Method and device for detecting loophole of source code

A detection device and detection source technology, applied in the computer field, can solve problems such as analysis and high false alarm rate, and achieve the effects of improving comprehensiveness, reducing false alarm rate, and improving integrity

Inactive Publication Date: 2015-08-19
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD +1
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because this method does not perform relevant data dependency processing, the backtracking process of this method is only a simple identificat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting loophole of source code
  • Method and device for detecting loophole of source code
  • Method and device for detecting loophole of source code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be described in further detail below with reference to the accompanying drawings.

[0022] figure 1 A flow chart of a method for detecting source code vulnerabilities according to the present invention is illustrated. The method according to the present invention comprises step S1, step S2 and step S3.

[0023] Therein, the method according to the present invention is implemented by means of a detection device included in a computer device. Preferably, the source code is a website source code.

[0024] The computer equipment includes an electronic device that can automatically perform numerical calculation and / or information processing according to pre-set or stored instructions, and its hardware includes but is not limited to microprocessors, application-specific integrated circuits (ASICs), programmable gates Arrays (FPGA), digital processors (DSP), embedded devices, etc.

[0025] Wherein, the computer equipment includes network equipmen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to provide a method and a device for detecting a loophole of a source code. The method of the invention comprises the steps as follows: determining one or a plurality of sensitive nodes in an abstract syntax tree based on the abstract syntax tree corresponding to the source code; finding dependent nodes possessing dependency relationship with parameter information corresponding to initial nodes based on the abstract syntax tree so as to use the dependent nodes as child nodes of the initial nodes; using the dependent nodes as new initial nodes when the dependent nodes do not correspond to user input information, and repeating the above steps. The advantage of the solution of the invention is that the method and the device can be used for establishing path-sensitive information based on the dependency relationship of the data via analysis based on manners such as assignment operations so as to reduce false alarm rate of the loophole, and improving integrity of the obtained sensitive path, and comprehensiveness of detecting the loophole.

Description

technical field [0001] The present invention relates to the field of computer technology, and in particular, to a method and device for detecting source code vulnerabilities. Background technique [0002] The development of the Internet has brought people a convenient and rich experience, but the accompanying security problems are becoming more and more prominent. Vulnerability detection of Web sites is an important means to prevent security problems. It is mainly divided into two methods: dynamic and static analysis. Although dynamic detection has the advantages of high accuracy and low false positives, due to the limitations of its construction of simulated attacks, there must be High risk of false negatives. [0003] Static analysis is to find hidden security vulnerabilities in web pages by analyzing the code. Although it cannot guarantee the false positive rate of the detected vulnerabilities, it will greatly reduce false negatives. Although static analysis has been us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36
Inventor 过辰楷李鸣雷许静周向荣王丹曾莹白梦莹
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products