Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Program bug detection method based on adjustable object analysis

A technology of loopholes and objects, applied in the field of software engineering, can solve problems such as inaccurateness, repeated inspections, and lack of focus in inspections

Active Publication Date: 2014-12-10
JIANGSU BOZHI SOFTWARE TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current vulnerability model software vulnerability detection method has shortcomings such as repeated inspections, lack of focus, and inaccuracy in the detection process. The detection speed and accuracy are insufficient, which affects the applicability of the detection method.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program bug detection method based on adjustable object analysis
  • Program bug detection method based on adjustable object analysis
  • Program bug detection method based on adjustable object analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The working process of the inventive method is as Figure 1-Figure 6 shown.

[0018] figure 1 Shown is the overall structure and working principle of this method implementation. The purpose of this method is to analyze and detect the program to be detected according to the operating state involved in the vulnerability model, and report the discovered vulnerabilities. In order to improve the processing speed, the vulnerability model needs to be loaded into the memory from the database, so that it can be used as a reference when analyzing the program. In the process of vulnerability model detection, the detection and analysis work is carried out step by step according to the operating status of the vulnerability in units of functions. Vulnerability model detection starts from the main function, and performs state detection and reports the existence of vulnerabilities according to the model detection results of vulnerability-related operations and step-by-step functions...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a program bug detection method based on adjustable object analysis. The method comprises the following steps of: 1) performing a bug model loading process to establish the data structure of the bug model; and 2) performing program state feature detection and handling process to carry out the model detection work with a function as a unit and report the existence of a bug. In order to improve the speed of detection and processing, the bug model is required to be loaded into a memory from a database and is taken as a reference frame for program analysis. During bug model detection, the detection and analysis work is carried out step by step with the function as the unit according to the relevant bug operation status. The bug model detection is started from a main function, and the status detection is carried out and the existence of the bug is reported according to the relevant bug operation and step-by-step function model detection results. The bug model consists of the aggregation of relevant bug operations. The operations represent actions resulting in the change of the status. Every operation has attributes such as operation number, action, feature, and aggregation of input variables and output variables.

Description

technical field [0001] The invention relates to the technical field of software engineering, in particular to a detection method for software. Background technique [0002] Software is vulnerable to attacks and losses due to hidden security holes, and its security threats are on the rise. Discovering and eliminating security loopholes in software is one of the important means to reduce security threats and security risks by performing vulnerability detection on software codes. Vulnerability model detection is a representative code vulnerability detection method. To this end, we propose an adjustable object program state feature extraction method for vulnerability detection, which can be used for state abstract modeling of the program code to be detected and to establish a program state feature model for vulnerability detection. [0003] The current vulnerability model software vulnerability detection methods have shortcomings such as repeated inspections, non-focused inspe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
Inventor 曾庆凯
Owner JIANGSU BOZHI SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products