Automatic vulnerability detection method and device
A vulnerability detection and vulnerability technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as difficulty in meeting requirements, high testers, unsuitable for ordinary testers to test, etc., and achieve the effect of improving detection efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] In order to make the object, technical solution and advantages of the present invention clearer, various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. In each implementation manner of the present invention, many technical details are proposed in order to enable readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.
[0023] The first embodiment of the present invention relates to an automatic vulnerability detection method. The specific process is as figure 1 shown. Specifically include:
[0024] Step 11: Record the access records generated when the system under test is accessed.
[0025] Step 12: Match the access record with a plurality of preset vulnerability detection rules. Whe...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 