Program bug detection method based on adjustable object analysis
A technology of loopholes and objects, applied in the field of software engineering, can solve problems such as inaccurateness, repeated inspections, and lack of focus in inspections
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] The working process of the inventive method is as Figure 1-Figure 6 shown.
[0018] figure 1 Shown is the overall structure and working principle of this method implementation. The purpose of this method is to analyze and detect the program to be detected according to the operating state involved in the vulnerability model, and report the discovered vulnerabilities. In order to improve the processing speed, the vulnerability model needs to be loaded into the memory from the database, so that it can be used as a reference when analyzing the program. In the process of vulnerability model detection, the detection and analysis work is carried out step by step according to the operating status of the vulnerability in units of functions. Vulnerability model detection starts from the main function, and performs state detection and reports the existence of vulnerabilities according to the model detection results of vulnerability-related operations and step-by-step functions...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com