Vulnerability software dependency relationship construction method based on vulnerability map

A dependency relationship and construction method technology, which is applied in the field of vulnerability software dependency construction based on vulnerability graphs, can solve problems such as low software security, and achieve the effect of improving security and reducing security risks

Active Publication Date: 2019-09-27
北京中科微澜科技有限公司
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For this reason, the embodiment of the present invention provides a vulnerability software dependency construction method based on a vulnerability graph to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability software dependency relationship construction method based on vulnerability map
  • Vulnerability software dependency relationship construction method based on vulnerability map
  • Vulnerability software dependency relationship construction method based on vulnerability map

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The implementation mode of the present invention is illustrated by specific specific examples below, and those who are familiar with this technology can easily understand other advantages and effects of the present invention from the contents disclosed in this description. Obviously, the described embodiments are a part of the present invention. , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] An embodiment of the present invention provides a method for building a vulnerability software dependency relationship based on a vulnerability graph, including:

[0026] S1. Select sample software in the vulnerability map, perform information extraction and information completion on the sample software to form a sample software entity, and establish an association relationship between the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a vulnerability software dependency relationship construction method based on a vulnerability map, and relates to the technical field of information security. The method comprises the following steps: selecting sample software in a vulnerability map, performing information extraction and information completion on the sample software to form a sample software entity, and establishing an association relationship between the vulnerability entity and the sample software entity in the vulnerability map; extracting dependent software and software attributes of the to-be-tested software, and automatically extracting the attributes and the dependent software of the to-be-tested software to form a to-be-tested software entity and a dependent software entity; matching and associating the to-be-tested software entity and the dependent software entity with the sample software entity, and expanding the vulnerability map; and detecting the dependent software of the to-be-detected software in the expanded vulnerability map to generate a detection report. According to the embodiment of the invention, the problem of low software security caused by the fact that a vulnerability software dependency relationship construction method based on a vulnerability map does not exist in the prior art can be solved.

Description

technical field [0001] The embodiment of the present invention relates to the field of information security technology, and in particular to a method for constructing dependency relationships of vulnerable software based on a vulnerability graph. Background technique [0002] With the popularity of agile development and open source software, the application of open source software is becoming more and more extensive. Studies have shown that an average of 75% of the software code in a software comes from open source software. While open source software brings convenience to development, its loopholes also bring huge risks to the software. According to the "2017 Software Security Report" released by Veracode, 88% of Java applications contain at least one software with vulnerabilities, and 53.3% of Java applications are using software versions with vulnerabilities. The pull support model of open source software makes developers responsible for tracking the open source softwar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 吴敬征倪琛杨牧天罗天悦
Owner 北京中科微澜科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products