Unlock instant, AI-driven research and patent intelligence for your innovation.

A virtual device vulnerability mining method, device and medium

A virtual device and vulnerability mining technology, applied in the field of Internet communication, can solve problems such as low accuracy, achieve the effect of improving efficiency and quality, and improving operation security

Active Publication Date: 2022-06-17
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of low accuracy in the application of the prior art when mining vulnerabilities of virtual devices, the present invention provides a method, device and medium for mining vulnerabilities of virtual devices:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A virtual device vulnerability mining method, device and medium
  • A virtual device vulnerability mining method, device and medium
  • A virtual device vulnerability mining method, device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present invention.

[0032] It should be noted that the terms "comprising" and "having" in the description and claims of the present invention and the above-mentioned drawings, as well as any variations thereof, are intended to cover non-exclusive inclusion, for example, including a series of steps or units A process, method, system, product or server is not necessarily limited to those steps or units expressly listed, but may include other steps or units not expre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual device vulnerability mining method, device and medium. The method includes: traversing the virtual devices on the host system, constructing the corresponding topological relationship between the virtual devices; generating a configuration sample file of the target virtual device based on the topological relationship, and the target virtual device points to the topological relationship Corresponding to any of the virtual devices; sending the configuration sample file to the target virtual device; responding to the received configuration failure instruction, performing vulnerability mining according to the response result corresponding to the configuration sample file; responding to the received configuration success command to obtain the configuration information corresponding to the target virtual device; generate an interface test case of the target virtual device according to the configuration information; send the interface test case to the target virtual device; perform vulnerability mining according to the response result corresponding to the interface test case. The invention can accurately and effectively excavate security loopholes and improve the operation security of virtual equipment.

Description

technical field [0001] The present invention relates to the technical field of Internet communication, and in particular, to a method, device and medium for exploiting loopholes in a virtual device. Background technique [0002] Vulnerability is the trigger point for switching from a secure domain to a non-secure domain, that is, a defect in the specific implementation of hardware, software, protocols, or system security policy, which allows attackers to access or destroy the system without authorization. [0003] Virtualization (Virtualization) technology is used to virtualize an exclusive device into multiple logical devices for simultaneous use by multiple user processes. This virtualized device is usually called a virtual device. Virtualization technology is a resource management technology, which abstracts and transforms various physical resources of a computer, such as servers, networks, memory, and storage, to break the inseparable barriers between physical structures...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/53G06F9/455
CPCG06F21/577G06F21/53G06F9/45558G06F2009/45587
Inventor 陈楠
Owner TENCENT TECH (SHENZHEN) CO LTD