Program vulnerability detection method, device, computing device and storage medium

A vulnerability detection and program technology, applied in computing, computer security devices, instruments, etc., can solve the problems of high detection frequency and program execution efficiency, and achieve the effect of high detection efficiency and high security.

Active Publication Date: 2017-11-03
360 TECH GRP CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method needs to insert the code to complete the corresponding work in the tested program, and needs to insert a large number of detection poin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program vulnerability detection method, device, computing device and storage medium
  • Program vulnerability detection method, device, computing device and storage medium
  • Program vulnerability detection method, device, computing device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0051] figure 1 A flow chart of a program vulnerability detection method according to an embodiment of the present invention is shown. Such as figure 1 As shown, the method includes the following steps:

[0052] Step S101, selecting an input use case from the input use case set, and starting the target program to run the selected input use case.

[0053] The input use case set stores several input use cases, and these input use ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a program vulnerability detection method, device, computing device and storage medium. The method includes that an input case is selected from input use case set, and then the target program is started to run the selected input case; a control flow path in the running of the target program is obtained and recorded; false information on the control flow path is obtained through testing the control flow path; the program vulnerability is determined according to the false information. The program vulnerability device provides a scheme for automatically discovering potential threats of program products. Detection codes do not need to insert in the target program of this scheme, and no modification happens to the target program. The program vulnerability device is suitable for black box testing of non-open source software system or large program products, and the detection scheme is high in detection efficiency and high in security.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a program loophole detection method and device, a computing device, and a storage medium. Background technique [0002] Vulnerability refers to the weakness or defect of a system, the susceptibility of the system to specific threat attacks or dangerous events, or the possibility of the threat effect of the attack. Vulnerabilities may come from flaws in application software or operating system design or errors in coding, or from design flaws in the process of business interaction or unreasonable logic flow. These defects, errors or unreasonable parts may be used intentionally or unintentionally, thereby causing adverse effects on an organization's assets or operations, such as information systems being attacked or controlled, important information being stolen, user data being tampered with, and systems being used as Springboard for intrusion into other host systems. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/52
CPCG06F21/52G06F21/577
Inventor 潘剑锋闫广禄范晓草
Owner 360 TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products