Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerability mining method and device

A vulnerability mining and instruction technology, applied in the field of network security, can solve problems such as low mining efficiency and poor targeting of vulnerability mining methods, and achieve the effect of improving the efficiency of vulnerability mining

Inactive Publication Date: 2020-06-09
CHINA ACADEMY OF INFORMATION & COMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing vulnerability mining methods are poorly targeted and low in mining efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability mining method and device
  • Vulnerability mining method and device
  • Vulnerability mining method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below with reference to the accompanying drawings and examples.

[0021] The embodiment of the present application provides a vulnerability mining method. By traversing each instruction in the tested program segment, a set of variables in an unsafe state is determined, and test cases are generated for the variables in the set, and then vulnerability mining is performed. The scheme can carry out targeted vulnerability mining, thereby improving the efficiency of vulnerability mining.

[0022] The vulnerability mining process in the embodiment of the present application will be described in detail below with reference to the accompanying drawings.

[0023] In the embodiment of the present application, the execution subject can be a test device, which is used to generate test cases and execute the execut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability mining method and device, and the method comprises: traversing each instruction in a tested program segment, judging whether the instruction has a data writing function or not, whether the instruction participates in the propagation of stain variables or not, and whether the instruction is a sensitive instruction or not, and determining a set of variables inan unsafe state; generating a test case for each variable in the set of variables of the unsafe state; and performing vulnerability mining by using the generated test case. According to the method, vulnerability mining can be performed in a targeted manner, so that the vulnerability mining efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a vulnerability mining method and device. Background technique [0002] When programming, there will be loopholes, and it takes a lot of time and effort to find these loopholes manually. [0003] At present, test cases are mainly written for each variable in the program segment, and the written test cases are used to test whether there are loopholes in the corresponding program segment; for example, fuzzy vulnerability mining methods usually construct test cases based on random mutation of input data. [0004] The existing vulnerability mining methods have poor pertinence and low mining efficiency. Contents of the invention [0005] In view of this, the present application provides a vulnerability mining method and device, which can perform targeted vulnerability mining, thereby improving the efficiency of vulnerability mining. [0006] In order to solve the problems...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F11/36
CPCG06F21/577G06F11/3684
Inventor 田慧蓉李艺罗成
Owner CHINA ACADEMY OF INFORMATION & COMM