Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

55 results about "Control flow analysis" patented technology

In computer science, control-flow analysis (CFA) is a static-code-analysis technique for determining the control flow of a program. The control flow is expressed as a control-flow graph (CFG). For both functional programming languages and object-oriented programming languages, the term CFA, and elaborations such as k-CFA, refer to specific algorithms that compute control flow.

Static taint analysis and symbolic execution-based Android application vulnerability discovery method

The invention discloses a static taint analysis and symbolic execution-based Android application vulnerability discovery method, and mainly aims at solving the problems that the analysis range is fixed, the memory consumption is huge and the analysis result is mistakenly reported in the process of discovering vulnerabilities by using the existing static taint analysis method. The method is realized through the following steps of: 1) configuring an analysis target and decompiling a program source code; 2) carrying out control flow analysis on the decompilation result; 3) selecting a source function by a user according to the control flow analysis result, so as to narrow an analysis target; 4) carrying out data flow analysis according to the control flow analysis result, so as to generate a vulnerability path; and 5) filtering the data flow analysis result by adoption of a static symbolic execution technology, taking the residual parts after the filtration as discovered vulnerabilities, warning the user and printing the vulnerability path. On the basis of the existing static taint analysis technology, the method disclosed by the invention has the advantages of extending the vulnerability discovery range, decreasing the memory consumption of vulnerability discovery and improving the accuracy of vulnerability discovery results, and can be applied to the discovery and research of Android application program vulnerabilities.
Owner:XIDIAN UNIV

Intrinsic function recognition method based on sub-graph isomorphism matching algorithm in decompilation

The invention discloses an intrinsic function recognition method based on a sub-graph isomorphism matching algorithm in decompilation, and belongs to the technical field of decompilation. According to the method, an intrinsic function template library is established, sub-graph isomorphism matching is conducted on intrinsic function templates and target assembling files generated through decompilation on the basis of a control flow diagram, and intrinsic functions which are subjected to compiler optimization and inline expansion in target programs of the target assembling files are positioned. According to the intrinsic function recognition method, inline intrinsic functions in the decomplation process can be recognized automatically, meanwhile, the templates and prototypes of the intrinsic functions are analyzed, the function names, returned values, returned value types and function parameters of the intrinsic functions are recovered, and thus the purpose of promoting the semantics of the inline intrinsic functions is achieved. More type information is provided for type analysis in decompilation through the promoted inline intrinsic functions, the complexity of data flow analysis and control flow analysis is lowered, the level of abstraction of intermediate codes is improved, and the readability of decompilation results is enhanced.
Owner:XI AN JIAOTONG UNIV

Instrumentation based program behavior acquisition and structural analysis method

ActiveCN105183642AStructural awarenessGood behavior acquisition abilitySoftware testing/debuggingData streamStructural analysis
The present invention relates to an instrumentation based program behavior acquisition and structural analysis method. The program behavior acquisition and structural analysis method comprises the following steps of: step 1. static analysis: performing control flow analysis, data flow analysis and library function analysis on a program, performing analysis on functions of the program, determining a scope of each function of the program, analyzing a structure of the program, determining an initial instrumentation position of the program, and performing a first-pass instrumentation; step 2. program behavior extraction: performing simulation execution on the program subjected to the first-pass instrumentation, extracting a program behavior in a library function running process according to a flag bit of a pile function, and storing the program behavior into a behavior library; and step 3. program behavior analysis: performing partitioning on structural characteristics shown in a program running process according to a structural partitioning rule, and performing a second-pass instrumentation, and finally performing compiling to obtain an executable file. The instrumentation based program behavior acquisition and structural analysis method provided by the present invention has an excellent software behavior acquisition ability and structural analysis ability.
Owner:THE PLA INFORMATION ENG UNIV

Mobile application source code security auditing system based on code dynamic analysis

The invention discloses a mobile application source code security auditing system based on code dynamic analysis. The system comprises a code scanning engine module, an application presentation layermodule and a data storage module. The application presentation layer module provides an external system integration interface for a front-end interface of the system. The code scanning engine module cooperates with the application presentation layer module to realize planning, creation, scanning and report generation of a code security scanning task. The data storage module is used for system datastorage. A virtual execution technology is adopted, so that the problems of low efficiency and low accuracy of first-generation and second-generation technologies based on pattern matching, data flow/control flow analysis and the like are solved. The labor and time cost wasted for coping with invalid vulnerabilities is reduced, and the security risk brought to a company due to missing report of atraditional code scanning tool is reduced. Customization can be carried out according to actual requirements of the company. The efficiency is further improved. The code security level of the companyis comprehensively improved with the cost as low as possible.
Owner:ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products