Vulnerability detection method and device, server and storage medium

A vulnerability detection and vulnerability technology, applied in computer security devices, instruments, program code conversion, etc., can solve problems such as economic losses, Trojan horse viruses, and user privacy data theft

Active Publication Date: 2020-04-07
TENCENT TECH (SHENZHEN) CO LTD
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If there are loopholes in the computer application, once the vulnerability is invaded by an attacker, the privacy data of the user in the computer application may be stolen, a Trojan horse virus may appear in the terminal where the computer application is installed, and even serious economic losses may occur.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device, server and storage medium
  • Vulnerability detection method and device, server and storage medium
  • Vulnerability detection method and device, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] Based on the above background technology, it can be seen that with the rapid increase of the number of computer applications, the security of computer applications becomes more and more important. If there are loopholes in the computer application and once the vulnerability is invaded by an attacker, the privacy data of the user in the computer application may be stolen, a Trojan horse virus may appear in the terminal where the computer application is installed, and even serious economic losses may occur.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vulnerability detection method and device, a server and a storage medium. The method includes: generating a source code set of an application by decompiling an application installation package; scanning file content of a source code file in the source code set to judge whether the source code file carries a first vulnerability feature or not; under the condition that the source code file carries the first vulnerability feature, performing semantic analysis on the source code file, detecting whether the source code file carries a second vulnerability feature matched with the first vulnerability feature based on a semantic analysis result of the source code file, and if the source code file carries the second vulnerability feature matched with the first vulnerabilityfeature, determining that the source code file has a vulnerability. According to the invention, whether the source code file possibly has the vulnerability or not is determined through the first vulnerability feature irrelevant to semantics; semantic analysis is performed on the source code file to determine whether the source code file really has the vulnerability on the basis that the source code file possibly has the vulnerability, so that the vulnerability detection of the source code file can be realized, and the vulnerability detection efficiency can be effectively improved.

Description

technical field [0001] The present invention relates to the technical field of loophole detection, and more specifically, to a loophole detection method, device, server and storage medium. Background technique [0002] Computer applications provide users with more convenient access to services. With the rapid increase in the number of computer applications, the security of computer applications is becoming more and more important. If there is a loophole in the computer application, once the loophole is invaded by an attacker, the privacy data of the user in the computer application may be stolen, a Trojan horse virus may appear in the terminal where the computer application is installed, and even serious economic losses may occur. [0003] Therefore, how to provide a vulnerability detection method, device, server and storage medium to realize the detection of vulnerabilities in computer applications, thereby reducing the possibility of computer applications being invaded by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/56G06F8/41
CPCG06F21/577G06F21/563G06F8/436
Inventor 张勇威马松松林桠泉吴震雄
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products