A vulnerability mining method and device based on a Qemu platform
A vulnerability mining and vulnerability technology, applied in the field of network security, can solve the problems of low efficiency of fuzz testing and achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] According to an embodiment of the present invention, an embodiment of a vulnerability mining method based on the Qemu platform is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0027] figure 1 It is a method for mining vulnerabilities based on the Qemu platform according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0028] Step S102, simulating multiple operating system processes, and monitoring whether each operating system process crashes during the simulation process;
[0029] Step S104, if there is no process crash in the operating system process, then obtain the fuzz test sample set se...
Embodiment 2
[0065] The present invention also provides a vulnerability mining device based on the Qemu platform, which is used to implement the vulnerability mining device based on the Qemu platform provided by the above-mentioned content of the embodiment of the present invention. The following is the vulnerability based on the Qemu platform provided by the embodiment of the present invention Specific introduction of excavation equipment
[0066] Such as Figure 4 As shown, the device includes: a simulation unit 10, an acquisition unit 20 and a test unit 30, wherein,
[0067] The simulation unit 10 is used to simulate a plurality of operating system processes, and monitor whether each operating system process crashes during the simulation process;
[0068] The acquisition unit 20 is used to obtain the fuzz test sample set sent by the AFL fuzz module if the operating system process does not crash, wherein the fuzz test sample set includes test samples;
[0069] The test unit 30 is used ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


