Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerability mining method and device

A vulnerability mining and vulnerability technology, applied in the field of information security, can solve the problems of inability to analyze the object to be tested, inability to trigger the vulnerability of the object to be tested, and low efficiency of vulnerability mining, and achieve the effect of improving efficiency and success rate.

Active Publication Date: 2020-05-12
CHINA TELECOM CORP LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for some objects under test, such as multimedia frameworks, the above test samples may not be able to trigger the vulnerabilities of the object under test, or even make the object under test parse them
As a result, the efficiency of vulnerability mining is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability mining method and device
  • Vulnerability mining method and device
  • Vulnerability mining method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as any limitation of the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] figure 1 It is a flowchart of an embodiment of the vulnerability mining method of the present invention. Such as figure 1 As shown, the vulnerability mining method of this embodiment includes:

[0030] Step S102, forming a test sample conforming to the grammatical format of the obj...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability mining method and device, and relates to the field of information security. The vulnerability mining method comprises the following steps of: forming a test sample which accords with a syntax format of a to-be-tested object, wherein the test sample comprises a label character; inputting the test sample in the to-be-tested object to ensure that the to-be-tested object analyzes the test sample and generates memory overflow; and determining a vulnerability of the to-be-tested object according to a distribution position, in a memory, of the label character after the memory overflow. Through inputting the test sample which accords with the syntax format of the to-be-tested object and has the specific label character in the to-be-tested object, the to-be-tested object can analyze the test sample and generates the memory overflow, so that vulnerability mining can be carried out according to the distribution position, in the memory, of the label character and then the efficiency and success rate of the vulnerability mining are improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a vulnerability mining method and device. Background technique [0002] At present, most of the vulnerability mining and testing for applications, services or frameworks use randomly generated and unordered test samples, and the number of generated samples is large. However, for some objects under test, such as a multimedia framework, the above test samples may not be able to trigger the vulnerabilities of the object under test, or even make the object under test not be able to parse it. As a result, the efficiency of vulnerability mining is low. Contents of the invention [0003] A technical problem to be solved by the embodiments of the present invention is to provide an efficient vulnerability mining method. [0004] According to an aspect of an embodiment of the present invention, a vulnerability mining method is provided, including: forming a test sample conforming to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F11/36
Inventor 陈晓东王锦华朱易翔赵金波陈志煌
Owner CHINA TELECOM CORP LTD