Access control vulnerability detection method and system based on state deviation analysis
A technology for access control and vulnerability detection, applied in the field of network security, can solve the problems of incapable of modeling and reducing complex data relationships, and achieve the effects of improving detection efficiency, improving detection efficiency, and reducing dependence.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The present invention will be further explained below in conjunction with accompanying drawing and specific embodiment:
[0049] Such as figure 1 As shown, an access control vulnerability detection method based on state deviation analysis, including:
[0050] Taking the source code of the web application as input, the site map and the expected behavior logic contained in the code are extracted through static analysis, and then the generated site map is used as a guide for dynamic analysis, and the login credentials of multi-role and multi-user are input for Obtain HTTP requests and HTTP responses under different login states;
[0051] Use the finite state machine (FSM) to model the web application, formalize the discovery of access control vulnerabilities into the difference comparison between the expected FSM behavior model and the actual FSM behavior model, identify access control vulnerabilities and generate vulnerability reports; including : Static analysis is use...
PUM
![No PUM](https://static-eureka.patsnap.com/ssr/23.2.0/_nuxt/noPUMSmall.5c5f49c7.png)
Abstract
Description
Claims
Application Information
![application no application](https://static-eureka.patsnap.com/ssr/23.2.0/_nuxt/application.06fe782c.png)
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com