Unlock instant, AI-driven research and patent intelligence for your innovation.

Automatic vulnerability mining method and system capable of automatically adjusting load

A vulnerability mining and self-adjusting technology, applied in program loading/starting, energy-saving computing, software testing/debugging, etc., can solve problems such as time-consuming, insufficient automation, and low efficiency, so as to reduce workload, improve efficiency, The effect of increasing the degree of automation

Active Publication Date: 2022-05-17
南京赛宁信息技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the problems existing in the fuzzing test vulnerability mining are: 1. The process of testing with a large number of test cases is time-consuming and inefficient
2. Existing technical solutions cannot make full use of the hardware resources used for testing
3. The degree of automation of existing technical solutions is not high enough, requiring a lot of manual intervention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic vulnerability mining method and system capable of automatically adjusting load
  • Automatic vulnerability mining method and system capable of automatically adjusting load
  • Automatic vulnerability mining method and system capable of automatically adjusting load

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Below in conjunction with specific embodiment, further illustrate the present invention, should be understood that these embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various equivalent forms of the present invention All modifications fall within the scope defined by the appended claims of the present application.

[0040] An automatic vulnerability mining method with self-adjusting load disclosed in the embodiment of the present invention mainly includes: first packaging the vulnerability mining environment, the target program and the test tool into a mirror image and uploading it to the virtualization platform, uploading the test case to the test case warehouse; and then Generate a test case queue according to the number of test cases set by the user; then start the specified initial number of virtual machin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an automatic vulnerability mining method and system capable of self-adjusting load, and the method comprises the steps: firstly packaging a vulnerability mining environment, a target program and a test tool into a mirror image, uploading the mirror image to a virtualization platform, uploading a test case to a test case warehouse, and generating a test case queue; starting a specified initial number of virtual machines as working nodes through the virtualization platform, starting a host process by a test tool on the working nodes, starting and managing a plurality of working processes by the host process, and executing vulnerability mining test work by the working processes; the test tool carries out self-adjustment on the load of the working node according to the computing resource occupation condition of the working node until saturation is achieved; and after all the working nodes run stably, the number of the working nodes is automatically adjusted according to the consumption speed of the test case and the test plan time limitation, so that the test work can be completed within the plan time. According to the method, the test load can be automatically optimized, and the utilization rate of computing resources and the vulnerability mining efficiency are improved.

Description

technical field [0001] The invention relates to an automatic loophole mining method and system based on cloud computing self-adjusting load, belonging to the fields of automatic testing and computer software. Background technique [0002] Fuzz test vulnerability mining technology is an automated testing technology, which generates a large number of semi-effective test cases as the input of the target program through random algorithms, monitors the abnormalities of the target program, and finds possible security vulnerabilities in the target program. [0003] Such as figure 1 As shown, a typical fuzz test vulnerability mining process is as follows: 1. Generate test case files through a specific random algorithm. For the target program, the file has a valid necessary identifier and can be used as a valid input of the target program, but the content of the file is invalid, which may cause an exception during the processing of the target program. 2. Open the test case file wit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F9/445G06F11/36G06F16/2458G06F16/28
CPCG06F21/577G06F16/283G06F16/2465G06F9/4451G06F11/3688G06F11/3684Y02D10/00
Inventor 宋遥殷庆荣谢峥高庆官卢成远
Owner 南京赛宁信息技术有限公司