Vulnerability detection method and device

A vulnerability detection and vulnerability technology, applied in the field of vulnerability detection, can solve problems such as low efficiency and vulnerability detection lag, and achieve the effect of improving user experience, providing vulnerability detection performance, and improving vulnerability detection efficiency.

Active Publication Date: 2019-06-11
ALIBABA GRP HLDG LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Existing technical solutions mainly detect whether the vulnerability exists by manually running the poc code (Proof of Concept, verification test code) corresponding to the information of the vulnerability, so the efficiency is low. Follow-up requires manual detection, so there is a lag in the detection of vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0068] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0069] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vulnerability detection method and equipment. The vulnerability detection method includes the steps: acquiring the information of vulnerability; processing the verification test code corresponding to the information of vulnerability, and integrating the processed verification test code with an integrated page; utilizing a tested object to load the integrated page, and triggering automatic detection of the processed verification test code; and generating a result about whether the tested object has vulnerability, and the information of the corresponding vulnerability when the vulnerability exists. The vulnerability detection method and equipment can realize integrated and automatic operating vulnerability detection, thus greatly improving the vulnerability detection efficiency, improving the vulnerability detection performance, and further improving the user experience.

Description

technical field [0001] The application relates to the fields of communication and computer, in particular to a vulnerability detection method and equipment. Background technique [0002] Vulnerability refers to the weakness or defect of a system, the susceptibility of the system to specific threat attacks or dangerous events, or the possibility of the threat effect of the attack. Vulnerabilities may come from flaws in application software or operating system design or errors in coding, or from design flaws in the process of business interaction or unreasonable logic flow. These defects, errors or unreasonable parts may be used intentionally or unintentionally, thereby causing adverse effects on an organization's assets or operations, such as information systems being attacked or controlled, important information being stolen, user data being tampered with, and systems being used as Springboard for intrusion into other host systems. Judging from the vulnerabilities discover...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/57G06F16/951
Inventor 李天祥
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products