Unlock instant, AI-driven research and patent intelligence for your innovation.

Automatic vulnerability detection method and device

A vulnerability detection and vulnerability technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as difficulty in meeting requirements, high testers, unsuitable for ordinary testers to test, etc., and achieve the effect of improving detection efficiency.

Inactive Publication Date: 2016-10-26
LETV HLDG BEIJING CO LTD +1
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, this test method has high requirements for testers. If it is not professionally trained and has accumulated rich test experience, it is generally difficult to meet the requirements, and it is not suitable for ordinary testers (such as functional testers) to test
On the other hand, the existing test methods still have the problem of low test efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic vulnerability detection method and device
  • Automatic vulnerability detection method and device
  • Automatic vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. In each implementation manner of the present invention, many technical details are proposed in order to enable readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0023] The first embodiment of the present invention relates to an automatic vulnerability detection method. The specific process is as figure 1 shown. Specifically include:

[0024] Step 11: Record the access records generated when the system under test is accessed.

[0025] Step 12: Match the access record with a plurality of preset vulnerability detection rules. Whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of testing, and discloses an automatic vulnerability detection method and device. The method comprises the steps of recording an access record generated when a tested system is accessed; matching the access record with multiple preset vulnerability detection rules separately; and determining the vulnerability in the tested system according to the matching result. The invention further provides the automatic vulnerability detection device. By the vulnerability detection mode, the test efficiency can be improved and the requirements on a tester are low.

Description

technical field [0001] The invention relates to the field of testing, in particular to an automatic loophole detection method and device. Background technique [0002] When building a system, such as an online shopping system, there will inevitably be many loopholes (ie, bugs), such as SQL injection, that is, the failure to use parameterized queries leads to the generation of SQL injection loopholes, which is a very serious loophole. Some other vulnerabilities include: XSS (cross-site scripting), command execution, file inclusion, etc. [0003] Nowadays, many system tests in the industry generally focus on functional testing, that is, testing whether the system can realize its functions. For online shopping systems, it mainly tests whether users can add products to the shopping cart, place orders, Can you query order information and other functions. However, the industry neglects the testing of vulnerabilities. Once the loopholes in the system are known to the outside wor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 车祺丰
Owner LETV HLDG BEIJING CO LTD