A vulnerability analysis method and apparatus, and a data processing method and apparatus
Embodiments of the present application provide a vulnerability analysis method and apparatus. The method includes detecting a data transfer event between variable storage locations during execution ofprogram logic to perform vulnerability analysis based on the data transfer event; acquiring a first...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
15.01.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Embodiments of the present application provide a vulnerability analysis method and apparatus. The method includes detecting a data transfer event between variable storage locations during execution ofprogram logic to perform vulnerability analysis based on the data transfer event; acquiring a first data transfer feature for identifying a continuous plurality of data transfer events; determining asecond data transfer characteristic of the first function; determining that the first data transfer feature overrides the second data transfer feature, determining that the program logic comprises the first functional function; searching for the target variable storage position where the output data of the first function is stored correspondingly in the program logic, jumping to the storage location of the target variable to continue detecting data transfer events and performing vulnerability analysis. According to an embodiment of the present application, processing resources and processingtime for detection and vuln |
---|---|
Bibliography: | Application Number: CN201710526665 |