Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for detecting backdoor code through static analysis

A static analysis and code technology, applied in the field of information security, can solve problems such as security, hidden dangers, and inability to detect backdoor codes in the operating system, and achieve the effect of avoiding damage and theft and increasing security

Pending Publication Date: 2021-11-05
SECZONE TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Due to the high similarity between the writing logic, functions and code structure of the backdoor code and the normal code in the program under test, it is difficult for the traditional white box test to identify the backdoor code, so it is impossible to detect the backdoor code, and the operating system is running to be tested. There are security risks in the program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting backdoor code through static analysis
  • Method for detecting backdoor code through static analysis
  • Method for detecting backdoor code through static analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following is attached Figure 1-3 The application is described in further detail.

[0028] The embodiment of the present application discloses a method for detecting backdoor code through static analysis. Static analysis refers to checking the correctness of the program by analyzing the syntax, structure, process, interface, etc. of the source program without running the program itself. Static analysis mainly checks the consistency of code and design, code compliance with standards, readability, correctness of code logic expression, rationality of code structure, etc.; it can find problems that violate the programming standards, and the program is not safe , ambiguous and vague parts mainly refer to the backdoor code. Most of the backdoor codes are illegal codes intentionally reserved by developers. Through the backdoor codes, the security certification of the operating system can be bypassed to directly obtain data access rights, usually for data destruction or da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for detecting a backdoor code through static analysis, and is applied to the technical field of information security. The method comprises the steps that detection equipment detects a target code segment where a preset specific function is located in to-be-detected codes; the detection equipment tracks a data stream transmission path of the target code segment; the detection equipment obtains preset backdoor code judgment conditions, wherein the backdoor code judgment conditions at least comprises a system level operation or a data output operation; if the system level operation or the data output operation exists in the data stream transmission path of the target code segment, the detection equipment determines that a backdoor code exists in the target code segment; and the detection equipment locates and displays a specific position of the backdoor code according to the data stream transmission path of the target code segment. According to the method, the backdoor code in the to-be-detected codes is detected through the detection equipment, so that the safety of running a to-be-detected program by an operating system is improved, and data in the operating system is prevented from being damaged and stolen.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a method for detecting backdoor codes through static analysis. Background technique [0002] At present, the software testing method is mainly static testing, which means that the program under test is detected through analysis without running the program under test. White box testing is a static test. Traditional white box testing is to test the program according to the internal structure of the program. By testing whether all the logic paths in the program under test can run normally according to the predetermined requirements, the loopholes in the program under test are detected. . [0003] Backdoor code is a special kind of vulnerability. Most backdoor codes are illegal codes intentionally reserved by developers. Backdoor codes can bypass the security certification of the operating system and directly obtain data access rights, usually for data destruc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F21/56
CPCG06F21/577G06F21/563G06F2221/033
Inventor 万振华
Owner SECZONE TECH CO LTD