Unlock instant, AI-driven research and patent intelligence for your innovation.

Software security analysis method and analysis device, electronic equipment and storage medium

An analysis method and security technology, applied in computer security devices, electrical digital data processing, platform integrity maintenance, etc., can solve the problems of inability to analyze the security of code segments, restrictions, and inability to obtain the algorithm library to be analyzed, and overcome the cost The effect of excessive time, improving efficiency and saving time

Pending Publication Date: 2021-05-28
NATIONZ TECH INC
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The premise of this method is to obtain the construction method of the algorithm library to be analyzed and the call interface of the algorithm library. In the actual software security analysis environment, we often cannot obtain the construction method of the algorithm library to be analyzed and the call interface of the algorithm library. The use of this technology is limited, and this technology is only for algorithm libraries, and cannot perform security analysis on arbitrary code segments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software security analysis method and analysis device, electronic equipment and storage medium
  • Software security analysis method and analysis device, electronic equipment and storage medium
  • Software security analysis method and analysis device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0031] figure 1 It is a schematic flowchart of a software security analysis method provided in the embodiment of this application.

[0032] like figure 1 As shown, in S110, the instruction stream file of the target application software is opened in the static analysis tool, and the instruction stream file is acquired and saved by the dynamic debugger.

[0033] In this embodiment, the instruction stream file is acquired and saved by a dynamic debugger. Load the target applic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a software security analysis method and device, electronic equipment and a storage medium. The method comprises the following steps: opening an instruction stream file of target application software in a static analysis tool, wherein the instruction stream file is acquired and stored through a dynamic debugger; converting a dynamic debugger address of each instruction of the instruction stream file into a static analysis tool address; and identifying an instruction stream corresponding to the static analysis tool address so as to perform static analysis on the software security.

Description

technical field [0001] The present application relates to the technical field of software security, in particular to a software security analysis method, an analysis device, electronic equipment and a storage medium. Background technique [0002] The widespread application of computer software has brought more and more convenience to people and has increasingly affected people's daily lives. However, there are a large number of errors and loopholes in computer software, which hide huge risks. The security loopholes in them are easy to be exploited by criminals, resulting in loss of reputation and money. [0003] Software security analysis generally uses static analysis and dynamic debugging methods to test the security of applications. [0004] Static analysis is to analyze the source code and find code defects without executing the computer program. The limitation of static analysis lies in the uncertainty of program execution. For example, different incoming parameters w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 吴永强王宇建杨威
Owner NATIONZ TECH INC