Software vulnerability detection method, graded response method and software vulnerability detection system

A software vulnerability and detection method technology, which is applied in the directions of instruments, computing, and electrical digital data processing, etc., can solve the problems of high performance loss and achieve the effects of improved accuracy, low storage overhead, and low performance overhead

Active Publication Date: 2018-04-06
HUAZHONG UNIV OF SCI & TECH
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above defects or improvement needs of the prior art, the present invention provides a software vulnerability detection method and a software vulnerability detection system, the purpose of which is to solve the technical problem of high performance loss caused by monitoring a large number of programs in the existing vulnerability detection method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software vulnerability detection method, graded response method and software vulnerability detection system
  • Software vulnerability detection method, graded response method and software vulnerability detection system
  • Software vulnerability detection method, graded response method and software vulnerability detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0049] figure 1 The flow chart of the software vulnerability detection method based on control flow exception provided by the present invention, the software vulnerability detection method includes the following steps:

[0050] Step 1: Construct a behavior feature set that can characterize the software control flow sequence. All control flow sequences in the behavior feature set are considered ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software vulnerability detection method, graded response method and software vulnerability detection system. The software vulnerability detection method comprises the following steps of: constructing a software control flow behavior set through a static analysis technology; in a software execution process, obtaining a real-time verification value of each judging block through inserting verification codes of a feature value and a calculation verification value of each judging module into a software code corresponding to the judging block; and comparing the real-time verification values with the software control flow behavior feature set in real time to output a software vulnerability detection result. According to the software vulnerability detection method, real-time software behavior monitoring can be carried out under the condition of low-performance loss, abnormal control flows generated as programs are attacked can be correctly and efficiently detected, and abnormal positions can be located. According to the graded response method, graded emergency response schemes are adopted according to software behaviors after software has abnormal control flows, so that safety of software and services is strengthened, and the graded response method is suitable for being deployed in practical production environments.

Description

technical field [0001] The invention belongs to the technical field of software loophole detection, and more specifically relates to a software loophole detection method, a hierarchical response method and a software loophole detection system. Background technique [0002] Software vulnerabilities are one of the main sources of information security risks and an important target in network attack and defense. No matter from the network security strategy at the national level or the information security protection at the social level, security vulnerabilities have become one of the core issues in the game between the two sides of information confrontation. [0003] Software vulnerability detection and mining has always been a research hotspot in academia and industry. There are two main research programs: static detection and mining of vulnerabilities based on software source code and dynamic detection and analysis of vulnerabilities based on binary programs. The vulnerabili...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 金海邹德清赵健吴月明
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products