Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability detection method and device

A vulnerability detection and unknown vulnerability technology, applied in the security field, can solve the problems of complex vulnerability detection process, time-consuming, low efficiency of vulnerability detection, etc., to achieve the effect of narrowing the search scope and improving efficiency

Active Publication Date: 2019-05-21
QI AN XIN SECURITY TECH ZHUHAI CO LTD +1
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the detection of unknown vulnerabilities through the above method has a relatively large scope of vulnerability detection, and the process of vulnerability detection is complicated and requires a lot of time for analysis, research, testing, etc., resulting in low efficiency of vulnerability detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0076] As mentioned in the background art, at present, methods such as code review, black box testing, and document research are usually used to detect system unknown vulnerabilities. Specifically, vulnerability detection technologies such as source code scanning, disassembly scanning, and environmental error injection are used for detection. However, the detection of unknown vulnerabilities through the above method has a relativel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability detection method and device, relates to the technical field of security, and mainly aims to reduce the search range of an unknown vulnerability detection hole,simplify the vulnerability detection process and save the time consumed by detection, thereby improving the vulnerability detection efficiency. The method comprises the following steps: carrying out virtualization processing on a system of terminal device; Using a virtualized virtual machine monitor to perform memory permission monitoring on an operation behavior corresponding to the terminal device so as to detect whether the operation behavior has a memory access violation or not; And if the memory access violation occurs, determining that a suspected unknown vulnerability is detected, and storing a context environment corresponding to the operation behavior, the context environment being used for further detecting the suspected unknown vulnerability. The method is suitable for vulnerability detection.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a method and device for detecting vulnerabilities. Background technique [0002] With the rapid development of the Internet, the diversified development of computer applications, such as e-mail, online banking, instant messaging and other applications are widely used in all aspects of user life and work, network data security leaks emerge in endlessly, terminal data security protection is urgent . Generally, vulnerability detection can be divided into detection of known vulnerabilities and detection of unknown vulnerabilities. The detection of known vulnerabilities mainly uses security scanning technology to detect whether there are published security vulnerabilities in the system; the purpose of unknown vulnerability detection is to discover possible but undiscovered vulnerabilities in the software system. [0003] At present, code review, black box testing, document researc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
Inventor 游勇杨晓东杨小波
Owner QI AN XIN SECURITY TECH ZHUHAI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products