Automatic memory leak vulnerability mining method based on risk code area

The invention provides an automatic memory leak vulnerability mining method based on a risk code area, and relates to the technical field of vulnerability mining. The method comprises the steps of extracting control flow information of a program by utilizing a static analysis technology, constructin...

Full description

Saved in:
Bibliographic Details
Main Authors XIE CHEN, JIA PENG, LIU JIAYONG, KUANG HONGBO
Format Patent
LanguageChinese
English
Published 09.04.2024
Subjects
Online AccessGet full text

Cover

Loading…