A third-party component vulnerability detection method based on binary code features
A binary code and vulnerability detection technology, which is applied in the field of third-party component vulnerability detection, can solve problems such as rare involvement, and achieve the effect of improving detection efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.
[0026] Such as figure 1 , figure 2 The third-party component vulnerability detection method based on binary code characteristics is different in that it includes the following steps:
[0027] First, extract the multi-dimensional features of the third-party components, and construct the feature library of the third-party components. Specifically, the binary code features in the third-party components are extracted, and the invariants in the process from source code and compilation to binary code are selected and stored in the feature library. The invariants include constant strings, digital constants, and digitized function signatures. One or more of the vectors. Durin...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


