Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

43 results about "Software Security Vulnerability" patented technology

A vulnerability is a security weakness in a software program that puts the program or computer at risk of malicious programs and users.

Assessment and analysis of software security flaws

InactiveUS20100281248A1Facilitates security assessment and vulnerability testingFacilitates benchmarkingMemory loss protectionDigital data processing detailsSecurity assessmentProgram planning
Security assessment and vulnerability testing of software applications is performed based at least in part on application metadata in order to determine an appropriate assurance level and associated test plan that includes multiple types of analysis. Steps from each test are combined into a “custom” or “application-specific” workflow, and the results of each test may then be correlated with other results to identify potential vulnerabilities and / or faults.
Owner:VERACODE

Detection device and method for security vulnerability of software

The invention relates to the field of computers, in particular to a detection device and method for a security vulnerability of a dedicated information system. According to the detection device and method disclosed by the invention, a tester can not only access a target system to a testing network but also access the detection device to a production system by connecting a test terminal with the target system, wherein the target system is located in the production system. As the core of the detection device, a system security analysis and test management platform comprises a vulnerability discovering system, a vulnerability authenticating and analyzing system, a permeability testing system, a vulnerability library, a test case library, a report outputting system, a user and permission management system, a system management platform and the like. When the detection device and method for the security vulnerability of the software, provided by the invention, are adopted, the vulnerability can be found before the application of the software, and corresponding strategies can be provided, so that the detection device and method meet the requirement on the emphasis on information security in the current society in a better manner; and moreover, the detection device and method have a higher application value.
Owner:AVIATION IND INFORMATION CENT

Software security vulnerability detection method based on tree structure convolutional neural network

The invention discloses a software vulnerability detection method based on a tree structure convolutional neural network, and the method comprises the steps: analyzing a source code to obtain an abstract syntax tree AST structure, and extracting the node type of each node in the AST structure; constructing a neural network pre-processing model containing an embeding layer, inputting the neural network pre-processing model into an extracted node type, and outputting a prediction probability of the node type; performing neural network training by using the node type; after training is completed,enabling the vector characteristic values output by the embeding layer to serve as input of a convolutional neural network model, taking whether vulnerabilities exist in source codes or not as labels, and training the convolutional neural network model to serve as a code classifier; and for the source code to be detected, extracting the node type in the AST structure of the source code, retraining the neural network preprocessing model, and inputting the vector characteristic value output by the embeding layer into the convolutional neural network model to obtain a vulnerability detection result. According to the method, the feature information in the code can be better extracted, so that a comprehensive analysis result can be given.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Software security loophole prediction method based on assembly dependence diagram

ActiveCN107798245AClearly describe the connection strengthDescribe the connection strengthPlatform integrity maintainanceSoftware engineeringVulnerability
The invention provides a software security loophole prediction method based on an assembly dependence diagram and provides a software code measuring index from different angles to establish a loopholeprediction model. The software security loophole prediction method comprises the following steps that 1, the assembly dependence diagram of prediction software is established; 2, network attribute values of nodes in the assembly dependence diagram in the step 1 are calculated; 3, all software loopholes of the prediction software are searched from a disclosed software loophole library, and a historical loophole library of the software is established; 4, network attribute values, calculated in the step 2, of the nodes serve as inputs of a machine learning algorithm, the number of loopholes in the step 3 serves as an output of the machine learning algorithm, the machine learning algorithm is trained and tested, and a prediction model having optimal performance is determined according to performance evaluation indexes of the machine learning algorithm; 5, the prediction model having optimal performance obtained in the step 4 is applied to loophole prediction of new software assemblies ofa software project.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Source code-oriented bipolar software security vulnerability graph construction method

The invention discloses a source code-oriented bipolar software security vulnerability graph construction method, solving the problems of single vulnerability feature, lack of semantic information andlow vulnerability mining precision in a current vulnerability graph model. The technical scheme includes the steps: obtaining vulnerability source codes through crawlers; preprocessing the vulnerability source codes; carrying out data analysis and extraction, including feature extraction, entity extraction and relationship extraction; constructing a vulnerability graph, including taking the sub-graph as a basic unit of the vulnerability graph, and visualizing and storing the vulnerability graph; and performing vulnerability graph optimization: removing a large amount of redundant informationby pruning the sub-graph to achieve vulnerability graph optimization. According to the vulnerability graph constructed by the invention, the forward and reverse characteristics of the vulnerability are displayed at the same time through comparison; the complex relation among the characteristic items is embodied; existing semantic structure information is enriched; a reliable basis is provided forresearch of vulnerability causes; vulnerability mining precision is improved; system software safety is guaranteed; and the vulnerability graph is used for computer security vulnerability mining and management.
Owner:XIAN TECH UNIV

Software security vulnerability discovery method and system, storage medium and computer device

The invention discloses a software security vulnerability discovery method. The mining method comprises the following steps: converting to-be-analyzed software into a program code package in an intermediate language form; constructing a control flow graph and identifying a current function name according to the program code package; determining a stain source function and a stain source accordingto the current function name; determining a safety critical function according to the current function name and the safety critical function library; obtaining statements related to the stain source function and/or the security critical function to serve as to-be-analyzed code segments; carrying out symbol execution and stain analysis on the to-be-analyzed code segment; and when the stain source is propagated to the security critical function, generating alarm information of the software security vulnerability. The invention further discloses a discovery system, a computer readable storage medium and a computer device. According to the discovery method, the discovery system, the computer readable storage medium and the computer device, the warning information of the software security holecan be directly generated according to the program code of the to-be-analyzed software, the process is full-automatic, and manual participation is not needed.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Open source software security vulnerability patch positioning method based on sorting

The invention provides a sorting-based open source software security vulnerability patch positioning method. The method specifically comprises the following steps: collecting vulnerability and code submission data from a website; extracting vulnerability and code submission similarity characteristics of four dimensions including code lines, vulnerability identities, vulnerability repair positions and segmented word bags by using a data mining and statistical analysis method; training a bug field text semantic coding module based on a Bert model, and extracting bug semantic features and code submission semantic features by using the semantic coding module; splicing the semantic features of the vulnerability and the semantic features of the code submission to form all features of the vulnerability and the code submission; model training; and carrying out model fusion by using a majority voting thought. According to the method, features can be extracted from vulnerabilities and code submission, a vulnerability patch submission sorting model is established, code submission in an open source software warehouse is sorted according to the matching degree with the vulnerabilities, and the number of submission codes needing to be checked by patch labeling personnel is effectively reduced.
Owner:ZHEJIANG UNIV CITY COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products