Vulnerability mining method and device
A vulnerability mining and vulnerability technology, applied in the field of information security, can solve the problems of inability to analyze the object to be tested, inability to trigger the vulnerability of the object to be tested, and low efficiency of vulnerability mining, and achieve the effect of improving efficiency and success rate.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as any limitation of the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0029] figure 1 It is a flowchart of an embodiment of the vulnerability mining method of the present invention. Such as figure 1 As shown, the vulnerability mining method of this embodiment includes:
[0030] Step S102, forming a test sample conforming to the grammatical format of the obj...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


