Vulnerability discovery method and device and electronic equipment

A technology of vulnerability mining and configuration data, applied in computer security devices, electrical digital data processing, instruments, etc., can solve problems such as long time required and low vulnerability mining efficiency, to improve efficiency, facilitate vulnerability reproduction, and improve The effect of accuracy

Active Publication Date: 2016-04-20
ZHUHAI BAOQU TECH CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in this vulnerability mining method, the target content in the script needs to be manually modified, and after each manual modification of the target content in the script, the script needs to be reloaded to the target application to run, and after the script load times out, it needs to be submitted again The script runs to the target application, which makes it take a long time to discover potential vulnerabilities in the target application, and the vulnerability mining efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability discovery method and device and electronic equipment
  • Vulnerability discovery method and device and electronic equipment
  • Vulnerability discovery method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0061] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0062] figure 1 It is a schematic flow chart of a vulnerability mining method according to an embodiment of the present invention. see figure 1 , the method includes:

[0063] Step 11, generating fuzzy configuration data based on the target application program;

[0064] In this step, as an optional embodiment, a fuzzy configuration data (Fuzzing-Data) generator is used to generate fuzzy configuration data. Among them, the fuzzy configuration data generator uses fuzzy technology to generate data, and can provide p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a vulnerability discovery method and device and electronic equipment. The method comprises the steps that fuzzy configuration data based on a target application program is generated; the target application program is started in a virtual machine arranged in advance, and a sample file for the target application program is read; the format of the sample file for the target application program is analyzed to obtain a data block, the fuzzy configuration data based on the target application program is called, and fuzzy configuration is carried out on the data block to generate fuzzy data; the fuzzy data is written into an input interface of the target application program, the fuzzy data runs in the target application program, and vulnerability discovery is carried out based on the information of a running result of the fuzzy data. By applying the vulnerability discovery method and device and the electronic equipment, the vulnerability discovery efficiency can be improved.

Description

technical field [0001] The invention relates to computer network security technology, in particular to a loophole mining method, device and electronic equipment. Background technique [0002] With the rapid development of computer network technology, the Internet has gradually become an indispensable part of people's work and life. However, while the Internet brings convenience to people, due to the complexity of the Internet application environment and the diversity of Internet applications, when people use the Internet through application software, the application software is vulnerable to computer viruses, Trojan horses, etc. Exploitation threat. Among them, loopholes refer to the functional or security logic defects in the application software, and are the defects and deficiencies in the hardware, application software, protocol implementation or system security strategy of the computer system. Therefore, using the vulnerability mining technology to dig out and repair t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 王鑫
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products