Automatic memory leak vulnerability mining method based on risk code area
The invention provides an automatic memory leak vulnerability mining method based on a risk code area, and relates to the technical field of vulnerability mining. The method comprises the steps of extracting control flow information of a program by utilizing a static analysis technology, constructin...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
09.04.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!