Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for mining bugs, and electronic equipment

A technology for loopholes and input files, applied in the fields of electronic digital data processing, instruments, computing, etc., can solve the problems of few types of input data, low efficiency of loophole mining, and missed loopholes.

Active Publication Date: 2016-04-06
ZHUHAI BAOQU TECH CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in this vulnerability mining method, there are many potential vulnerabilities due to various causes of the target application vulnerability, and the vulnerability mining of the target application based on modifying the text content in the customized script makes the type of input data generated (Types) are less, therefore, potential vulnerabilities in the target application will be missed, resulting in low vulnerability mining efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for mining bugs, and electronic equipment
  • Method and device for mining bugs, and electronic equipment
  • Method and device for mining bugs, and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0086] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0087] figure 1 It is a schematic flowchart of a method for mining vulnerabilities according to an embodiment of the present invention. see figure 1 , the method includes:

[0088] Step 11, obtaining an input file for vulnerability mining, and parsing the input file;

[0089] In this step, when the electronic device receives an externally transmitted input file, the method in the embodiment of the present invention intercepts the input file. Therefore, as an optional embodiment, figure 2 It is a schematic flowc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and a device for mining bugs, and electronic equipment. The method comprises the following steps: obtaining and analyzing an input file used for bug mining; if the analyzed input file comprises structural body head description information, extracting picture compatible type information in the structural body head description information; traversing the picture type information contained in the input file, filtering the picture type information contained in the input file from the picture compatible type information to obtain picture redundancy type information; according to the picture redundancy type information, independently converting pictures contained in the input file, and constructing an input file copy according to each input file which carries out picture conversion; and successively operating the input file copy to obtain the operation result information of the input file copy, and determining whether a target application program which operates the input file copy has the bugs or not according to the operation result information. The method and the device can be applied to improve bug mining efficiency.

Description

technical field [0001] The invention relates to computer loophole mining technology, in particular to a method, device and electronic equipment for mining loopholes. Background technique [0002] With the rapid development of computer network technology, the Internet has gradually become an indispensable part of people's work and life. However, due to the complexity of the Internet application environment and the diversity of Internet application programs, the application programs installed in electronic devices are vulnerable to network vulnerability attacks and threats such as computer viruses and Trojan horses. Among them, loopholes refer to the functional or security logic defects in the application program, and the loopholes in the application program can be discovered and repaired in time by using the vulnerability mining technology, which has a positive effect on protecting the personal information security and property security of Internet users. promotion. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
CPCG06F11/3612G06F11/3668
Inventor 王鑫
Owner ZHUHAI BAOQU TECH CO LTD