A vulnerability detection method and device based on Java exception
A vulnerability detection and vulnerability technology, which is applied in the field of vulnerability detection based on Java exceptions, can solve the problems of low efficiency of vulnerability detection and achieve the effect of improving the technical effect of vulnerability detection efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] According to an embodiment of the present invention, an embodiment of a method for detecting vulnerabilities based on Java exceptions is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0027] figure 1 It is a method for detecting vulnerabilities based on Java exceptions according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0028] Step S102, obtaining the Java program to be detected;
[0029] Step S104, determining the abnormal interface class to be detected of the Java program to be detected;
[0030] Step S106, obtaining the gray box program written based on the abnormal interface class ...
Embodiment 2
[0056] The present invention also provides a Java exception-based vulnerability detection device, which is used to implement the Java exception-based vulnerability detection method provided by the above-mentioned content of the embodiment of the present invention. The following is the Java exception-based vulnerability provided by the embodiment of the present invention A detailed description of the detection device.
[0057] Such as image 3 As shown, the device includes: a first acquisition unit 10, a determination unit 20, a second acquisition unit 30, a third acquisition unit 40 and an execution unit 50, wherein,
[0058] The first obtaining unit 10 is used to obtain the Java program to be detected;
[0059] The determining unit 20 is used to determine the abnormal interface class to be detected of the Java program to be detected;
[0060] The second obtaining unit 30 is used to obtain a gray box program written based on the abnormal interface class to be detected;
[0...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com