Vulnerability detection method and device
A vulnerability and verification method technology, applied in the field of network security, can solve the problem of low vulnerability identification efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] According to an embodiment of the present invention, a method embodiment of a loophole detection method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0027] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a computer terminal of a loophole detection method according to an embodiment of the present invention. like figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors 1...
Embodiment 2
[0081] According to an embodiment of the present invention, a loophole detection device for implementing the above loophole detection method is also provided, such as Figure 5 As shown, the device includes:
[0082] The decompilation module 50 is used to decompile the executable program to be tested to obtain the specified class set of the specified object; Obtain symbol information such as the call relationship between objects, the affiliation relationship between functions and classes in the program, for example, it may include but not limited to: import table, export table, string information, class information, method name and corresponding address information Wait. The above-mentioned executable program to be tested may be an executable program obtained after parsing the system software or application software; optionally, the above-mentioned executable program to be tested may be represented as an executable file, for example, a macho format file in the iOS system.
...
Embodiment 3
[0097] Embodiments of the present invention may provide a computer terminal, and the computer terminal may be any computer terminal device in a group of computer terminals. Optionally, in this embodiment, the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.
[0098] Optionally, in this embodiment, the foregoing computer terminal may be located in at least one network device among multiple network devices of the computer network.
[0099] In this embodiment, the above-mentioned computer terminal can execute the program code of the following steps in the vulnerability detection method: decompile the executable program to be tested to obtain the specified class set of the specified object; traverse the classes in the specified class set, and The implementation process of each class in the specified class set is subjected to multiple detections according to preset rules; and the vulnerability type of the executable program to be te...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


