Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A vulnerability detection method and device based on Java exception

A vulnerability detection and vulnerability technology, which is applied in the field of vulnerability detection based on Java exceptions, can solve the problems of low efficiency of vulnerability detection and achieve the effect of improving the technical effect of vulnerability detection efficiency

Inactive Publication Date: 2019-04-23
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide a method and device for detecting vulnerabilities based on Java exceptions, so as to alleviate the technical problem of low efficiency in detecting vulnerabilities of Java programs in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A vulnerability detection method and device based on Java exception
  • A vulnerability detection method and device based on Java exception
  • A vulnerability detection method and device based on Java exception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] According to an embodiment of the present invention, an embodiment of a method for detecting vulnerabilities based on Java exceptions is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0027] figure 1 It is a method for detecting vulnerabilities based on Java exceptions according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0028] Step S102, obtaining the Java program to be detected;

[0029] Step S104, determining the abnormal interface class to be detected of the Java program to be detected;

[0030] Step S106, obtaining the gray box program written based on the abnormal interface class ...

Embodiment 2

[0056] The present invention also provides a Java exception-based vulnerability detection device, which is used to implement the Java exception-based vulnerability detection method provided by the above-mentioned content of the embodiment of the present invention. The following is the Java exception-based vulnerability provided by the embodiment of the present invention A detailed description of the detection device.

[0057] Such as image 3 As shown, the device includes: a first acquisition unit 10, a determination unit 20, a second acquisition unit 30, a third acquisition unit 40 and an execution unit 50, wherein,

[0058] The first obtaining unit 10 is used to obtain the Java program to be detected;

[0059] The determining unit 20 is used to determine the abnormal interface class to be detected of the Java program to be detected;

[0060] The second obtaining unit 30 is used to obtain a gray box program written based on the abnormal interface class to be detected;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability detection method and device based on Java exception, and relates to the technical field of vulnerability detection. The method comprises the steps of obtaining ato-be-detected Java program; determining a to-be-detected abnormal interface class of the to-be-detected Java program; obtaining a grey box program compiled based on the abnormal interface class to be detected; obtaining a to-be-detected Java program vulnerability obtained after the browser performs a fuzzy test on the to-be-detected Java program; and operating the grey box program, so that the grey box program records the Java program vulnerability corresponding to the to-be-detected abnormal interface class in the to-be-detected Java program vulnerability, and the technical problem of relatively low vulnerability detection efficiency of the Java program in the prior art is solved.

Description

technical field [0001] The invention relates to the technical field of loophole detection, in particular to a Java exception-based loophole detection method and device. Background technique [0002] Web applications are an important form of Internet applications, and are the first choice for portal applications of key social information systems such as finance, operators, government departments, and education. With the announcement of various security incidents and security vulnerabilities with huge impact and harm, people are paying more and more attention to the security of the website application itself, and there are more and more requirements for website application security vulnerability detection. The security of web applications cannot be underestimated. With the continuous enrichment and changes of component technologies and supporting means of web applications, more and more security problems are exposed by web applications under Internet security. Hackers can ga...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577H04L63/1433
Inventor 郑国祥范渊吴卓群
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products