Embedded terminal software code vulnerability detection method and device based on neural network
An embedded terminal and neural network technology is applied in the field of embedded terminal software code vulnerability detection. Detection efficiency, the effect of overcoming dependencies
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] According to an embodiment of the present invention, an embodiment of a neural network-based embedded terminal software code vulnerability detection method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0038] figure 2 It is a flow chart of a neural network-based embedded terminal software code vulnerability detection method according to an embodiment of the present invention, such as figure 2 As shown, the method includes the following steps:
[0039] In step S101, the source code of the target embedded terminal software is obtained, and the source code is preprocessed to obtain a binary code.
[0040] In the embodiment of the present invention, because the binary co...
Embodiment 2
[0099] The embodiment of the present invention also provides a neural network-based embedded terminal software code vulnerability detection device, the neural network-based embedded terminal software code vulnerability detection device is mainly used to implement the neural network-based The network embedded terminal software code vulnerability detection method, the following is a specific introduction to the neural network-based embedded terminal software code vulnerability detection device provided by the embodiment of the present invention.
[0100] Figure 10 It is a schematic structural diagram of a neural network-based embedded terminal software code vulnerability detection device provided by an embodiment of the present invention. Such as Figure 10 As shown, this neural network-based embedded terminal software code vulnerability detection device mainly includes: obtaining a preprocessing module 11, a first input module 12, a second input module 13 and a determination ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com