Automatic binary security vulnerability mining method
A binary and loophole technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of unguaranteed code coverage, low efficiency of dynamic analysis implementation, etc., achieve fast speed, improve accuracy, and high code The effect of coverage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0030] Such as figure 1 As shown, the present embodiment provides a binary security vulnerability automatic mining method, which includes the following steps:
[0031] S1. Extract AST from the target input program, convert AST into intermediate code, and optimize it. Specifically, the optimization is to make the intermediate code easier to analyze through optimization methods such as local register allocation optimization;
[0032] S2. Track the flow process of the control point of the target input program, mark each flow, and mark the label according to the flow state;
[0033] S3. Establish a vulnerability rule according to the label. If the vulnerability rule is met, it is considered that a suspected vulnerability point has occurred; the vulnerability rule described in this embodiment includes the order of the label, that is, the flow direction of the data can be judged by the order of the label;
[0034] S4. Record suspected vulnerability points as output samples to be an...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com