Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerability detection method, device and equipment

A vulnerability detection and vulnerability technology, which is applied in computer security devices, program code conversion, instruments, etc., can solve the problems of redundancy and accuracy, and achieve the effect of improving the efficiency of vulnerability detection and the accuracy of vulnerability detection

Active Publication Date: 2021-12-14
ADVANCED NEW TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Many security vulnerabilities are caused by flaws in the program. In related technologies, signature matching is often used to detect program vulnerabilities, which is redundant and has low accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method, device and equipment
  • Vulnerability detection method, device and equipment
  • Vulnerability detection method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.

[0060] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of this specification provide a vulnerability detection method, device, and equipment. The embodiments of this specification use relevant files of historical vulnerabilities, especially patch files, to generate a patch feature database including function features and disassembly information, and use the Executable binary files construct the feature database of the program to be tested, first match the function features of the program to be tested with the sample function features in the patch feature database to identify as many functions as possible, and then compare the disassembly information to be tested with the patch features The sample disassembly information corresponding to the matched sample function in the database is matched to determine whether the program under test has a corresponding patch according to the matching result, and if there is a corresponding patch, determine the vulnerability type of the program under test according to the patch.

Description

technical field [0001] This specification relates to the technical field of security detection, in particular to a vulnerability detection method, device and equipment. Background technique [0002] Vulnerability, commonly known as a security hole, can refer to a flaw in the security of a computer system that threatens the confidentiality, integrity, availability, access control, and monitoring mechanisms of the system or its application data. Many security vulnerabilities are caused by program defects, and in related technologies, feature code matching is often used to detect program vulnerabilities, which is redundant and has low accuracy. Contents of the invention [0003] In order to overcome the problems existing in related technologies, this manual provides a method, device and equipment for detecting vulnerabilities. [0004] According to the first aspect of the embodiments of this specification, there is provided a vulnerability detection method, the method compri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F8/53
CPCG06F8/53G06F21/577
Inventor 陈钦
Owner ADVANCED NEW TECH CO LTD