Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for identifying file overflow vulnerability

A file and vulnerability technology, applied in the fields of instrumentation, electrical digital data processing, platform integrity maintenance, etc.

Active Publication Date: 2016-06-29
HARBIN ANTIY TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the above problems, the present invention proposes a method and system for identifying file overflow vulnerabilities, which solves the defect that the prior art can only manually analyze file overflow vulnerabilities, and can quickly identify file overflow vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identifying file overflow vulnerability
  • Method and system for identifying file overflow vulnerability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0027] In order to solve the above problems, the present invention proposes a method and system for identifying file overflow vulnerabilities, which solves the defect that file overflow vulnerabilities can only be manually analyzed in the prior art, and can quickly identify file overflow vulnerabilities.

[0028] A method for identifying file overflow vulnerabilities such as figure 1 shown, including:

[0029] S101: Read the file content and file size of the file to be detected, and save it in the memory;

[0030] S102: According to the format of the file to be detected, tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for identifying file overflow vulnerability. The method comprises the following steps: reading the file contents and the file size of a file to be detected, and storing the file contents and the file size into a memory; according to the file format of the file to be detected, carrying out traversal on the file contents loaded into the memory; carrying out statistics on data length which is not subjected to traversal in the file to be detected; judging whether the data length which is not subjected to traversal in the file to be detected is greater than 0 or not, proving that the file to be detected may have the overflow vulnerability if the data length which is not subjected to traversal in the file to be detected is greater than 0, and sending the file to be detected to an overflow vulnerability scanner to carry out further scanning; and otherwise, proving that no overflow vulnerability is in the presence. Through the method of the invention, the file overflow vulnerability can be quickly identified only in a way that the file format of the file needs to be known. Compared with other vulnerability identification technologies, the method disclosed by the invention can save a great quantity of time cost.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to a method and system for identifying file overflow vulnerabilities. Background technique [0002] A file is a file that includes not only text but also graphics, spreadsheet data, sound, video images, and other information, such as Office files, PDF files, Flash files, compressed type files, etc. With the widespread use of files, more and more hackers use overflow vulnerabilities in file parsers (readers) to launch attacks. The main hazards include stealing important system information and infecting systems. Especially malicious attacks launched by exploiting oday file overflow vulnerabilities pose a huge threat to users' computers. [0003] A file is a binary data file organized according to a certain format, and the file parser needs to parse it step by step according to the format of the file, and finally display the parsed content on the interface. General file overf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/562G06F21/577
Inventor 童志明黄磊肖新光
Owner HARBIN ANTIY TECH