Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud deployment automatic vulnerability mining system based on fuzzy testing

A technology of fuzzing and vulnerability mining, applied in the direction of platform integrity maintenance, etc., can solve the problems of longer testing time, continuous tracking and improvement of unfavorable vulnerabilities, and increasing work links, etc., to achieve good operability and convenience, The effect of avoiding the test input link and speeding up the iterative efficiency

Pending Publication Date: 2022-04-08
上海安般信息科技有限公司
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Some software testing methods, such as dynamic testing and other vulnerability mining techniques, test products by artificially simulating hackers’ malicious intrusions, but this testing method is very dependent on manual heuristic operations
An excellent tester can execute no more than dozens of test cases a day, the labor cost is high, and he is helpless when dealing with very complex and huge systems
[0004] At present, the vulnerability mining software based on fuzz testing is developing rapidly, but the fuzz testing systems in the prior art are all single-node independent deployment structures, and cannot dynamically scale out the system according to the needs of the test scale and test environment. The time required is greatly increased, which requires a huge cost of testing time for complex projects
Moreover, the existing test system exists independently as a tool. After the development work is completed, the developer needs to manually import the target to be tested into the test system for testing. It is conducive to the continuous tracking and continuous improvement of the loopholes found in the test in the software testing process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud deployment automatic vulnerability mining system based on fuzzy testing
  • Cloud deployment automatic vulnerability mining system based on fuzzy testing
  • Cloud deployment automatic vulnerability mining system based on fuzzy testing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0057] The technical solution of the present invention will be described in detail below with specific examples. The following specific embodiments may be combined with each other, and the same or similar concepts or processes may not be repeated in some embodiments.

[0058] Based on the existing problems in the prior art, the embodiment of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud deployment automatic vulnerability mining system based on fuzz testing, which comprises a fuzz testing access device and a fuzz testing engine management device which are respectively used for receiving and acquiring test configuration parameters, test target program files and test control instructions; the fuzzy test engine device is used for obtaining a test target program file to carry out instrumentation compilation and executing a vulnerability mining test on the program subjected to instrumentation compilation by using a test configuration parameter according to a test control instruction; the fuzz test result device is used for acquiring test data of an abnormal program and displaying the test data to the test user through a visual interface; and the system resource probe device is used for acquiring cluster resources and reporting the cluster resources to the fuzzy test engine management device. According to the cloud deployment automatic vulnerability mining system based on the fuzzy test, cloud deployment of the fuzzy test system is realized, the test time is saved, and the iteration efficiency is accelerated.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of fuzz testing, in particular to a fuzz testing-based automated vulnerability mining system for cloud deployment. Background technique [0002] The current software testing technology can only find and identify specific types of errors and defects. It matches the reported CVE (Common Vulnerabilities and Exposures) with the current software to determine whether there are "known types" in the software. loophole. In fact, the "known" vulnerabilities reported on the market may only be the tip of the iceberg of all vulnerabilities, and more hidden "unknown" vulnerabilities are often unpredictable in the software. Therefore, even if the software is tested by strict traditional testing schemes, which can only ensure that there are no known vulnerabilities, it will still face more unknown vulnerabilities exposed after it is put into operation. [0003] Some software testing methods, such...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
Inventor 汪毅
Owner 上海安般信息科技有限公司