Vulnerability mining method and device
A vulnerability mining and instruction technology, applied in the field of network security, can solve problems such as low mining efficiency and poor targeting of vulnerability mining methods, and achieve the effect of improving the efficiency of vulnerability mining
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] In order to make the object, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below with reference to the accompanying drawings and examples.
[0021] The embodiment of the present application provides a vulnerability mining method. By traversing each instruction in the tested program segment, a set of variables in an unsafe state is determined, and test cases are generated for the variables in the set, and then vulnerability mining is performed. The scheme can carry out targeted vulnerability mining, thereby improving the efficiency of vulnerability mining.
[0022] The vulnerability mining process in the embodiment of the present application will be described in detail below with reference to the accompanying drawings.
[0023] In the embodiment of the present application, the execution subject can be a test device, which is used to generate test cases and execute the execut...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


