Vulnerability mining method and device, and readable storage medium

A vulnerability mining and vulnerability technology, which is applied in the field of vulnerability mining methods, devices and readable storage media, can solve the problems of low application security and few security vulnerabilities, so as to improve security, reduce vulnerability detection, and improve vulnerability detection efficiency. Effect

Inactive Publication Date: 2019-02-22
BEIJING XIAOMI INTELLIGENT TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The disclosure provides a vulnerability mining method, device, and readable storage medium, which can solve the problem of low application security due to less security vulnerabilities in the excavated application programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability mining method and device, and readable storage medium
  • Vulnerability mining method and device, and readable storage medium
  • Vulnerability mining method and device, and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present disclosure.

[0082] With the rapid development of network communication technology, the security of application programs has attracted much attention. Usually, before the application is put into use, the fuzzing method is used to mine the application for vulnerabilities, so as to find as many security vulnerabilities as possible in the application, and then the discovered security vulnerabilities can be repaired to reduce the risk of the application before ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability mining method and device and a readable storage medium, belonging to the field of software security. The method includes: determining a target functional unit among a plurality of functional units of a target application; using n test data of target data type to test the vulnerability of target functional unit to obtain a first vulnerability test result, wherein, the target functional unit is used for processing the data of the target data type, and the value of n is within the range of the experience value, and the experience value range is obtained according to the numb of times the data of the same data type is processed before the security vulnerability of the functional unit occurs; and based on the results of the first vulnerability test, a security vulnerability in the target application is identified. The present disclosure solves the problem of lower application security due to fewer security vulnerabilities of the excavated application.The present disclosure is used for security vulnerability mining.

Description

technical field [0001] The present disclosure relates to the field of software security, in particular to a vulnerability mining method, device and readable storage medium. Background technique [0002] With the rapid development of network communication technology, people rely more and more on various applications, and the security of applications has attracted much attention. [0003] There may be security loopholes in the process of writing the application, and these security loopholes may make the operation of the application go wrong, or provide opportunities for malicious attackers. In related technologies, the program is tested before it is put into use, such as using a fuzzy (fuzz) test method to detect whether there is a security hole in the program, and if a security hole is detected, the security hole can be repaired. [0004] However, only a small number of security holes can be detected in the related art, so the security of the application program is still low...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36G06F21/56
CPCG06F11/3644G06F11/366G06F21/566
Inventor 张清
Owner BEIJING XIAOMI INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products