Vulnerability detection method and device for application program, equipment, storage medium and program
An application and vulnerability detection technology, applied in the computer field, can solve problems such as difficult to understand and difficult to detect security vulnerabilities, and achieve the effect of high efficiency, easy location and high accuracy of problem location and repair.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] To make the object, technical solution and advantages of embodiments of the present invention more clear, the following will be combined with the accompanying drawings in the embodiments of the present invention, the technical solutions in the embodiments of the present invention are clearly and completely described, obviously, the embodiments described are part of the embodiments of the present invention, not all embodiments. Based on embodiments in the present invention, all other embodiments obtained by those of ordinary skill in the art without making creative labor, are within the scope of protection of the present invention.
[0046] The method of embodiments of the present invention may be applied to the application of the application of security vulnerabilities in the detection of the scene, the application for example to the Android application as an example to illustrate.
[0047]Vulnerability detection method of an application of an embodiment of the present inv...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com