Method and device for mining bugs, and electronic equipment
A technology for loopholes and input files, applied in the fields of electronic digital data processing, instruments, computing, etc., can solve the problems of few types of input data, low efficiency of loophole mining, and missed loopholes.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0085] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0086] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0087] figure 1 It is a schematic flowchart of a method for mining vulnerabilities according to an embodiment of the present invention. see figure 1 , the method includes:
[0088] Step 11, obtaining an input file for vulnerability mining, and parsing the input file;
[0089] In this step, when the electronic device receives an externally transmitted input file, the method in the embodiment of the present invention intercepts the input file. Therefore, as an optional embodiment, figure 2 It is a schematic flowc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 