Method and device for evaluating code file security
A code file and security technology, applied in the field of computer software, can solve problems such as low accuracy and low detection efficiency of security detection schemes, and achieve the effect of improving accuracy and detection efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] According to an embodiment of the present invention, an embodiment of a method for evaluating the security of a code file is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions , and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0057] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a computer terminal of a method for evaluating the security of a code file according to an embodiment of the present invention. like figure 1 As shown, the computer terminal 10 may include one or more (onl...
Embodiment 2
[0113] According to an embodiment of the present invention, a device embodiment for implementing the above method for evaluating code file security is also provided. Figure 4 It is a structural block diagram of a device for evaluating code file security according to an embodiment of the present invention. like Figure 4 As shown, the device includes: a parsing module 10 for parsing variable functions and assignment expressions from the code file to be detected; a restoration module 20 for restoring direct call functions and original call functions according to variable functions and assignment expressions Function; evaluation module 30, configured to evaluate the security of the code file by using a preset safety factor corresponding to the directly called function and a preset safety factor corresponding to the original called function.
[0114]The technical solutions provided by the embodiments of the present invention can be applied to webshell static detection of PHP scr...
Embodiment 3
[0126] Embodiments of the present invention may provide a computer terminal, and the computer terminal may be any computer terminal device in a group of computer terminals. Optionally, in this embodiment, the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.
[0127] Optionally, in this embodiment, the foregoing computer terminal may be located in at least one network device among multiple network devices of the computer network.
[0128] Optionally, Figure 7 It is a structural block diagram of a computer terminal according to an embodiment of the present invention. like Figure 7 As shown, the computer terminal may include: one or more (only one is shown in the figure) processors and memory.
[0129] Wherein, the memory can be used to store software programs and modules, such as the program instructions / modules corresponding to the method and device for evaluating the security of code files in the embodiment of the present ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


