A Web Application Security Vulnerability Prediction Method Based on Execution Flow Graph

A web application and vulnerability technology, applied in the field of network security, can solve problems such as heavy workload and not intuitive enough, and achieve the effect of small generation and calculation workload and intuitive expression

Active Publication Date: 2021-09-07
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] However, the second method directly analyzes all the program statements in the program slice. The main disadvantage is that the workload is too large and it is not intuitive enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Web Application Security Vulnerability Prediction Method Based on Execution Flow Graph
  • A Web Application Security Vulnerability Prediction Method Based on Execution Flow Graph
  • A Web Application Security Vulnerability Prediction Method Based on Execution Flow Graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention provides a web application security loophole prediction method based on the execution flow graph. The basic idea is: combine the data dependency graph and the control dependency graph to construct the execution flow graph EFG of the program; extract security-sensitive statements from the EFG Where the node S k as the end point, with node S k The associated user input node U I is the subgraph of the starting point, and extracts the metric element for each subgraph; the specific value of the metric element of the subgraph is used as input, and the S corresponding to the subgraph is k With or without vulnerabilities as the output, a vulnerability prediction model is constructed to realize the prediction of web application security vulnerabilities.

[0042] Such as figure 1 As shown, the method includes the following steps:

[0043] Step 1. Define the security attribute of the program statement.

[0044] Describe various security properties relate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a web application security loophole prediction method based on the execution flow graph. According to the data dependency and control dependency of the web application, the execution flow graph EFG is constructed; the node S where the security-sensitive statement is located is extracted from the EFG k as the end point, with S k The associated user input node U I is the subgraph of the starting point, and extracts the metric element for each subgraph; the specific value of the metric element of the subgraph is used as input, and the S corresponding to the subgraph is k With or without vulnerabilities as the output, a vulnerability prediction model is constructed to realize the prediction of web application security vulnerabilities. The invention includes judgment nodes in the extraction of metric elements, and compared with directly analyzing program slices, the workload is greatly reduced.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for predicting Web application security vulnerabilities based on an execution flow graph. Background technique [0002] Web applications have been widely used in all aspects of our daily life, such as social networks, online shopping, email, order systems, registration systems, etc. Most of these systems are developed based on the web. In these systems, a large number of security loopholes have been found. Attackers can easily gain system root privileges by exploiting these loopholes, causing sensitive information to leak and causing great harm. [0003] Software vulnerability prediction can know in advance the possibility, quantity or specific types of vulnerabilities existing in software source code modules. According to the prediction results, software manufacturers can invest limited time and funds in a targeted manner to those vulnerabilities with high prob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 危胜军钟浩单纯胡昌振
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products