Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Firmware vulnerability identification method and device, equipment and storage medium

An identification method and vulnerability technology, applied in the computer field, can solve the problem of low vulnerability identification rate and achieve high vulnerability identification rate

Pending Publication Date: 2019-11-26
HANGZHOU HIKVISION DIGITAL TECH
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The vulnerability identification rate of the above scheme is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firmware vulnerability identification method and device, equipment and storage medium
  • Firmware vulnerability identification method and device, equipment and storage medium
  • Firmware vulnerability identification method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0064] The terms "comprising" and "having" and any variations thereof in the description and claims of the present invention and the drawings are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a firmware vulnerability identification method and device, equipment and a storage medium. The firmware vulnerability identification method comprises the steps: extracting a to-be-identified target file from firmware; positioning at least one reference address of a danger function contained in the target file; tracing a parameter source of the danger function under each reference address according to at least one reference address of the danger function and a vulnerability type corresponding to the danger function; and according to the parameter source of the danger function under each reference address, determining whether the danger function has a vulnerability under each reference address. According to the embodiment of the invention, the vulnerability identification rate is improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a firmware vulnerability identification method, device, equipment and storage medium. Background technique [0002] With the development of the Internet of Things, Internet of Things devices are widely used in production and life. Due to the general lack of security awareness of traditional IoT device manufacturers, vulnerabilities in the firmware of IoT devices have been continuously exposed in recent years. The devices involved in these vulnerabilities include industrial controllers, security cameras, routers, digital phones, car controllers, and more. The firmware is a program written in an Eraseable Read Only Memory (EROM for short) or an Electrically Erasable Programmable Read-Only Memory (EEPROM for short). Firmware is the device "driver" that is kept inside the device. Through the firmware, the operating system can implement the operation of a specific device ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36
CPCG06F11/3636G06F11/366
Inventor 王滨张月衡余超李志强
Owner HANGZHOU HIKVISION DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products