Vulnerability location method, device, electronic equipment and storage medium
A positioning method and vulnerability technology, applied in the field of information security, can solve problems such as low efficiency, high false negative rate and false negative rate of code static analysis, coarse granularity, etc., and achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] In order to make the objects, technical solutions, and advantages of the present disclosure, the present disclosure will be described in detail below with reference to the accompanying drawings.
[0029] It should be noted that the technical terms or scientific terms used in one or more embodiments of the present disclosure shall be understood by the people of the present disclosure, unless otherwise defined. The "first", "second" and similar words used in one or more embodiments are not used to represent any order, quantity, or importance, but only to distinguish different components. Similar words to "include" or "include", meaning that the elements or objects of the previously mentioned previously enumerated elements or objects that appear later in the word, without excluding other elements or objects.
[0030] Currently, the method and tools for precise vulnerability positioning for source code and more stays only in the primary stage. Static detection technology is cur...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


