Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Binary program bug testing method and device and readable storage medium

A binary program and testing method technology, applied in the field of electric power information security, can solve the problems of high difficulty and low efficiency of program vulnerability mining, and achieve the effect of improving the discovery efficiency

Pending Publication Date: 2020-08-25
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +3
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a binary program vulnerability testing method, device and readable storage medium to solve the problem of low efficiency and difficulty in program vulnerability mining

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binary program bug testing method and device and readable storage medium
  • Binary program bug testing method and device and readable storage medium
  • Binary program bug testing method and device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0029]The advantage of fuzz testing is dynamic execution, so executing a test case can cover a deeper position; the disadvantage is that when a complex branch condition is encountered, it is difficult to generate a test that satisfies the condition by random mutation Example. The advantage of symbolic execution is that it can break through complex branch con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a binary program bug testing method and device and a readable storage medium. The method comprises the steps: carrying out instrumentation processing on a target binary program, and generating LLVM bit codes and executable files with consistent instrumentation information; mutually nesting to execute the process of performing fuzzy test on the executable file and performingsymbolic execution on the LLVM bit code, and generating a test case and updating coverage information through the fuzzy test; searching a program execution tree through symbolic execution, and generating a corresponding test case and adding the test case into the test case set when it is found that a branch is not covered in program execution according to the coverage information; monitoring a test case set through a fuzzy test; when a new test case exists, reading the new test case and adding the new test case into a test case queue of the fuzzy test, and based on the new test case, continuing to explore a branch behind the branch, generating the test case and updating coverage information; and when it is detected that the termination condition is met, ending the vulnerability test process.

Description

technical field [0001] The invention relates to the technical field of electric power information security, in particular to a binary program vulnerability testing method, device and readable storage medium. Background technique [0002] At this stage, source code-oriented application vulnerability mining technology has developed significantly. However, source code-oriented application vulnerability mining also has some shortcomings. Since applications are developed using high-level languages ​​(C language, Java, etc.), they will be compiled into binary codes during actual operation. Vulnerabilities may be introduced due to various reasons such as improper settings, making these newly introduced vulnerabilities difficult to detect. Program-oriented vulnerability mining is language-independent and does not require program source code, nor does it need to be compiled and linked, and can be executed directly. Therefore, vulnerability mining for programs can find vulnerabilitie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36G06F21/57
CPCG06F11/3684G06F11/3676G06F11/3688G06F21/577Y02D10/00
Inventor 席泽生张波马媛媛邵志鹏孙歆管小娟周诚陈牧陈璐李尼格戴造建李勇
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More