Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerability detection method and device

A vulnerability and verification method technology, applied in the field of network security, can solve the problem of low vulnerability identification efficiency

Active Publication Date: 2021-04-20
ALIBABA GRP HLDG LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the embodiment of this application, the specified class set of the specified object is obtained by decompiling the executable program to be tested, and the implementation process of each class in the specified class set is checked multiple times according to the preset rules, and according to multiple The detection results jointly determine the vulnerability type of the executable program to be tested, achieving the purpose of automatic detection and improving the efficiency of vulnerability identification, and then solving the technical problem of low efficiency of vulnerability identification in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] According to an embodiment of the present invention, a method embodiment of a loophole detection method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0027] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a computer terminal of a loophole detection method according to an embodiment of the present invention. like figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors 1...

Embodiment 2

[0081] According to an embodiment of the present invention, a loophole detection device for implementing the above loophole detection method is also provided, such as Figure 5 As shown, the device includes:

[0082] The decompilation module 50 is used to decompile the executable program to be tested to obtain the specified class set of the specified object; Obtain symbol information such as the call relationship between objects, the affiliation relationship between functions and classes in the program, for example, it may include but not limited to: import table, export table, string information, class information, method name and corresponding address information Wait. The above-mentioned executable program to be tested may be an executable program obtained after parsing the system software or application software; optionally, the above-mentioned executable program to be tested may be represented as an executable file, for example, a macho format file in the iOS system.

...

Embodiment 3

[0097] Embodiments of the present invention may provide a computer terminal, and the computer terminal may be any computer terminal device in a group of computer terminals. Optionally, in this embodiment, the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.

[0098] Optionally, in this embodiment, the foregoing computer terminal may be located in at least one network device among multiple network devices of the computer network.

[0099] In this embodiment, the above-mentioned computer terminal can execute the program code of the following steps in the vulnerability detection method: decompile the executable program to be tested to obtain the specified class set of the specified object; traverse the classes in the specified class set, and The implementation process of each class in the specified class set is subjected to multiple detections according to preset rules; and the vulnerability type of the executable program to be te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a leak detection method and device. Wherein, the method includes: decompiling the executable program to be tested to obtain the specified class set of the specified object; traversing the classes in the specified class set, and implementing the process of each class in the specified class set according to preset rules performing multiple detections; jointly determining the vulnerability type of the executable program to be tested according to the detection results of the multiple detections.

Description

technical field [0001] The present invention relates to the field of network security, in particular to a method and device for detecting loopholes. Background technique [0002] At present, the detection of terminal vulnerabilities can be roughly divided into two methods: dynamic detection and static detection. Proxy the IP address and port, start the mobile application, manually trigger the network connection behavior of the application, and check whether the communication content of the hypertext transfer protocol over secure socket (HTTPS) can be intercepted on the proxy server, so as to Determine whether there is a man-in-the-middle attack vulnerability; and the implementation method of static detection is to perform rule matching detection on the proxy method "connection:canAuthenticateAgainstProtectionSpace:" and its implementation. [0003] It can be seen that although the dynamic detection method in the related technology can accurately find the loopholes, it must ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 胡晓明
Owner ALIBABA GRP HLDG LTD