Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software vulnerability model detection method based on vulnerability model

A model detection and software vulnerability technology, which is applied in the field of software vulnerability model detection based on the vulnerability model, can solve problems affecting system stability and flexibility, inconvenience, security risks, system security risks, etc., to achieve high detection capabilities and prevent Destruction, good concealment effect

Inactive Publication Date: 2022-07-08
厦门农芯数字科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to overcome the existing defects and provide a software vulnerability model detection method based on the vulnerability model, so as to solve the problem that the system loopholes on the market are constantly emerging in the above-mentioned background technology, so that the system has more problems when it is used. Large security risks, and the existence of loopholes seriously affect the stability and flexibility of the system, it is easy to be discovered by system attackers and use the loopholes to attack the system, so there is great inconvenience and security risks when using The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software vulnerability model detection method based on vulnerability model
  • Software vulnerability model detection method based on vulnerability model
  • Software vulnerability model detection method based on vulnerability model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0034] see Figure 1-4 , the present invention provides a technical solution: a software vulnerability model detection method based on a vulnerability model, comprising the following steps:

[0035] Step 1: Perform state derivation on the execution input, software calling process, and function set of the software, so as to determine whether the state transition will exceed the security range. Whether the vulnerability exists in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software vulnerability model detection method based on a vulnerability model, which comprises the following steps of: performing state derivation on execution input, a software calling process and a function set of software so as to judge whether state transition exceeds a safe range or not; feature code scanning and specific function or specific process detection can be carried out on the public vulnerabilities to determine whether the software system has the vulnerabilities or not; for unknown vulnerabilities, whether a software system has vulnerabilities or not can not be obtained through direct detection generally, and due to the fact that the unknown vulnerabilities often cause the vulnerabilities for specific execution processes and / or specific input conditions of unsafe codes, the method solves the problem that the vulnerabilities cannot be generated in the process of system vulnerability detection and protection in Web application at present. In the prior art, the privacy of data information cannot be effectively protected, and an attacker can identify the information of the Web site accessed by the user according to the contour features of the Web information flow, so that the Web content of the user is leaked.

Description

technical field [0001] The invention belongs to the technical field of vulnerability model detection, in particular to a software vulnerability model detection method based on a vulnerability model. Background technique [0002] The negligence of software developers when developing software, or the limitations of programming languages. For example, the C language family is more efficient than Java but has more loopholes. Computer systems are almost compiled in C language, so patches are often required. Software loopholes are sometimes discovered by the author in future inspections and then corrected; some people specifically find other people's loopholes to do some illegal things, and when the author knows that their loopholes are exploited by others, they will try to remedy them. [0003] At present, there are many system loopholes on the market, which make the system have great security risks when using it, and the existence of loopholes seriously affects the stability and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06F21/57G06K9/62
CPCH04L63/1416H04L63/1433G06F21/577G06F18/24
Inventor 薛素金郑建民
Owner 厦门农芯数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products