Vulnerability detection method and device

A vulnerability detection and vulnerability technology, applied in the information field, can solve the problems of time-consuming and low efficiency of 0day vulnerability detection, and achieve the effect of ensuring safe use and improving detection efficiency

Active Publication Date: 2020-02-14
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current 0day vulnerability detection method basically relies on human experience to make judgments. However, this judgment method requires technicians to dig out the 0day vulnerabilities existing in the software from a large amount of data, which will consume a lot of time and cause 0day vulnerabilities. Detection efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0024] Embodiments of the present invention provide a vulnerability detection method, such as figure 1 As shown, the method includes:

[0025] 101. Obtain the file to be detected that the program crashes during startup.

[0026] Wherein, the file to be detected may be a non-PE (Portable Executable, portable executable) file, specifically, it may be a document file such as DOC, PDF, XLS, PPT, or a web page file.

[0027] The execu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability detection method and device and relates to the field of information technologies for improving the detection efficiency of an Oday loophole in order to configure corresponding patches timely. The method comprises the following steps of obtaining a to-be-detected file which has program crash when a program is started; analyzing the to-be-detected file through a preset script engine; and detecting whether the to-be-detected file conforms to predetermined exceptional conditions according to an analysis result; and if yes, determining that boot software corresponding to the to-be-detected file has the Oday loophole. The method and the device are suitable for vulnerability detection.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a loophole detection method and device. Background technique [0002] With the continuous development of social informatization, network security vulnerabilities are also increasing. When a vulnerability is found, it is necessary to fix the vulnerability through relevant patches in time. Vulnerabilities of this type that have been discovered and patched have been released are called known vulnerabilities; while vulnerabilities that have been discovered but have not been given relevant patches to fix the vulnerability are called 0day vulnerabilities. A malicious file is an abnormal file intentionally produced based on the 0day vulnerability of the software that loads the file. For example, the malicious file can be a malicious document file, which is specially crafted by a hacker based on the 0day vulnerability of the software that loads the document file. When the user ope...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 田阗边亮
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products