Loophole fingerprint based vulnerability code clone detecting method and device

A detection method and vulnerability technology, applied in the field of vulnerability fingerprint-based vulnerability code clone detection, can solve problems such as low detection efficiency and high false negative rate, and achieve high detection efficiency, low false positive rate, and wide application range. Effect

Active Publication Date: 2018-02-13
THE PLA INFORMATION ENG UNIV
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies in the prior art, the present invention provides a vulnerable code clone detection method based on vulnerability fingerprints and its device, which solves the high problems that occur when the code is modified to different degrees in the existing software vulnerable code clone detection process. In situations such as false negative rate, low detection efficiency, and limited appl

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Loophole fingerprint based vulnerability code clone detecting method and device
  • Loophole fingerprint based vulnerability code clone detecting method and device
  • Loophole fingerprint based vulnerability code clone detecting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0049] Vulnerable codes refer to key codes that lead to software vulnerabilities, and cloning of vulnerable codes may introduce the same vulnerabilities during the development process. In order to solve the existing problems such as weak ability to deal with code modification and low detection efficiency in the process of detecting vulnerable code clones, this embodiment provides a vulnerable code clone detection method based on vulnerability fingerprints, see figure 1 shown, including the following steps:

[0050] Step 11. Select the vulnerability v used to construct the fingerprint, query the vulnerability patch information from the public vulnerability information database, and obtain the corresponding vulnerable c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a loophole fingerprint based vulnerability code clone detecting method and device. The method includes steps of collecting a code sample, and building a loophole database; selecting the loophole and searching the loophole patch information, and acquiring a vulnerability code sample; structuring a code analyzer; pretreating the vulnerability code sample by means of the codeanalyzer to obtain a standard middle expression; dividing the middle expression to be a code block with size of s line; calculating a characteristic value of the code block through a hash function, and combining to generate the loophole fingerprint; pretreating the code to be detected by means of the code analyzer and acquiring a characteristic value sequence of the code to be detected; mapping the loophole fingerprint to n bit of bit drawing; identifying if the characteristic value sequence is existed with vulnerability code clone by means of the bit drawing and outputting it. The method anddevice can effectively deal with the common code modifying method in the code cloning, well balance the relationship between the detecting efficiency and the detecting accuracy, and effectively detect the large-scale objects while keeping good accuracy.

Description

technical field [0001] The invention belongs to the technical field of computer software vulnerability mining, in particular to a vulnerability code clone detection method based on vulnerability fingerprints and a device thereof. Background technique [0002] Vulnerable codes refer to key codes that lead to software vulnerabilities, and cloning of vulnerable codes may introduce the same vulnerabilities during the development process. With the increasing popularity of Internet applications, the growing demand for software has led to the need for efficient development. Therefore, reuse based on existing components and code templates has become a common means of software development, and open source software (OSS) has also become an important tool to improve software development. Good solution for efficiency and quality as well as lower programming costs. However, numerous vulnerabilities in OSS will naturally lead to a large number of software vulnerabilities caused by code c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/56
Inventor 魏强刘臻林超麻荣宽柳晓龙
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products