Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerable code clone detection method, device, electronic equipment and storage medium

A detection method and vulnerability technology, applied in the field of information security, can solve the problems of high false negative rate and no consideration of code semantic information, so as to reduce the false detection rate and improve the comprehensiveness and accuracy.

Active Publication Date: 2022-06-21
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Therefore, most current detection algorithms for vulnerable code clones do not consider the semantic information in the code, and the operations on the source code are limited to abstract operations such as replacing variable names, type names, and parameter names, as well as standard operations such as deleting spaces and comments. Type-1 and Type-2 code clones that can detect vulnerable codes have a high false negative rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerable code clone detection method, device, electronic equipment and storage medium
  • Vulnerable code clone detection method, device, electronic equipment and storage medium
  • Vulnerable code clone detection method, device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the objectives, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention. , not all examples. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0050] figure 1 It is one of the schematic flowcharts of the vulnerability code clone detection method provided by the embodiment of the present invention, such as figure 1 As shown, the method includes:

[0051] Step 110, slicing the code of the function to be detected to obtain a plurality of slices to be detected;

[0052] Step 120: Slice and match the multiple to-be-detected slices with all the vulnerability...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a vulnerability code clone detection method, device, electronic equipment and storage medium, wherein the method includes: slice the code of the function to be detected to obtain a plurality of slices to be detected; combine the plurality of slices to be detected with the preset vulnerability All the vulnerability slices corresponding to the vulnerable functions stored in the library are slice-matched to obtain the detection result of the vulnerable code clone of the function to be detected; wherein, the vulnerability slice corresponding to the vulnerable function contains the statement that needs to be deleted in the vulnerable function and Other statements that have a dependency relationship with the statement that needs to be deleted. The vulnerability code cloning detection method, device, electronic equipment and storage medium provided by the present invention realize Type-3 code cloning detection, improve the comprehensiveness and accuracy of vulnerability code cloning detection, and reduce the missed detection rate of vulnerabilities. And it can accurately locate the location of the vulnerability information in the function to be detected.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method, device, electronic device and storage medium for detecting vulnerability code clones. Background technique [0002] With the rapid development of the computer software industry, the amount of open source software is also growing. Related research shows that the amount of open source software has transformed from linear growth to non-linear growth. While the number of open source software has grown, so has the number of vulnerabilities associated with open source software. [0003] The development of open source software and the need for rapid and low-cost software development have resulted in a large number of code reuse phenomena. In order to quickly implement requirements, software developers will directly make changes to existing code and apply them to the developed software. Although the development of open source software can improve the speed of so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F8/75G06F16/951
CPCG06F8/751G06F16/951
Inventor 孟丹于爱民宋潇楠刘湿润白鑫
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI