Software security flaw discovering system

A software security and defect technology, which is applied in the field of software security defect discovery system, can solve problems such as difficult to understand format, difficulty, and high learning cost of defect reports, and achieve the effects of improving the detection range, reducing the difficulty of use, and improving detection efficiency

Active Publication Date: 2015-11-18
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This has resulted in a high learning cost for software security defect detection. For a large-scale project with mixed languages, it is necessary to be proficient in various testing tools to achieve a relatively complete security defect detection. During software development, there is little testing for security flaws
[0007] Secondly, the defect reports generated by existing defect detection tools are difficult to understand and have inconsistent formats. Even if a relatively complete security defect detection is carried out on a software project, it will be very difficult to read all kinds of reports quickly and easily, and Due to the scattered defect reports, it is not convenient to have an overall understanding of software security defects
[0008] Thirdly, current defect detection usually only provides detection and vi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software security flaw discovering system
  • Software security flaw discovering system
  • Software security flaw discovering system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0025] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0026] The present invention provides a software security defect discovery system (hereinafter referred to as the system), such as figure 1 As shown, it includes behavior static testing module, behavior monitoring module, fuzz testing module, penetration testing module, knowledge base and defect database; where, the knowledge base includes behavior monitoring knowledge base and penetration knowledge base, and the behavior monitoring knowledge base is used to store behavior The sequence call sequence segment generated by the software training of the monitoring module is used as a reference call sequence, and the penetration knowledge base is used to store penetration test cases for penetration testing; the defect database is used to store sorted and formatted defect data.

[0027] The security detection of the software to be tested is completed by the monit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software security flaw discovering system. The system of the invention could be used for performing static analysis, behavior monitor, fuzz testing and penetration testing to software to be tested. The test mode is complete, so the system of the invention could completely and accurately search the security flaw of the software and improve the detection speed. A static analysis module is used for storing the obtained security flaw data in a flaw database according to set database format by performing the static analysis firstly, and then a behavior monitoring module, a fuzz testing module and a penetration testing module are separately used for detecting the security flaw obtained by the static analysis module, and simultaneously performing conventional detection to the software to be tested, and storing a system call sequence, a fuzz testing case or a penetration testing case, which will cause abnormal behavior and security problem to the problem in the flaw database. The system of the invention could realize the complete and powerful flaw detecting process, and reduce the use difficulty of security flaw testing personnel because of the automatic detecting process.

Description

technical field [0001] The invention relates to the technical field of software safety testing, in particular to a software safety defect discovery system. Background technique [0002] At present, there are many kinds of software security defect detection technologies and scattered. The main detection methods are static analysis, behavior monitoring, fuzz testing and penetration testing. However, the above four types of detection methods have completely different detection methods for software. For example, using static analysis to detect software security flaws is usually aimed at the source code of the software, and there are also some tools that can decompile executable files of Java and .NET programs for static analysis. The current static analysis security defect detection tools are all aimed at some mainstream programming languages, and different programming languages ​​have their corresponding static analysis tools. For example, there are CppCheck and Antic for C / C+...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36
Inventor 胡昌振赵小林付裕王子阳薛静锋
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products