Security detection method and device

A security detection and square library technology, applied in the field of Internet of Things information security, can solve problems such as poor applicability and reliability, and achieve the effect of improving applicability and reliability

Pending Publication Date: 2022-07-22
CHINA MOBILE COMM LTD RES INST +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a security detection method and device, which can solve t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security detection method and device
  • Security detection method and device
  • Security detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0025] Due to the separation of R&D and production in the manufacturing process of embedded devices, different firmwares may contain the same vulnerabilities, for example, different versions of firmware of the same device, or even a large number of the same vulnerabilities in the firmware of different devices, such as: buffer Overflow and out-of-bounds vulnerabilities, remote command injection vulnerabilities, etc.

[0026] In the related ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security detection method and device.The method comprises the steps that target firmware is obtained, firmware features are extracted, and the firmware features comprise third-party library information called by the target firmware; based on the firmware features, matching a third-party library called by the target firmware with a target third-party library in a preset vulnerability information database to obtain a first similarity; based on the firmware features, performing firmware homology detection on a third-party library called by the target firmware and a target third-party library in a preset vulnerability library to obtain a second similarity; the second similarity is adjusted on the basis of the first similarity to obtain a target similarity, and when the target similarity is larger than or equal to a similarity threshold value, vulnerability prompt information is output, and the vulnerability prompt information is used for prompting that a third-party library called by the target firmware has vulnerabilities corresponding to the target third-party library. The security detection method provided by the embodiment of the invention is wide in application range and high in reliability.

Description

technical field [0001] The invention relates to the technical field of Internet of Things information security, in particular to a security detection method and device. Background technique [0002] With the wider application of embedded IoT devices, the security of the firmware in the embedded IoT devices is very important to the security of the IoT. [0003] In the related art, security detection technology can be used to detect the security of firmware to find vulnerabilities in firmware, so as to facilitate users to discover and reinforce the vulnerabilities in time, for example: using feature matching, binary difference detection, fuzzy hash or Security detection technologies such as third-party library detection are used to detect the security of firmware. [0004] However, the security detection technology in the related art often needs to detect firmware vulnerabilities based on firmware information such as firmware version, manufacturer, interface function, etc. Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06K9/62G16Y20/20G16Y30/10G16Y40/10G16Y40/50
CPCG06F21/572G06F21/577G16Y20/20G16Y30/10G16Y40/10G16Y40/50G06F18/22G06F18/214
Inventor 张玉玲曾海涛
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products