish the user state collection of the software according to the composition files and function call parameters ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a software vulnerability analytical method based on a scene model and belongs to the field of network safety. The software vulnerability analytical method is characterized by comprising the following steps: scanning a construction scene set of a software code, analyzing an establishing scene model of the software code and running a software system; recording a software action; and selecting a test case according to the characteristics of user software and converting the test case according to a software running path of a user. The method is the software vulnerability analytical method oriented to a browser B / server S framework; the vulnerability of the software system of the user is tested and verified at the aspects of code, module, interface, function calling relation, and the like of the software system of the user; the vulnerability position is located; and the method has the advantages that the generality is strong and the recessive right-promoting vulnerability is detected.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a B / S architecture-oriented software vulnerability analysis method. Background technique [0002] Software security loopholes threaten network information security, provide opportunities for malicious attackers, and open the door for the wanton spread of malicious codes such as Trojan horses and viruses. With the development of the software industry, the problem of software security loopholes has become increasingly prominent. In order to detect and patch software vulnerabilities early, it is first necessary to test and verify the security vulnerabilities of the software. [0003] Software vulnerability analysis and verification technology tests and analyzes software script codes and runtime behavior states, discovers data that triggers software vulnerabilities, locates software vulnerabilities in the code, and provides a basis for patching software vulnerabilities. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57H04L29/08
Inventor 郑亮刘向东游春凌李红王斌
Owner 706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products