Program vulnerability detection method and device, terminal equipment and storage medium

A vulnerability detection and vulnerability technology, applied in the direction of program code conversion, software engineering design, computer security devices, etc., can solve the problems of slow analysis speed, low analysis efficiency, slow vulnerability detection results, etc. The effect of improving the efficiency of vulnerability detection

Active Publication Date: 2021-08-06
PENG CHENG LAB
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a program loophole detection method, device, terminal equipment and computer-readable storage medium, aiming to solve the problem of slow analysis speed and low analysis efficiency in the prior art when loophole analysis is performed on the program to be detected. , a technical issue that results in slower access to vulnerability detection results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program vulnerability detection method and device, terminal equipment and storage medium
  • Program vulnerability detection method and device, terminal equipment and storage medium
  • Program vulnerability detection method and device, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0049] CFG: Control Flow Graph (CFG), which is an abstract representation of a process or program, is an abstract data structure used in the compiler, maintained internally by the compiler, and represents what a program will do during execution. All paths traversed. It shows the possible flow direction of all basic blocks in a process in the form of a graph, and can also reflect the real-time execution process of a process.

[0050] CG: function call...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a program vulnerability detection method. The method comprises the following steps: when a target source code of a target program is obtained, obtaining a vulnerability initial node set and a control flow diagram based on the target source code; obtaining a vulnerability executable path set based on the vulnerability initial node set and the control flow diagram; analyzing vulnerability executable paths in the vulnerability executable path set to obtain a vulnerability analysis result; based on the vulnerability analysis result, obtaining a vulnerability detection result of the target program. The invention further discloses a program vulnerability detection device, terminal equipment and a computer readable storage medium. By utilizing the vulnerability detection method of the program, the technical effect of improving the vulnerability detection efficiency of the program is achieved.

Description

technical field [0001] The present invention relates to the technical field of program detection, in particular to a program vulnerability detection method, device, terminal equipment and computer-readable storage medium. Background technique [0002] With the development of information technology, the number and types of programs are increasing, and at the same time, the loopholes in the programs are also increasing. Software vulnerabilities refer to flaws in the logic design of the program, or errors in the process of programming; illegal users can use software vulnerabilities to steal important information, and even use software vulnerabilities to obtain system privileges, and then perform various illegal operations. At present, the research focus of program vulnerability detection is how to detect vulnerabilities, how to describe characteristic leaks and how to locate vulnerabilities. [0003] In related technologies, a program vulnerability detection method is proposed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/56G06F8/30G06F8/41
CPCG06F21/577G06F21/563G06F8/37G06F8/425G06F2221/033
Inventor 韩兰胜孙润华王涛
Owner PENG CHENG LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products