Unlock instant, AI-driven research and patent intelligence for your innovation.

Intelligent terminal device derivative vulnerability mining method based on architecture similarity

A technology for intelligent terminal equipment and vulnerability mining, which is applied in the fields of platform integrity maintenance, instruments, and electrical digital data processing, etc. It can solve problems such as potential security risks, difficulty in assessing security risks of basic development platforms, and insufficient security awareness and ability of developers.

Pending Publication Date: 2021-01-08
浙江大学计算机创新技术研究院
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] On the one hand, smart terminal devices often have a large number of loopholes due to the lack of security awareness and ability of developers, the use of a large number of low-quality open source modules, the uncontrolled design and development tool chain, and the difficulty in assessing the security risks of basic development platforms. There are extremely high security risks; on the other hand, this type of equipment often does not consider the security protection mechanism too much from the architecture design, and lacks a human-computer interaction interface, resulting in users being unable to perceive security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent terminal device derivative vulnerability mining method based on architecture similarity
  • Intelligent terminal device derivative vulnerability mining method based on architecture similarity
  • Intelligent terminal device derivative vulnerability mining method based on architecture similarity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0075] Such as figure 1 and Figure 4 As shown, the specific implementation process and situation of the embodiment implemented according to the complete method of the present invention are as follows:

[0076] 1. Collect and sort out the vulnerabilities of various smart terminal devices that have been made public, such as figure 2 As shown, bu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intelligent terminal device derivative vulnerability mining method based on architecture similarity. The method comprises the following steps: taking to-be-detected equipment and known intelligent terminal equipment as two pieces of intelligent terminal equipment, judging the intelligent terminal equipment architecture similarity for the two pieces of intelligent terminal equipment, and if the architecture similarity exists between the two pieces of intelligent terminal equipment, performing architecture similarity-based derivative vulnerability mining for the to-be-detected equipment. According to the method, the vulnerability mining efficiency of the intelligent terminal equipment can be effectively improved, universality is achieved, and automatic execution completion of a machine is facilitated.

Description

technical field [0001] The invention belongs to a technical method for mining computer equipment vulnerabilities, in particular to a method for mining derived vulnerabilities of intelligent terminal equipment based on architecture similarity. Background technique [0002] Smart terminal equipment is a small computing system with information processing capabilities, storage capabilities, and networking capabilities. According to different application scenarios, its product forms are ever-changing, including but not limited to network routers, network firewalls, network printers, network copiers, and network projectors. , electronic screens, scanners, car navigators, home gateways, TV set-top boxes, TVs, network cameras, home sensors, etc. Driven by technological improvements such as processing power, storage capacity, and network performance, smart terminal devices have expanded from traditional communications to information production, interaction, and consumption, and have ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 常瑞姜博文巴钟杰任奎董延珊曾韵
Owner 浙江大学计算机创新技术研究院