Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for establishing vulnerability model based on chemical abstract machine

A construction method and vulnerability technology, which is applied in the field of vulnerability model construction based on chemical abstract machines, can solve the problems of difficult vulnerability causes and no vulnerability cause models, etc., and achieve the effect of improving effectiveness and accuracy

Active Publication Date: 2017-11-24
中国人民解放军63928部队 +1
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] These initial research results at home and abroad provide basic information for our research, but there are still some problems in the analysis of the causes of vulnerability and characteristics, such as the difficulty of formally describing the causes of vulnerability, and none of them reflect the causes of vulnerability. valid models of etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing vulnerability model based on chemical abstract machine
  • Method for establishing vulnerability model based on chemical abstract machine
  • Method for establishing vulnerability model based on chemical abstract machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be further described below in conjunction with the accompanying drawings and examples. It should be noted that the described examples are only intended to facilitate the understanding of the present invention, and have no limiting effect on it.

[0057] The invention provides a method for constructing a vulnerability model based on a chemical abstract machine for the purpose of studying the nature of the vulnerability. The present invention firstly designs a vulnerability internal cause characterization method, then extracts vulnerability attributes, and finally constructs a vulnerability model based on a chemical abstract machine, which has important guiding significance for studying the cause of vulnerability.

[0058] First, several concepts involved in the definition of the present invention are defined as follows.

[0059] Definition 1 Data control flow graph FG: FG=(T, E, λ, μ), where T represents the node on the data control flow graph,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for establishing a vulnerability model based on a chemical abstract machine and belongs to the field of trusted computing. The method comprises the steps that 1, a vulnerability internal-cause characterization method is designed based on a data control flow diagram; 2, vulnerability attributes are extracted by analyzing vulnerability examples in a public vulnerability library, and expression and description of the types and causes of the vulnerability model are achieved; 3, chemical abstract machine semantics of the vulnerability are established based on the vulnerability attributes; 4, chemical abstract machine vulnerability models of an internal cause and an external cause are established based on the chemical abstract machine semantics of the vulnerability. In addition, a preliminary prototype system-vulnerability model analysis system is also achieved, the method is compared with other bug mining tools, and the effectiveness of the method is verified. The method can help to further deeply know the essence of the vulnerability, is conductive to the improvement of vulnerability acquaintance, and accordingly helps to reduce the losses brought by the vulnerability to national security, economic stability and social development.

Description

technical field [0001] The invention belongs to the field of trusted computing, and relates to a method for constructing a vulnerability model based on a chemical abstract machine, including proposing a method for characterization of internal factors of vulnerability, extracting vulnerability attributes and constructing a vulnerability model based on a chemical abstract machine. Background technique [0002] With the continuous development of the Internet and software technology, software plays an increasingly important role in the process of social development. However, at the same time, the number of software vulnerabilities is increasing, showing a growing trend, and causing more and more harm, which poses a certain degree of threat to national security, economic stability and social development. The study of sexuality has gradually attracted the attention of scholars at home and abroad. [0003] The research on software vulnerability began in the 1970s. Researchers devo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 李响陈锦富林哲超章琳王梓斌周敏敏谢网根
Owner 中国人民解放军63928部队
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products