Vulnerable code clone detection method, device, electronic equipment and storage medium
A detection method and vulnerability technology, applied in the field of information security, can solve the problems of high false negative rate and no consideration of code semantic information, so as to reduce the false detection rate and improve the comprehensiveness and accuracy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] In order to make the objectives, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention. , not all examples. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
[0050] figure 1 It is one of the schematic flowcharts of the vulnerability code clone detection method provided by the embodiment of the present invention, such as figure 1 As shown, the method includes:
[0051] Step 110, slicing the code of the function to be detected to obtain a plurality of slices to be detected;
[0052] Step 120: Slice and match the multiple to-be-detected slices with all the vulnerability...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


