Vulnerability detection method and device

A vulnerability detection and vulnerability technology, which is applied in the field of information security, can solve the problems of vulnerability parameter consumption, manpower, and inability to effectively identify the location of vulnerabilities, and achieve the effect of improving application security

Active Publication Date: 2017-06-09
ALIBABA GRP HLDG LTD
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a vulnerability detection method and device to at least solve the technical problem of requiring more manpower to analyze the vulnerability caused by the inability of the existing technology to effectively identify the location of the vulnerability and the parameters of the vulnerability to be repaired

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] According to the embodiments of the present application, a method embodiment of a vulnerability detection method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer executable instructions, and Although the logical sequence is shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than here.

[0022] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structure block diagram of a computer terminal of a vulnerability detection method in an embodiment of the present application. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processor 102 (the processor 102 may inc...

Embodiment 2

[0067] According to the embodiment of the present application, an apparatus embodiment for implementing the above method embodiment is also provided. The apparatus provided in the above embodiment of the present application can run on a computer terminal.

[0068] Figure 4 It is a schematic structural diagram of a vulnerability detection device according to an embodiment of the present application.

[0069] Such as Figure 4 As shown, the vulnerability detection device may include a first acquisition unit 402, a search unit 404, a judgment unit 406, a second acquisition unit 408, and a detection unit 410.

[0070] Wherein, the first obtaining unit 402 is used to obtain the source code file of the target application, where the source code file contains the identification information of the target application; the searching unit 404 is used to search whether the identification information has been stored in the database, And when the identification information has been stored in the d...

Embodiment 3

[0085] According to the embodiment of the present application, an apparatus embodiment for implementing the above method embodiment is also provided. The apparatus provided in the above embodiment of the present application can run on a computer terminal.

[0086] Figure 8 It is a schematic structural diagram of a vulnerability detection device according to an embodiment of the present application.

[0087] Such as Figure 8 As shown, the vulnerability detection device may include an open source application address crawler engine 802, a resource availability analysis engine 804, a download engine 806, a file decompression engine 808, a file change analysis engine 810, and a core vulnerability analysis engine 812.

[0088] The first part is the timely monitoring of source code changes and analysis of vulnerability files.

[0089] For a large number of Internet applications that have special situations such as randomization of file names and randomization of download links during applic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability detection method and device. The method comprises the steps that a source-code file of a target application is obtained, wherein the source-code file contains identification information of the target application; whether the identification information is stored in a database or not is found, and under the condition that the identification information is stored in the database, an original source-code file corresponding to the identification information is extracted from the database; whether the source-code file is identical to the original source-code file or not is judged, and if not, first source codes, different from those of the original source-code file, in the source-code file are obtained; the first source codes are matched with a prebuilt vulnerability fixing characteristic model, and vulnerabilities fixed by the first source codes are determined. By means of the vulnerability detection method and device, the technical problems that in the prior art, the vulnerability position and fixed vulnerability parameters cannot be effectively recognized, and accordingly more labor needs to be consumed for vulnerability analysis are solved.

Description

Technical field [0001] This application relates to the field of information security, and specifically to a method and device for vulnerability detection. Background technique [0002] In recent years, as more and more Internet applications have become open source, the probability of application vulnerabilities has also increased greatly. Manufacturers will also release new versions that include patches to launch vulnerabilities fixes for various applications. During the release of the new version, relevant personnel need to know the location and parameters of the vulnerabilities fixed by the new version to determine the security of the new version. [0003] However, most of the current technologies simply monitor the message on the patch page, download the patch on the corresponding page, and read the vulnerability description file to passively obtain some information about the vulnerability, and cannot effectively identify the location of the vulnerability and the vulnerability p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
CPCG06F11/3604
Inventor 曾欢
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products