Vulnerability mining method and device based on binary program
A binary program and vulnerability mining technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve problems such as the impact of vulnerability mining effects, achieve the effect of reducing repeated parts and improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments in this application belong to the protection scope of this application.
[0031] In order to facilitate the understanding of the embodiments of the present application, several concepts are briefly introduced below.
[0032] Dynamic vulnerability mining based on path traversal actually uses the idea of tainted data propagation analysis, mainly to monitor the so-called "untrusted data", that is, the propagation trajectory of tainted data. Taint data usually comes from user input, including command line parameters, graphical interface interaction data, file data, network communication data,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

