Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability detecting method and device of application program

An application program and vulnerability detection technology, applied in software testing/debugging, etc., can solve problems such as paralysis, incomplete source code vulnerability detection, and affecting computer system performance, so as to improve performance and avoid intrusion or paralysis.

Active Publication Date: 2013-06-19
ALIBABA GRP HLDG LTD
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a vulnerability detection method for an application program, which is used to solve the problem in the prior art that due to incomplete source code vulnerability detection, the actual execution of the application program affects the performance of the computer system that executes the application program, and even causes paralyzing problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detecting method and device of application program
  • Vulnerability detecting method and device of application program
  • Vulnerability detecting method and device of application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0032] The application is applicable to numerous general purpose or special purpose computing device environments or configurations. For example: personal computer, server computer, handheld or portable device, tablet type device, multiprocessor device, distributed computing environment including any of the above devices or devices, etc.

[0033] This application may be described in the general context of computer-executable instructions, such as program modules, being executed by a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability detecting method and a device of an application program. The vulnerability detecting method of the application program comprises the following steps: a compiler compiles a source code of a to-be-detected professional hypertext preprocessor (PHP) application program to a virtual execution code; a virtual executor conducts vulnerability detecting in the process of executing the virtual execution code; according to a constant variable set stored in a storage, a constant function set reserves and cleans a function rule base, and the virtual executor recognizes currently generated constant variable; and according to the constant variable and a vulnerability rule base in the storage, the virtual executor detects whether vulnerability exists in a current PHP function required to be called. With adoption of the vulnerability detecting method or the device of the application program, vulnerability detecting of the source code of the PHP is complete and accurate, and the phenomenon that a computer system executing the application program is invaded or crashed due to the actual execution of the PHP application program can be avoided.

Description

technical field [0001] The present application relates to the field of network data processing, in particular to a method and device for detecting application loopholes. Background technique [0002] An application program refers to a computer program developed to run on an operating system in order to complete one or several specific tasks. The PHP (Hypertext Preprocessor) application is one of many applications. PHP is an HTML (Hypertext Markup Language) embedded language that is executed on the server side. A scripting language embedded in HTML documents. PHP is to embed the application program in the HTML document to execute, because it needs to be correct during the execution process, so the vulnerability detection of the PHP application program is very necessary. [0003] In the prior art, there is a method for detecting a vulnerability of an application program. Taking a PHP application program as an example, it is mainly implemented based on static analysis of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36
Inventor 姜晓东
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products