Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operating system vulnerability detection method and system based on code similarity analysis and medium

A similarity analysis and operating system technology, which is applied in the field of operating system vulnerability detection based on code similarity analysis, can solve problems such as low detection efficiency, low detection result accuracy, and insufficient detection ability, and achieve comprehensive representation information and traversal The effect of fast speed and good accuracy

Pending Publication Date: 2020-07-10
NAT UNIV OF DEFENSE TECH
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention: aiming at the above-mentioned problems of the prior art, a kind of operating system vulnerability detection method, system and medium based on code similarity analysis is provided. Large-scale software systems such as operating systems have insufficient detection capabilities, low accuracy of detection results, and low detection efficiency. Screening operating system source code libraries, basic information, token sequences, and control flow paths are vulnerable The existing vulnerability code reuse detection process has been improved and optimized by means of progressive screening of vulnerability feature sets, while ensuring high operating efficiency and good accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operating system vulnerability detection method and system based on code similarity analysis and medium
  • Operating system vulnerability detection method and system based on code similarity analysis and medium
  • Operating system vulnerability detection method and system based on code similarity analysis and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0049] Such as figure 1 As shown, the implementation steps of the operating system vulnerability detection method based on code similarity analysis in this embodiment include:

[0050] 1) Locate the vulnerable code segments related to the operating system based on the information provided by the public vulnerability database, and form the operating system vulnerability code base;

[0051] 2) Screen the source code base of the operating system according to the detection targets of the vulnerable code segments in the vulnerable code base of the operating system;

[0052] 3) Analyze the vulnerable code segment of the operating system vulnerability code base and the filtered operating system source code base, and generate a set of code property graphs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an operating system vulnerability detection method and system based on code similarity analysis and a medium. The method comprises the steps: locating a vulnerability code segment, and forming an operating system vulnerability code library; screening an operating system source code library; for the vulnerability code segment, respectively generating a code attribute graph set by an operating system source code library; and respectively extracting features from the vulnerability function in the vulnerability code segment and the code attribute graph set of each functionto be tested in the operating system source code library, calculating similarity, detecting whether reuse of the vulnerability code exists or not, and outputting a result. The method aims at solving the problems that an existing vulnerability code reuse detection method is insufficient in detection capacity when oriented to large-scale software systems such as an operating system. By adopting themethods of screening the operating system source code library, progressively screening the multi-vulnerability characteristics and the like, the process of the existing detection method is improved and optimized, and good accuracy is considered while high operating efficiency is ensured.

Description

technical field [0001] The present invention relates to the technical field of computer program detection and operating system vulnerability analysis, in particular to an operating system vulnerability detection method, system and medium based on code similarity analysis. Background technique [0002] Code reuse refers to directly copying or slightly modifying a piece of code in one software, and then using it in other software as a component of the latter's code. At present, using existing code components or templates for software development has become a common and common method in software engineering. In 2018, Blackduck conducted reuse analysis and auditing of open source components on anonymous data in more than 1,100 commercial code bases, covering big data, network security, enterprise software, financial services, healthcare, Internet of Things, automotive, manufacturing And mobile application market and other industries. The audit results showed that open source c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F8/75
CPCG06F21/577G06F8/75G06F2221/033
Inventor 任怡汪哲谭郁松周凯黄辰林李宝阳国贵王晓川丁滟张建锋谭霜蹇松雷
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products