Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for detecting vulnerability codes of applications

A technology for applying codes and codes, applied in computer security devices, instruments, electronic digital data processing, etc., can solve the problems of terminal being attacked or controlled, low effectiveness of vulnerable codes, lack of effective mechanisms, etc. Effect

Inactive Publication Date: 2017-03-29
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing methods for detecting application vulnerability codes are generally limited to discovering vulnerability codes through static analysis or dynamic analysis methods, and for the inspection and repair of vulnerability codes, there is often a lack of effective mechanisms
If the developer of the application fails to discover or fix the vulnerable code in time, the terminal running the application with the vulnerable code will face the threat of being attacked or controlled
Therefore, this method for detecting application vulnerability codes has the problem that the effectiveness of vulnerability code detection is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting vulnerability codes of applications
  • Method and device for detecting vulnerability codes of applications
  • Method and device for detecting vulnerability codes of applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0030] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0031] figure 1 An exemplary system architecture 100 to which embodiments of the present application may be applied is shown.

[0032] like figure 1 As shown, the system architecture 100 may include terminal devices 101 , 102 , a network 103 and a server 104 . The network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a method and device for detecting vulnerability codes of applications. The concrete embodiment of the method comprises following steps: obtaining application codes of applications; de-compiling application codes and generating intermediate codes in the pre-determined format; detecting whether the intermediate codes contain statements matched with pre-set vulnerability feature statements or not and determining that applications contain suspected vulnerability codes if so; and executing verification codes pre-set by the suspected vulnerability codes for the intermediate codes and determining whether the suspected vulnerability codes are exact vulnerability codes or not according to the execution result. The embodiment method helps increase effectiveness of detection of vulnerability codes of applications.

Description

technical field [0001] The present application relates to the field of computer technology, specifically to the field of code detection technology, and in particular to a method and device for detecting application vulnerability codes. Background technique [0002] Vulnerability refers to the weakness or defect of a system, the susceptibility of the system to specific threat attacks or dangerous events, or the possibility of the threat effect of the attack. Vulnerabilities may come from flaws in application software or operating system design or errors in coding, or from design flaws in the process of business interaction or unreasonable logic flow. These defects, errors or unreasonable parts may be used intentionally or unintentionally, thereby causing adverse effects on an organization's assets or operations, such as information systems being attacked or controlled, important information being stolen, user data being tampered with, and systems being used as Springboard fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033G06F21/56
Inventor 夏良钊包沉浮施敏贾志军
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD