A vulnerability detection method based on kernel control flow graph cyclic verification
A technology of cyclic verification and control flow graph, which is applied in the computer field, can solve the problems of reduced accuracy of vulnerability detection methods, reduced graph similarity, and graph structure differences, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] Below in conjunction with accompanying drawing, the present invention will be further described.
[0043] Such as figure 1 As shown, the present invention is based on the vulnerability detection method of nuclear control flow graph circular verification, mainly comprising the following steps:
[0044] 1) Collect an n-day vulnerability from the vulnerability information publishing platform, and generate the CCFG of the n-day vulnerability. The process of collecting n-day vulnerabilities and generating the CCFG is as follows: figure 2 As shown, the specific description is as follows:
[0045] 1a) Collect an n-day vulnerability information from the vulnerability information publishing platform, including the vulnerability number, type, project name involved, and the vulnerability code segment involved, go to 1b).
[0046] 1b) Generate the control flow graph of the vulnerability according to the vulnerability code segment of the n-day vulnerability, and mark the control ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com