Test model and test method of vulnerability discovery technology

A technology of vulnerability mining and testing methods, which is applied in software testing/debugging, error detection/correction, instruments, etc., to achieve the effect of improving the level of automation and facilitating use

Active Publication Date: 2017-11-21
中国人民解放军63928部队 +1
View PDF6 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

By examining the previous research results on software vulnerability detection, we found that there are no universal vulnerabil

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Test model and test method of vulnerability discovery technology
  • Test model and test method of vulnerability discovery technology
  • Test model and test method of vulnerability discovery technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to understand more clearly the technical content of the test model and test platform of a vulnerability mining method of the present invention, the present invention will be further described below in conjunction with the accompanying drawings and specific implementation cases. It should be pointed out that the described implementation cases are intended to This is to facilitate understanding of the present invention without requiring any limitation thereto.

[0054] The purpose of the present invention is to solve the problem of how to select suitable and effective vulnerability mining methods and tools for different environments and different scenarios in actual vulnerability mining, and provides a test process model of a vulnerability mining method, which effectively improves the vulnerability The automation level of the mining method, and an integrated testing platform is designed and implemented based on the testing process model of the vulnerability mining...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a test model and test method of a vulnerability discovery technology, and belongs to the field of software engineering. The method includes the steps that 1, based on existing static and dynamic vulnerability discovery methods, a self-adaptive vulnerability discovery operation environment is constructed; 2, according to different vulnerability types, vulnerability languages and vulnerability trigger methods, a test case set is constructed and configured; 3, the vulnerability discovery test method is executed, the discovery test state is monitored, and meanwhile a test analysis report and statistical test results are output; 4, based on the vulnerability discovery test process model, an integrated test platform is designed and achieved, and the feasibility and validity of the vulnerability discovery test model are further verified. According to the test model and test method of the vulnerability discovery technology, existing typical vulnerability discovery methods and tools are accurately evaluated by means of a series of specific evaluation standards, moreover, comparative analysis is conducted on these methods and tools, and the test model and the test method have certain guiding significance for selection of the most suitable and the most efficient method or tool in the actual vulnerability discovery process.

Description

technical field [0001] The invention belongs to the field of loophole mining in software testing, and relates to a loophole mining technology test model and a testing method. Background technique [0002] With the rapid development of social information technology, various application software emerges at the historic moment in the market. The quality of these software itself is uneven, and most of the software is put into use without standardized review and strict testing, resulting in a large number of software vulnerabilities that can be attacked and exploited in these software. At present, the main factors that threaten system security are unknown loopholes in application software, various communication security protocols, and operating systems that constitute information systems. Due to various reasons, the existence of vulnerabilities is unavoidable. If some serious unknown vulnerabilities are discovered by attackers, these unknown vulnerabilities are likely to be expl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36G06F21/56G06F21/57
CPCG06F11/3664G06F11/3684G06F11/3688G06F21/563G06F21/566G06F21/577
Inventor 李津陈锦富黄敏桓陈书杰曾智锋谢网根张庆晨
Owner 中国人民解放军63928部队
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products