Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerability discovery method, test method, security test method, related device and platform

A vulnerability and attack testing technology, applied in computer security devices, software testing/debugging, platform integrity maintenance, etc., can solve problems such as increased application security threats

Active Publication Date: 2021-06-04
BEIJING ANPRO INFORMATION TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the attendant application security threats have also increased significantly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability discovery method, test method, security test method, related device and platform
  • Vulnerability discovery method, test method, security test method, related device and platform
  • Vulnerability discovery method, test method, security test method, related device and platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments of the present disclosure are described in more detail with reference to the accompanying drawings. Although certain embodiments of the present disclosure are shown in the drawings, it should be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein; A more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the present disclosure are for exemplary purposes only, and are not intended to limit the protection scope of the present disclosure.

[0032] In the description of the embodiments of the present disclosure, the term "comprising" and its similar terms should be interpreted as an open inclusion, that is, "including but not limited to". The term "based on" should be understood as "based at least in part on". The term "one embodiment" or "the embodiment" should be read as "at least one embodiment". Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability discovery method, a test method, a security test method, a related device and a platform. According to the technical scheme, through an agent coupled with a target program at a server side, a received first legal request is obtained, a possibly hidden first type vulnerability set is identified by using the first legal request, an attack test is automatically triggered and accepted, and the corresponding first type vulnerability in the target program is actively discovered; and correspondingly, in response to the trigger at the test end, a corresponding attack test is provided, so as to solve the problem of providing a more targeted precise security test for the target object in the application security test process, and to solve other problems such as detection accuracy, vulnerability positioning, vulnerability convergence and the like.

Description

technical field [0001] The present application relates to the technical field of computer application security testing, in particular to a vulnerability discovery method, a testing method, a security testing method and related devices and platforms. Background technique [0002] With the advent of the digital age, B / S-based Web application technology is widely used in the digital transformation of government and enterprise businesses. However, the attendant application security threats have also increased significantly. Relevant research shows that more and more security vulnerabilities occur at the application layer, rather than the network layer as we used to know. In order to ensure that the application can provide safe and stable services after delivery and deployment, it usually passes the application security test before delivery to find and repair the weak points and loopholes in it, so as to prevent related applications from being used by hackers and illegal personn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/55G06F11/36
CPCG06F11/3688G06F11/3692G06F21/552G06F21/577G06F2221/033
Inventor 张涛宁戈牛伟颖董毅
Owner BEIJING ANPRO INFORMATION TECH