Software security analysis method and analysis device, electronic equipment and storage medium
An analysis method and security technology, applied in computer security devices, electrical digital data processing, platform integrity maintenance, etc., can solve the problems of inability to analyze the security of code segments, restrictions, and inability to obtain the algorithm library to be analyzed, and overcome the cost The effect of excessive time, improving efficiency and saving time
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.
[0031] figure 1 It is a schematic flowchart of a software security analysis method provided in the embodiment of this application.
[0032] like figure 1 As shown, in S110, the instruction stream file of the target application software is opened in the static analysis tool, and the instruction stream file is acquired and saved by the dynamic debugger.
[0033] In this embodiment, the instruction stream file is acquired and saved by a dynamic debugger. Load the target applic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


