Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Program bug testing method and related device

A testing method and program technology, applied in the computer field, can solve problems such as time-consuming, inability to meet vulnerability detection, affecting the efficiency of program vulnerability detection, etc., and achieve the effect of improving efficiency and reducing repetitive code writing.

Active Publication Date: 2020-05-19
TENCENT CLOUD COMPUTING BEIJING CO LTD
View PDF15 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]However, the above process is only for a single application program, because in the process of detecting a large number of programs, different programs may use different encryption methods and protocol structures, manually one by one The method of reverse analysis cannot meet the vulnerability detection of various applications, and it is time-consuming, which affects the efficiency of program vulnerability detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program bug testing method and related device
  • Program bug testing method and related device
  • Program bug testing method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The embodiment of the present application provides a vulnerability testing method and a related device, which can be applied to the running process of a vulnerability detection system or a game vulnerability detection program, by determining the target plug-in that satisfies the preset condition, and the preset condition is based on the target determining the matching information between the plug-in and the program to be tested; then injecting the target plug-in into the program to be tested to obtain a communication data packet of the program to be tested; and describing the communication data packet according to preset rules, to obtain attack data for the program to be tested; and then automatically attack the program to be tested according to the attack data, so as to test and obtain the program vulnerability of the program to be tested. In this way, the auxiliary analysis and automatic attack of programs using complex encrypted communication protocols can be realized...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a program bug test method and a related device. The method comprises the steps of determining a target plug-in meeting a preset condition; injecting the target plug-in into theto-be-tested program to obtain a communication data packet of the to-be-tested program; describing the communication data packet according to a preset rule to obtain attack data for the to-be-testedprogram; and automatically attacking the to-be-tested program according to the attack data so as to obtain a program bug of the to-be-tested program through testing. Therefore, auxiliary analysis andautomatic attack on a program using a complex encryption communication protocol are realized, a large amount of repeated code writing can be reduced according to a framework of a preset rule, and theprogram vulnerability test efficiency is greatly improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method for testing program loopholes and related devices. Background technique [0002] With the development of Internet technology, people pay more and more attention to network security, and the detection of program loopholes is particularly important in the process of program development. [0003] General vulnerability detection is mainly based on dynamic debugging, that is, through reverse analysis to find the encrypted and decrypted code of the communication protocol, and by hooking up the debugger or plug-in injection, the data before the protocol is sent encrypted and after receiving the decrypted data is obtained in real time. The way of error correction information is output to tools such as DebugView and analyzed manually. [0004] However, the above-mentioned process is only for a single application program. Since different programs may use different enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 喻峰董志强宋兵
Owner TENCENT CLOUD COMPUTING BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products