Sensitive point approach method based on intelligent path guidance
A path guidance, sensitive point technology, applied in error detection/correction, instrument, software maintenance/management, etc., can solve the problems of increasing the complexity of technical implementation, huge symbolic expressions, complex path conditions, etc., to alleviate the problem of path explosion , the purpose is strong, the effect of reducing the false alarm rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] Example 1, see figure 2 As shown, a sensitive point approach method based on intelligent path guidance includes the following steps:
[0042] Step 1. Mark sensitive points, extract different types of vulnerability models, identify suspicious vulnerability locations through static analysis, and mark them as sensitive points;
[0043] Step 2. Take the sensitive point as the starting point, use the path backtracking algorithm to backtrack up, find all path branch points, find the jump instruction address, until backtracking to the path branch point closest to the program entry point, put all path branch points into the available Arrival path set T=(t 1 ,t 2 ...t m );
[0044] Step 3. Perform instruction-level instrumentation on the program under test, input the initial sample, and record the binary instruction sequence related to the stain;
[0045] Step 4. Upgrade the binary instruction sequence to an intermediate language description;
[0046] Step 5. Obtain the path branch poin...
Embodiment 2
[0048] Example two, see Figure 2~3 As shown, a sensitive point approximation method based on intelligent path guidance is used to intelligently guide the path through the following steps, and finally reach the buffer overflow sensitive point, as follows:
[0049] Step 1. Mark sensitive points, extract different types of vulnerability models, identify suspicious vulnerability locations through static analysis, and mark them as sensitive points;
[0050] Step 2. Take the sensitive point as the starting point, use the path backtracking algorithm to backtrack up, find all path branch points, find the jump instruction address, until backtracking to the path branch point closest to the program entry point, put all path branch points into the available Arrival path set T=(t 1 ,t 2 ...t m ), specifically including the following:
[0051] Step 2.1. Mark the position of the sensitive point as A, establish queues L1 and L2, and initialize them to empty;
[0052] Step 2.2. Get A's cross-referen...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com