Method for vulnerability detection in Windows operating environment based on instrumentation tool
An operating environment and vulnerability detection technology, applied in the computer field, can solve the problems of deep hidden malicious code, single, limited sample processing, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0014] The specific implementation of the vulnerability detection based on the instrumentation tool described in the present invention is:
[0015] a) Create the target process in a suspended mode;
[0016] b) attach to the target process in debug mode;
[0017] c) Resume the operation of the target process until the memory management dynamic link library is loaded into the process space and complete the initialization and suspend again;
[0018] d) Separate the memory management dynamic link library from the process space;
[0019] e) Copy the stub-inserting startup routine to the target process space and point the process counter to the routine;
[0020] f) resume the operation of the target process;
[0021] g) Load instrumentation tool module enumeration (Pinvm.dll);
[0022] h) Loading the vulnerability trigger judgment module;
[0023] i) Instrument the target process, execute process instructions, and generate a vulnerability detection report.
[0024] The above s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com