Vulnerability detection method and device for web application program and computer readable storage medium

An application and vulnerability detection technology, applied in the computer field, can solve the problems of low comprehensiveness and low accuracy of vulnerability detection, and achieve the effect of improving the comprehensiveness and accuracy

Pending Publication Date: 2021-11-23
SECZONE TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a web application loophole detection method, device and computer-readable storage medium, aiming to solve the problem of low comprehensiveness and accuracy in loophole detection of the web application to be tested in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device for web application program and computer readable storage medium
  • Vulnerability detection method and device for web application program and computer readable storage medium
  • Vulnerability detection method and device for web application program and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the objects, technical solutions, and advantages of the present invention, the present invention will be described in conjunction with the embodiments of the present invention and the corresponding drawings, wherein the same or similar reference numerals are identical to the same. Or similar components or components having the same or similar functions. It should be understood that various embodiments of the invention described below are intended to be utilized to illustrate the invention, that is, the present invention, that is, according to various embodiments of the present invention, one of ordinary skill in the art is not creative. All other embodiments obtained under labor will belong to the scope of the invention. Further, the technical features according to each embodiment of the present invention described below may be combined with each other as long as there is no conflict between each other.

[0020] In the related art, since the stain data and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vulnerability detection method and device for a web application program and a computer readable storage medium; the method comprises the steps: obtaining request data of a to-be-detected web application program; then propagating the request data through n propagation functions to obtain n pieces of new request data, wherein, the n is a positive integer larger than 1, the output of the propagation functions is the new request data, and the input of the nth propagation function is the output of the (n-1) th propagation function; before the nth propagation function obtains the output of the (n-1) th propagation function, copying the (n-1) th propagation function and the corresponding output from the current thread variable to the global variable, and when the nth propagation function does not obtain the output of the (n-1) th propagation function, obtaining the output of the (n-1) th propagation function from the global variable; obtaining execution parameters; and according to the execution parameters, the request data and the new request data, determining whether the web application program to be tested has vulnerabilities or not. According to the method and the device, the comprehensiveness and the accuracy during vulnerability detection of the web application program to be detected can be improved.

Description

[Technical field] [0001] The present invention relates to the field of computer technology, and more particularly to a vulnerability detection method, a device, and a computer readable storage medium of a web application. 【Background technique】 [0002] In the relevant technologies, the security test technology of web applications generally includes Dast (Dynamic ApplicationSecurity Testing, Dynamic Application Security Test) technology, Sast (Static Application SecurityTesting, Static Application Security Test) Technology and IAST (Intective Application SecurityTesting, Interactive App) Program security test) technology. In an IAST technology, when the WEB application is detected, the stain data and the corresponding stream are usually tracked; where the stain data refers to the data entered by the user at the front end of the WEB application to be tested. During the tracking process, due to the stain data and the corresponding function streams are stored in the current thread v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577Y02D10/00
Inventor 刘海涛万振华王颉李华董燕
Owner SECZONE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products