Vulnerability detection method, device and device

A vulnerability detection and vulnerability technology, applied in computer security devices, program code conversion, instruments, etc., can solve problems such as redundancy accuracy, and achieve the effect of improving vulnerability detection efficiency and vulnerability detection accuracy.

Active Publication Date: 2019-02-19
ADVANCED NEW TECH CO LTD
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Many security vulnerabilities are caused by flaws in the program. In related technologies, signature matching is often used to detect program vulnerabilities, which is redundant and has low accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method, device and device
  • Vulnerability detection method, device and device
  • Vulnerability detection method, device and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.

[0060] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

the embodiment of that present specification provide a vulnerability detection method, Installations and equipment, the of that present specification exploit file related to historical vulnerabilities, especially patch files, generating a patch feature database including functional features and disassembly information, and utilizing executable binary file of the program to be tested to construct characteristic database of the program to be tested, Firstly, the function features of the program to be tested are matched with the sample function features in the patch feature database, The invention identifies as many functions as possible, and then matches the disassembly information to be tested with the sample disassembly information corresponding to the matched sample function in the patchfeature database, so as to determine whether the program to be tested exists corresponding patch according to the matching result, and when the corresponding patch exists, determines the vulnerabilitytype of the program to be tested according to the patch.

Description

technical field [0001] This specification relates to the technical field of security detection, in particular to a vulnerability detection method, device and equipment. Background technique [0002] Vulnerability, commonly known as a security hole, can refer to a flaw in the security of a computer system that threatens the confidentiality, integrity, availability, access control, and monitoring mechanisms of the system or its application data. Many security vulnerabilities are caused by program defects, and in related technologies, feature code matching is often used to detect program vulnerabilities, which is redundant and has low accuracy. Contents of the invention [0003] In order to overcome the problems existing in related technologies, this manual provides a method, device and equipment for detecting vulnerabilities. [0004] According to the first aspect of the embodiments of this specification, there is provided a vulnerability detection method, the method compri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F8/53
CPCG06F8/53G06F21/577
Inventor 陈钦
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products