Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bug detection method and device, storage medium and electronic equipment

A technology of vulnerability detection and detection results, which is applied in the computer field and can solve the problems of low efficiency of vulnerability detection

Active Publication Date: 2021-03-19
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a vulnerability detection method, device, storage medium, and electronic equipment to at least solve the technical problem of low vulnerability detection efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bug detection method and device, storage medium and electronic equipment
  • Bug detection method and device, storage medium and electronic equipment
  • Bug detection method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0025] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability detection method and device in a cloud technology scene, a storage medium and electronic equipment, and particularly relates to technologies such as protectionin the field of cloud security. The method comprises the following steps: calling a probe function built in a custom function in a target system to detect first data so as to obtain a first detectionresult; under the condition that the first detection result indicates that the first data is not abnormal, processing the first data by utilizing a custom function to obtain second data; under the condition that the second data is returned to the custom function, calling the probe function to detect the second data to obtain a second detection result, wherein the second detection result is used for indicating whether the target system has vulnerabilities or not. The technical problem of low vulnerability detection efficiency is solved.

Description

technical field [0001] The invention relates to the field of computers, in particular to a vulnerability detection method, device, storage medium and electronic equipment. Background technique [0002] With the popularity of the Internet, the Internet (Internet) has penetrated into all aspects of people's lives, and web applications are a common channel for people to access the Internet. Hypertext Preprocessor (PHP) as a global wide area network (World Wide Web, Web) application is one of the most commonly used programming forces. Due to its flexible and dynamic characteristics and insufficient consideration of programmers’ security awareness and code logic, there are more and more loopholes in PHP applications. How to effectively resist and timely The discovery of vulnerabilities has become a pain point for many enterprises today. Protection methods based on request characteristics can no longer meet the security protection needs of enterprises. As early as 2012, Gartner p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577G06F2221/033G06F2221/034H04L63/1433H04L63/30
Inventor 张航
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products