Intelligent terminal device derivative vulnerability mining method based on architecture similarity
A technology for intelligent terminal equipment and vulnerability mining, which is applied in the fields of platform integrity maintenance, instruments, and electrical digital data processing, etc. It can solve problems such as potential security risks, difficulty in assessing security risks of basic development platforms, and insufficient security awareness and ability of developers.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0074] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0075] Such as figure 1 and Figure 4 As shown, the specific implementation process and situation of the embodiment implemented according to the complete method of the present invention are as follows:
[0076] 1. Collect and sort out the vulnerabilities of various smart terminal devices that have been made public, such as figure 2 As shown, bu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


