Unlock instant, AI-driven research and patent intelligence for your innovation.

Application program vulnerability detection method and device, computer equipment and storage medium

An application program and vulnerability detection technology, which is applied in the computer field, can solve the problems of low accuracy rate of security testing and high false alarm rate of vulnerabilities, and achieve the effect of improving the accuracy rate of security testing and reducing the rate of false alarms of vulnerabilities

Pending Publication Date: 2021-03-26
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, traditional application vulnerability detection methods have the problems of high vulnerability false positive rate and low security testing accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program vulnerability detection method and device, computer equipment and storage medium
  • Application program vulnerability detection method and device, computer equipment and storage medium
  • Application program vulnerability detection method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] This application relates to artificial intelligence technology. Artificial intelligence is the theory, method, technology and application system that uses digital computers or machines controlled by digital computers to simulate, extend and expand human intelligence, perceive the environment, acquire knowledge and use knowledge to obtain the best results. In other words, artificial intelligence is a comprehensive technique of computer science that attempts to understand the nature of intelligence and produce a new kind of intelligent machine that can respond in a similar way to human intelligence. Artificial intelligence is to study the design principles and implementation methods of various intelligent machines, so that the machines have the functions of perception, reasoning and decision-making.

[0045] Artificial intelligence technology is a comprehensive subject that involves a wide range of fields, including both hardware-level technology and software-level technol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a big data processing technology in artificial intelligence, and provides an application program vulnerability detection method and device, computer equipment and a storage medium. The method comprises the steps of obtaining a program code of a to-be-tested application program; generating a code attribute graph according to the program code, and obtaining a function test request entry of the to-be-tested application program; performing vulnerability search on the code attribute graph according to the function test request entry and a preset static stain analysis rule to obtain a vulnerability search result; generating a static analysis attack vector according to a vulnerability search result; performing dynamic test according to the static analysis attack vector, apreset dynamic analysis attack vector and the function test request entry to obtain a dynamic test result; and performing vulnerability trigger detection on the dynamic test result to obtain a vulnerability detection result. By adopting the method, the vulnerability false alarm rate can be greatly reduced, and the security test accuracy is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to an application program vulnerability detection method, device, computer equipment and storage medium. Background technique [0002] With the development of computer technology, security testing technology has emerged, and security testing mainly refers to testing whether there are security holes in the application program. [0003] In traditional technologies, commonly used security testing methods include static analysis and dynamic analysis. Static analysis methods include regular matching and syntax and semantic analysis. Dynamic analysis refers to instrumenting key functions in the program to obtain the state of the program when it is running. And check the running logic of the program and whether there are loopholes through the incoming attack vector. [0004] However, traditional application vulnerability detection methods have the problems of high vulnerabilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F21/56
CPCG06F21/562G06F21/577G06F2221/033
Inventor 胡恩泽
Owner TENCENT TECH (SHENZHEN) CO LTD