CN111625824A - IAST-based security test method and device, electronic device and storage medium - Google Patents

IAST-based security test method and device, electronic device and storage medium Download PDF

Info

Publication number
CN111625824A
CN111625824A CN202010411205.4A CN202010411205A CN111625824A CN 111625824 A CN111625824 A CN 111625824A CN 202010411205 A CN202010411205 A CN 202010411205A CN 111625824 A CN111625824 A CN 111625824A
Authority
CN
China
Prior art keywords
test
computer program
iast
safety
changed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010411205.4A
Other languages
Chinese (zh)
Inventor
潘志祥
万振华
王颉
董燕
李华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Kaiyuan Internet Security Technology Co Ltd
Original Assignee
Shenzhen Kaiyuan Internet Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Kaiyuan Internet Security Technology Co Ltd filed Critical Shenzhen Kaiyuan Internet Security Technology Co Ltd
Priority to CN202010411205.4A priority Critical patent/CN111625824A/en
Publication of CN111625824A publication Critical patent/CN111625824A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Test And Diagnosis Of Digital Computers (AREA)

Abstract

The application relates to an IAST-based security detection method, an IAST-based security detection device, an electronic device and a storage medium, wherein the method comprises the following steps: when the computer program is subjected to function test, first test flow of the function test is obtained, and when the computer program is detected to be changed, the IAST equipment is controlled to call the first test flow to perform safety test on the changed computer program. According to the safety testing method, when the functional testing personnel are detected to perform the functional testing on the computer program, the flow of the functional testing is automatically obtained and copied. And after detecting that the computer program is changed, automatically calling the functional test flow to perform safety test on the changed computer program. Therefore, program modifying personnel do not need to communicate with the safety testing personnel for many times to inform the safety testing personnel to carry out safety testing again, and the efficiency of safety testing is improved.

Description

IAST-based security test method and device, electronic device and storage medium
Technical Field
The invention belongs to the technical field of computer program safety testing, and particularly relates to an IAST-based safety testing method, device, electronic device and storage medium.
Background
Compared with Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST), the Interactive Application Security Testing (IAST) has the definite advantages of higher IAST accuracy, low false alarm rate and high detail degree of detected vulnerability information. The frequency of use thereof has also become higher in recent years.
However, when some bugs often occur in the process of testing the program by a tester, and the program needs to be modified after the program function is optimized, the modified program needs to be subjected to security testing again. At present, after each change, programmers are required to inform safety testers to carry out safety test, and the efficiency is very low.
Disclosure of Invention
The application provides an IAST-based security testing method, an IAST-based security testing device, an IAST-based security testing electronic device and a storage medium, which are used for solving the technical problem that when ISAT is adopted to perform security testing on a computer program at present, a modified computer program needs to inform security testing personnel again to perform security testing, and the efficiency is low.
The application provides a security test method based on IAST in a first aspect, and the method comprises the following steps:
when the computer program is subjected to functional test, acquiring first test flow of the functional test;
and when detecting that the computer program is changed, controlling IAST equipment to call the first test flow to perform safety test on the changed computer program.
A second aspect of the present application provides an iatt-based security testing apparatus, the apparatus comprising:
the system comprises an acquisition module, a processing module and a control module, wherein the acquisition module is used for acquiring first test flow of a functional test when the functional test is performed on a computer program;
and the test module is used for controlling IAST equipment to call the first test flow to perform safety test on the changed computer program when detecting that the computer program is changed.
A third aspect of the present application provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable by the processor, wherein the processor implements the steps in the security testing method provided in the first aspect when executing the computer program.
A fourth aspect of the present application provides a storage medium having a computer program stored thereon, where the computer program, when executed by a processor, implements the steps in the security testing method provided by the first aspect.
As can be seen from the foregoing embodiments of the present application, the IAST-based security testing method provided by the present application includes: when the computer program is subjected to function testing, first testing flow of the function testing is obtained, and when the computer program is detected to be changed, the IAST equipment is controlled to call the first testing flow to perform safety testing on the changed computer program. According to the safety testing method, when the functional testing personnel are detected to perform the functional testing on the computer program, the flow for copying one functional test is automatically obtained. And after detecting that the computer program is changed, automatically calling the functional test flow to perform safety test on the changed computer program. Therefore, the function tester does not need to communicate with the safety tester for many times to inform the safety tester to carry out safety test again, and the efficiency of the safety test is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic flowchart of an iatt-based security testing method according to an embodiment of the present application;
fig. 2 is another schematic flowchart of an iatt-based security testing method according to an embodiment of the present application;
FIG. 3 is a schematic structural diagram of an IAST-based security testing apparatus according to an embodiment of the present application;
FIG. 4 is another schematic structural diagram of an IAST-based security testing apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device.
Detailed Description
In order to make the objects, features and advantages of the present application more obvious and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As shown in fig. 1, a schematic flowchart of an iatt-based security testing method provided in an embodiment of the present application is shown, where the method includes the following steps:
step 101, when a computer program is subjected to a functional test, a first test flow of the functional test is obtained.
It will be appreciated that after the computer program code has been written, it needs to be functionally tested to verify whether the written computer program code is capable of performing the intended function. In addition, in the internet era, the security problem of computer programs is becoming more and more prominent, and it is very important to the security test of computer programs. In the embodiment of the application, when it is detected that a function tester performs a function test on a computer program, the test flow adopted when the function test is performed on the computer program is actively obtained. The flow rate of the functional test is herein denoted as the first test flow rate. It is understood that the computer programs are all executed in the background, and when the function test is performed, the computer programs in the background need to be called, and then the request data needs to be called. The first test traffic may contain the call request data. After the first test flow is acquired, one copy can be copied and stored for subsequent calling.
And step 102, when detecting that the computer program is changed, controlling the IAST equipment to call the first test flow to perform safety test on the changed computer program.
Generally, after the IAST device is deployed, when a function tester performs a function test, a request flow of the function test triggers the IAST device to perform a safety test. In both the functional test and the security test, there are cases where the test fails, for example, the function of the computer program does not reach the intended function in the functional test, or a bug is detected in the program in the security test. At this point, a programmer is required to modify the computer program code to address the above-mentioned problems. In addition, when the version of the computer program is upgraded and the function needs to be optimized, the programmer is also required to modify the computer program. After the modification, in order to avoid the security vulnerability of the modified computer program, the IAST device is required to perform security detection on the modified computer program again. In this embodiment of the present application, after detecting that the computer program is modified, the IAST device is automatically controlled to call the first test traffic obtained in step 101, and the modified computer program is subjected to security testing again by using the first test traffic.
According to the above description, the IAST-based security testing method provided by the present application includes: when the computer program is subjected to functional test, acquiring first test flow of the functional test; and when detecting that the computer program is changed, controlling the IAST equipment to call the first test flow to perform safety test on the changed computer program. According to the safety testing method, when a function tester performs a function test on a computer program, a first testing flow used by the function test is automatically obtained. And when detecting that the computer program is changed, controlling the IAST equipment to call the acquired first test flow to perform safety test on the changed computer program. Therefore, after the computer program is changed, the IAST equipment can automatically call the first test flow to perform safety detection on the changed computer program again, program modification personnel do not need to communicate with safety testing personnel frequently, and the safety testing efficiency is improved.
Further, as shown in fig. 2, another schematic flow chart of the IAST-based security testing method provided in the embodiment of the present application is shown, where the method includes:
step 201, when a computer program is subjected to a function test, acquiring a first test flow of the function test;
it is understood that, in the embodiment of the present application, the content of step 201 is the same as that described in step 101 in the embodiment provided in fig. 1, and is not described herein again.
And step 202, performing anti-replay evasion treatment on the first test flow to obtain a second test flow.
In a part of computer programs with higher security requirements, a replay prevention mechanism is set for preventing a malicious attacker from tampering the traffic content so as to carry out replay attack. The anti-replay mechanism may prevent the first test traffic obtained in step 201 from being recalled, or prevent the computer program from performing related operations when the same traffic is recalled. Therefore, in the embodiment of the application, before the first test traffic is called, the first test traffic is subjected to anti-replay circumvention processing so as to circumvent an anti-replay mechanism in the computer program. And after the first test flow is subjected to anti-replay evasion treatment, a second test flow is obtained. And saving the second test flow for calling.
And step 203, when detecting that the computer program is changed, controlling the IAST device to call the second test flow to perform safety test on the changed computer program.
Since the second test traffic is the test traffic that has been subjected to the replay-prevention avoidance processing in step 202, the call process is not blocked by the replay-prevention mechanism of the computer program when the iatt device calls the second test traffic, and the iatt device can smoothly call the second test traffic to perform the security test on the computer program.
Further, the performing playback-prevention avoidance processing on the first test traffic to obtain a second test traffic includes:
determining data of the first test flow needing to be changed;
and changing the data needing to be changed in the first test flow to obtain a second test flow.
Further, determining data that the first test flow needs to be changed includes:
determining an anti-replay mechanism of the IAST device;
and determining the data of the first test flow needing to be changed according to the anti-replay mechanism.
In the embodiment of the application, the method for preventing replay evasion can be to change partial data in the first test data. The first test flow is composed of flow messages containing character strings, and the character strings comprise a request head and a request body. Firstly splitting a request head and a request body of a character string into the request head and the request body, then determining whether a parameter needing to be changed is in the request head or the request body, if the parameter needs to be changed in the request head, changing the parameter in the request head, and if the parameter needs to be changed in the request body, changing the parameter in the request body. Specifically, how to determine the data to be modified may be to analyze the computer program in advance, determine the anti-replay mechanism of the computer program, and determine the data to be modified according to the anti-replay mechanism of the computer program. The data that needs to be changed may be, but is not limited to, session identity data, token value to prevent replay, etc. The change of the data can be reset by a security tester on an IAST device setting page, or the change can be automatically recognized by the testing device.
Further, the controlling the iatt device calls the first test traffic to perform the security test on the modified computer program, including:
sending the first test flow to a safety test module of the IAST equipment;
and receiving a test result returned by the safety test module of the IAST equipment.
In the embodiment of the application, when the change of the computer program is detected, the acquired first flow of the functional test is sent to the safety test module of the IAST device. And the safety testing module of the IAST makes a re-calling request for the changed computer program according to the first testing flow so as to perform a re-safety test on the changed computer program. And the security test module of the IAST returns the tested results such as the detected loophole information, loophole positions and the like to the test control device.
Further, the test method further comprises:
and controlling the IAST equipment to perform safety test on the computer program in response to a test instruction for performing functional test on the computer program.
In the embodiment of the present application, the test of the computer program by the iatt device is not limited to obtaining and copying the test traffic of the functional test, and calling the computer program according to the test traffic of the functional test to perform the security test. The IAST device can also adopt an instrumentation mode to carry out safety detection on the computer program.
A second aspect of the embodiment of the present application provides an iatt-based safety testing apparatus, as shown in fig. 3, which is a schematic structural diagram of the iatt-based safety testing apparatus provided in the embodiment of the present application, and the apparatus includes:
an obtaining module 301, configured to obtain a first test flow of a functional test when the computer program performs the functional test;
the testing module 302 is configured to, when it is detected that the computer program is changed, control the iatt device to call the first testing traffic to perform a security test on the changed computer program.
In the embodiment of the present application, it can be understood that the functions of the modules of the IAST-based security testing apparatus provided in the embodiment of the present application are the same as the functions of the steps provided in the embodiment of fig. 1, and are not described again here. In addition, the IAST-based safety test device provided by the present application may further include: and the monitoring module is used for monitoring the state of the computer program, including but not limited to monitoring whether the computer program performs a function test or not and monitoring whether the computer program is changed or not. The detection module also sends the detection result to the acquisition module 301 and the test module 302.
Further, as shown in fig. 4, another schematic structural diagram of an iatt-based safety testing apparatus provided in an embodiment of the present application is provided, where the apparatus includes:
an obtaining module 401, configured to obtain a first test flow of a functional test when the computer program performs the functional test;
a replay-prevention avoidance module 402, configured to perform replay-prevention avoidance processing on the first test traffic to obtain a second test traffic;
and the testing module 403 is configured to, when it is detected that the computer program is changed, control the iatt device to call the second test traffic to perform a security test on the changed computer program.
In the embodiment of the present application, it can be understood that the functions of the modules of the IAST-based safety testing apparatus provided in the embodiment of the present application are consistent with the contents of the steps in the IAST-based safety testing method provided in the embodiment of fig. 2, and are not described herein again.
It can be understood that, the IAST-based safety test device provided in the embodiment of the present application may be a safety test device that is independent from and used in cooperation with an IAST apparatus; the device may be a device that is integrated with or provided inside the iatt device as a safety test control module of the iatt. Therefore, the IAST equipment has the functions of acquiring flow, preventing replay and avoiding and testing safety, and the IAST equipment has the functions which correspond to the corresponding modules respectively. The IAST device can automatically call the test flow after the anti-replay evasion treatment to perform safety detection on the changed computer program after the computer program is changed, so that the safety detection efficiency of the computer program is improved.
A third aspect of the present application provides an electronic device, which can be used to implement the IAST-based security testing method in the foregoing embodiments. As shown in fig. 5, a schematic structural diagram of an electronic device is shown, the electronic device mainly includes:
a memory 501, a processor 502, a bus 503, and computer programs stored on the memory 501 and executable on the processor 502, the memory 501 and the processor 502 being connected by the bus 503. The processor 502, when executing the computer program, implements the IAST-based security testing method in the foregoing embodiments. Wherein the number of processors may be one or more.
The Memory 501 may be a high-speed Random Access Memory (RAM) Memory or a non-volatile Memory (non-volatile Memory), such as a disk Memory. The memory 501 is used for storing executable program code, and the processor 502 is coupled to the memory 501.
A fourth aspect of the present application provides a storage medium, which may be a memory. The storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the IAST-based security testing method provided by the first aspect. Further, the computer-readable storage medium may be various media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a RAM, a magnetic disk, or an optical disk.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a readable storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned readable storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present application is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the above description of the IAST-based security testing method, apparatus, electronic apparatus and storage medium provided in the present application, for those skilled in the art, there may be variations in the specific implementation and application scope according to the ideas of the embodiments of the present application, and in summary, the content of the present specification should not be construed as limiting the present application.

Claims (10)

1. An IAST-based security testing method, the method comprising:
when the computer program is subjected to functional test, acquiring first test flow of the functional test;
and when detecting that the computer program is changed, controlling IAST equipment to call the first test flow to perform safety test on the changed computer program.
2. The safety test method according to claim 1, wherein after the obtaining the first test traffic of the functional test and before the controlling IAST device calls the first test traffic to perform the safety test on the changed computer program when the change of the computer program is detected, the method further comprises:
carrying out anti-replay evasion treatment on the first test flow to obtain a second test flow;
the invoking the first test traffic to perform security test on the modified computer program includes:
and calling the second test flow to carry out safety test on the changed computer program.
3. The safety testing method according to claim 2, wherein the performing the anti-replay evasion processing on the first test traffic to obtain a second test traffic comprises:
determining data that the first test flow needs to be changed;
and changing the data needing to be changed in the first test flow to obtain a second test flow.
4. The security test method of claim 3, wherein the determining the data that the first test traffic needs to be changed comprises:
determining an anti-replay mechanism of the computer program;
determining data that the first test traffic needs to be altered according to the anti-replay mechanism.
5. The safety test method according to claim 1, wherein the controlling IAST device calls the first test traffic to perform safety test on the modified computer program, and the safety test method comprises:
sending the first test flow to a safety test module of the IAST equipment;
and receiving a test result returned by the safety test module of the IAST equipment.
6. The security test method of claim 1, further comprising:
and responding to a test instruction for performing functional test on the computer program, and controlling the IAST equipment to perform safety test on the computer program.
7. An IAST-based security testing apparatus, comprising:
the system comprises an acquisition module, a processing module and a control module, wherein the acquisition module is used for acquiring a first test flow of a functional test when the functional test is performed on a computer program;
and the test module is used for controlling IAST equipment to call the first test flow to perform safety test on the changed computer program when detecting that the computer program is changed.
8. The safety testing device of claim 7, wherein the device further comprises:
the replay-preventing and avoiding module is used for carrying out replay-preventing and avoiding treatment on the first test flow to obtain a second test flow;
the test module is configured to, when detecting that the computer program is changed, control the iatt device to call the second test traffic to perform a security test on the changed computer program.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable by the processor, wherein the processor implements the steps of the method of any one of claims 1 to 6 when executing the computer program.
10. A storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, performs the steps of any one of the methods of claims 1-6.
CN202010411205.4A 2020-05-15 2020-05-15 IAST-based security test method and device, electronic device and storage medium Pending CN111625824A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010411205.4A CN111625824A (en) 2020-05-15 2020-05-15 IAST-based security test method and device, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010411205.4A CN111625824A (en) 2020-05-15 2020-05-15 IAST-based security test method and device, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN111625824A true CN111625824A (en) 2020-09-04

Family

ID=72271868

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010411205.4A Pending CN111625824A (en) 2020-05-15 2020-05-15 IAST-based security test method and device, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN111625824A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765682A (en) * 2015-03-30 2015-07-08 微梦创科网络科技(中国)有限公司 Offline detection method and system for cross-site scripting vulnerability
US20180330102A1 (en) * 2017-05-10 2018-11-15 Checkmarx Ltd. Using the Same Query Language for Static and Dynamic Application Security Testing Tools
CN110225031A (en) * 2019-06-06 2019-09-10 深圳开源互联网安全技术有限公司 Dynamic rights leak detection method, system, device and readable storage medium storing program for executing
US10467419B1 (en) * 2018-10-31 2019-11-05 Capital One Services, Llc Methods and systems for determining software risk scores
CN110489293A (en) * 2019-08-23 2019-11-22 四川长虹电器股份有限公司 A kind of interface security automation system for testing
US10565093B1 (en) * 2018-10-09 2020-02-18 International Business Machines Corporation Providing cognitive intelligence across continuous delivery pipeline data
CN111045915A (en) * 2018-10-12 2020-04-21 北京京东尚科信息技术有限公司 Safety test method and device based on product function test case

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765682A (en) * 2015-03-30 2015-07-08 微梦创科网络科技(中国)有限公司 Offline detection method and system for cross-site scripting vulnerability
US20180330102A1 (en) * 2017-05-10 2018-11-15 Checkmarx Ltd. Using the Same Query Language for Static and Dynamic Application Security Testing Tools
US10565093B1 (en) * 2018-10-09 2020-02-18 International Business Machines Corporation Providing cognitive intelligence across continuous delivery pipeline data
CN111045915A (en) * 2018-10-12 2020-04-21 北京京东尚科信息技术有限公司 Safety test method and device based on product function test case
US10467419B1 (en) * 2018-10-31 2019-11-05 Capital One Services, Llc Methods and systems for determining software risk scores
CN110225031A (en) * 2019-06-06 2019-09-10 深圳开源互联网安全技术有限公司 Dynamic rights leak detection method, system, device and readable storage medium storing program for executing
CN110489293A (en) * 2019-08-23 2019-11-22 四川长虹电器股份有限公司 A kind of interface security automation system for testing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
BLOGCCCC: ""安全测试流程"", 《HTTPS://WWW.CNBLOGS.COM/BLOGST/P/9241952.HTML》 *
默安科技: ""一文洞悉DAST、SAST、IAST——Web应用安全测试技术对比浅谈"", 《HTTPS://WWW.AQNIU.COM/LEARN/46910.HTML》 *

Similar Documents

Publication Publication Date Title
EP2426618B1 (en) Information device, program, method for preventing execution of unauthorized program code, and computer readable recording medium
EP2891104B1 (en) Detecting a malware process
US11888885B1 (en) Automated security analysis of software libraries
CN109558207B (en) System and method for forming log for anti-virus scanning of file in virtual machine
US10339305B2 (en) Sub-execution environment controller
CN111191243A (en) Vulnerability detection method and device and storage medium
US11055416B2 (en) Detecting vulnerabilities in applications during execution
CN108470126B (en) Data processing method, device and storage medium
CN111124921A (en) Memory out-of-range detection method, device, equipment and storage medium
CN111177727A (en) Vulnerability detection method and device
CN112231198B (en) Malicious process debugging method and device, electronic equipment and medium
US10275595B2 (en) System and method for characterizing malware
CN107315677B (en) Method and device for judging abnormity of application program
CN111625824A (en) IAST-based security test method and device, electronic device and storage medium
CN116361793A (en) Code detection method, device, electronic equipment and storage medium
CN112685744B (en) Method and device for detecting software bugs by using stack-related registers
CN114610577A (en) Target resource locking method, device, equipment and medium
CN109388948B (en) Virtualization technology-based potential malware analysis method and related device
KR20210076455A (en) Method and apparatus for automated verifying of xss attack
CN111104271A (en) Stability testing method, device and equipment for in-band firmware updating process
CN110990277A (en) Vulnerability mining method and device and computer readable storage medium
CN117131515B (en) Application request execution method and device, computer equipment and storage medium
CN110750782B (en) Program exiting method and related equipment
CN112948241B (en) Anti-debugging method and device for application program, electronic equipment and storage medium
CN116244195B (en) PHP ras module hook stability test method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200904

RJ01 Rejection of invention patent application after publication