Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quick vulnerability positioning method, electronic device and storage medium

An electronic device and vulnerability technology, applied in computer security devices, electrical digital data processing, instruments, etc., can solve the problems of difficulty in quickly locating vulnerabilities, time-consuming, randomness in finding vulnerabilities, etc.

Pending Publication Date: 2020-03-06
PING AN TECH (SHENZHEN) CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, programmers have frequent tests in the operation of finding vulnerabilities, which consumes a lot of time, and there is randomness in finding vulnerabilities, making it difficult to quickly locate vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quick vulnerability positioning method, electronic device and storage medium
  • Quick vulnerability positioning method, electronic device and storage medium
  • Quick vulnerability positioning method, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0050] It should be noted that the descriptions involving "first", "second", etc. in the present invention are only for descriptive purposes, and should not be understood as indicating or implying their relative importance or implicitly indicating the number of indicated technical features . Thus, the features defined as "first" and "second" may explicitly or implicitly include at least one...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of security detection, and provides a rapid vulnerability positioning method, an electronic device and a computer storage medium. The method comprises thesteps of obtaining current abnormal information fed back when a to-be-tested program operated by a computing terminal is abnormal; screening out abnormal information with the same semanteme as the current abnormal information from the abnormal information pre-stored in the database by utilizing a word2vec tool; determining a target character string of the program bug corresponding to the current abnormal information according to a mapping relationship between preset abnormal information and the character string representing the program bug corresponding to the abnormal information, and findingout a code block containing the target character string from the to-be-tested program; and finally, when the found code block is abnormal, judging that the found code block has a bug and determiningthe position of the bug. The code block corresponding to the abnormal information appearing in the program running process is rapidly found out by establishing the abnormality searching mechanism, thecode block is verified, and the vulnerability in the program is rapidly positioned.

Description

technical field [0001] The invention relates to the technical field of security detection, in particular to a method for quickly locating loopholes, an electronic device and a computer-readable storage medium. Background technique [0002] With the advancement of technology, many companies, especially programmers in technology companies, develop more and more applications. Applications can be system programs, software programs or APP programs. It needs to be tested, and the test includes finding and locating various loopholes that may occur in the running of the program, and it can be provided to users only after the test is correct. [0003] At present, there are many methods for locating vulnerabilities in programs, for example, the F12 tool simply finds vulnerabilities in programs, IE plug-in query vulnerabilities, etc. Programmers find the loopholes in the program by continuously performing tests in many codes of the program, and some programmers even rely on their own ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F11/36
CPCG06F21/577G06F11/3608
Inventor 王建华何四燕
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products