Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Loophole finding method based on loophole correlation distribution model

A technology for discovering methods and distribution models, applied in the field of information security, can solve problems such as memory corruption, inability to accurately match unstructured changes, access control defects, etc., to achieve the effect of improving efficiency and accuracy

Inactive Publication Date: 2017-12-29
BEIJING INST OF COMP TECH & APPL
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the patch comparison technology based on source code is relatively mature, and it is of little significance to find vulnerabilities. The patch comparison technology based on binary code is easily affected by compiler optimization, and cannot accurately match unstructured changes.
[0008] The fuzzing tool provides some form of input data to the input interface of the target software and monitors its processing to find potential security vulnerabilities. However, when it finds some vulnerabilities, there will be problems such as access control defects, poor design logic, and memory corruption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Loophole finding method based on loophole correlation distribution model
  • Loophole finding method based on loophole correlation distribution model
  • Loophole finding method based on loophole correlation distribution model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0022] figure 1 Shown is a flowchart of a vulnerability discovery method based on the vulnerability correlation distribution model of the present invention, as figure 1 As shown, a vulnerability discovery method based on the vulnerability correlation distribution model of the present invention includes the following steps:

[0023] Step 1: Establish a vulnerability knowledge base, complete the collection and collaborative sharing of specific information system vulnerability knowledge, and form a simplified diagram of the vulnerability relationship.

[0024] Step 1 specifically includes:

[0025] Figure 2a-Figure 2d Shown is a schematic diagram of four forms of combing the relationship between vulnerabilities. Step ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a loophole finding method based on a loophole correlation distribution model. The method comprises the following steps of 1, building a loophole knowledge base, completing collecting and cooperative sharing work for specific information system loophole knowledge to form a loophole correlation simple graph; 2, on the basis of the loophole knowledge base, adopting a loophole correlation calculation module for calculating the loophole influence degree and loophole correlation compactness; 3, according to the calculated loophole influence degree and relevancy indexes, perfecting the loophole correlation simple graph into the loophole correlation distribution model; 4, by comparing a detected loophole set and the loophole correlation distribution graph, predicting loophole positions. According to the loophole finding method based on the loophole correlation distribution model, the loophole correlation distribution graph comparison mode is adopted for performing known security loophole finding work, then, the conventional loophole excavation work is guided cooperatively, and the loophole finding efficiency and accuracy are improved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for testing and analyzing the security of an information system. Background technique [0002] Most of the network attacks and malicious programs (viruses, worms, Trojan horses, etc.) on the Internet are related to vulnerabilities, so it is imperative to study vulnerability discovery technology. Research on vulnerability discovery technology can improve the security and reliability of software products, reduce the number of malicious programs, avoid network attacks, and provide strong technical support for the software industry and security industry. [0003] The discovery of security vulnerabilities includes the mining of unknown vulnerabilities and the identification of known vulnerabilities. Unknown vulnerability mining technology refers to analyzing and testing the target through manual or auxiliary tools, mining the target operation process...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 刘健雄陈志浩温泉吴明杰贾琼达小文毛俐旻
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products