A vulnerability analysis method and apparatus, and a data processing method and apparatus

Embodiments of the present application provide a vulnerability analysis method and apparatus. The method includes detecting a data transfer event between variable storage locations during execution ofprogram logic to perform vulnerability analysis based on the data transfer event; acquiring a first...

Full description

Saved in:
Bibliographic Details
Main Authors CHEN JINFU, CAO JIANFENG
Format Patent
LanguageChinese
English
Published 15.01.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Embodiments of the present application provide a vulnerability analysis method and apparatus. The method includes detecting a data transfer event between variable storage locations during execution ofprogram logic to perform vulnerability analysis based on the data transfer event; acquiring a first data transfer feature for identifying a continuous plurality of data transfer events; determining asecond data transfer characteristic of the first function; determining that the first data transfer feature overrides the second data transfer feature, determining that the program logic comprises the first functional function; searching for the target variable storage position where the output data of the first function is stored correspondingly in the program logic, jumping to the storage location of the target variable to continue detecting data transfer events and performing vulnerability analysis. According to an embodiment of the present application, processing resources and processingtime for detection and vuln
Bibliography:Application Number: CN201710526665