CN101901183B - Method and device of test case for filtering - Google Patents
Method and device of test case for filtering Download PDFInfo
- Publication number
- CN101901183B CN101901183B CN200910143823A CN200910143823A CN101901183B CN 101901183 B CN101901183 B CN 101901183B CN 200910143823 A CN200910143823 A CN 200910143823A CN 200910143823 A CN200910143823 A CN 200910143823A CN 101901183 B CN101901183 B CN 101901183B
- Authority
- CN
- China
- Prior art keywords
- test case
- component
- security feature
- special character
- time response
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a method of a test case for filtering. The method comprises: firstly, determining the security features of each test case; according to the determined security features of each test case, filtering the test case; and only reserving one test case with the same security features. The invention also discloses a device of a test case for filtering. The invention can greatly improve the efficiency of fuzz testing.
Description
Technical field
The present invention relates to the software security technical field of measurement and test, particularly a kind of method of test case for filtering and device.
Background technology
The security test of software (comprising: application program, agreement etc.) is actually a kind of detection in the software input space.The input space of software is by all possible input of this software or constituting of all possible input.Exhaustive is the most extreme a kind of method of verifying software behavior correctness, yet exhaustive do not possess operability concerning most of case, because generally, the input space of software program is very huge, even possibly be infinitely great.Than exhaustive method, fuzz testing (Fuzz Testing) is a kind of more feasible Black-box Testing method as a kind of random sample method.
Fuzz testing is a kind of software testing technology, this technical construction some at random or semirandom data (being called fuzz) as the input of tested software program, and observe the working condition of tested software program.As a kind of Black-box Testing instrument, fuzz testing is generally used for the large-scale software development project.Fuzz testing is believed to improve the security of software, this be because: fuzz testing always can detect the not detectable defective of some testers, and these defectives tend to ignored by the software engineer.
At present; The most frequently used fuzz testing is based on character; Fuzz testing based on character provides random data stream (from file or other data stream, to provide; For example: from socket, provide), just be widely used in the security test of the agreement or the webserver based on the fuzz testing of character as the input of tested software program.
The advantage of fuzz testing is: the cost of testing is relatively low and can realize automatically fully; And fuzz testing often can be found out the defective (bug) that comparison is serious and can be utilized, but these bug victims are used.
In essence, fuzz testing is that a large amount of test case that is employed in stochastic distribution in the input space of tested software program is tested.The test case of participating in test is many more, and test is just thorough more.But, adopt the substantive test use-case that the tested software program is tested and will be expended the long period; And,, cause existing fuzz testing relatively to be lost time and inefficiency because the existence of test case close or of equal value makes that most of security breaches of being found out are repetitions in a large number.
Summary of the invention
In view of this, fundamental purpose of the present invention is to provide a kind of method of test case for filtering, to improve the efficient of fuzz testing.
Another object of the present invention is to provide a kind of device of test case for filtering, to improve the efficient of fuzz testing.
For achieving the above object, the invention provides a kind of method of test case for filtering, this method comprises:
Confirm the security feature of each test case; Wherein, the security feature of said test case adopts the security feature vector representation, and said security feature vector comprises: length characteristic component and content character component further comprise in the said content character component: time response component and special character component; Confirm the length characteristic component of each test case according to the length of each test case; Confirm the time response component of each test case according to periodicity, repeatability or the statistical property of the content of each test case, the special character that is comprised in the content according to each test case is confirmed the special character component of each test case;
Security feature according to said definite each test case filters test case, and the test case that security feature is identical only keeps one.
Preferably, said length according to each test case confirms that the length characteristic component of each test case can be the value of the length characteristic component that the bit number or the byte number of test case are confirmed as said test case.
Preferably; Periodicity, repeatability or the statistical property of said content according to each test case confirm each test case the time response component can for: with test case as discrete series; Calculate the frequency characteristic of said discrete series, said frequency characteristic is confirmed as the value of the time response component of said test case; Or the time response that special character repeats to occur in the statistical test use-case, said time response is confirmed as the value of the time response component of said test case.
Preferably, the special character that is comprised in the said content according to each test case confirms that the special character component of each test case can be the value of the special character that is comprised in the test case and corresponding substring being confirmed as the special character component of said test case.
Preferably; Judge that whether identical the security feature of two test cases mode can whether the value of length characteristic component equates, the value of time response component equates and the value of special character component equates for: the security feature vector of judging said two test cases; If judge that then the security feature of said two test cases is identical.
The present invention also provides a kind of device of test case for filtering, and this device comprises:
Security feature computing module 210 is used for confirming the security feature of each test case; Wherein, the security feature of said test case adopts the security feature vector representation, and said security feature vector comprises: length characteristic component and content character component further comprise in the said content character component: time response component and special character component; Confirm the length characteristic component of each test case according to the length of each test case; Confirm the time response component of each test case according to periodicity, repeatability or the statistical property of the content of each test case, the special character that is comprised in the content according to each test case is confirmed the special character component of each test case;
Preferably, may further include in the said security feature computing module 210: length property calculation submodule 211 and content character calculating sub module 212;
Said length property calculation submodule 211 can be used for confirming according to the length of each test case the length characteristic component of each test case;
May further include in the said content character calculating sub module 212: time response computing unit 213 and special character computing unit 214;
Said time response computing unit 213 can be used for confirming according to periodicity, repeatability or the statistical property of the content of each test case the time response component of each test case;
Said special character computing unit 214 can be used for confirming according to the special character that content comprised of each test case the special character component of each test case.
Preferably, said length property calculation submodule 211, the value of the length characteristic component that can be used for the bit number or the byte number of test case are confirmed as said test case.
Preferably, said time response computing unit 213 can be used for test case calculating the frequency characteristic of said discrete series as discrete series, said frequency characteristic is confirmed as the value of the time response component of said test case; Or be used for the time response that statistical test use-case special character repeats to occur, said time response is confirmed as the value of the time response component of said test case.
Preferably, said special character computing unit 214, special character that can be used for test case is comprised and corresponding substring are confirmed as the value of the special character component of said test case.
Preferably; Said filtering module 220; Can be in test case is compared in twos; When the value of the value of the value of the length characteristic component of the security feature of two test cases vector, time response component and special character component all equates, judge that the security feature of said two test cases is identical.
Visible by technique scheme; The present invention is through calculating the security feature of each test case; And according to the security feature of each test case test case is filtered, the test case that security feature is identical only keeps one, thereby has avoided a large amount of close or test cases of equal value are tested; Practice thrift the time of testing, improved the efficient of fuzz testing greatly.
Description of drawings
To make clearer above-mentioned and other feature and advantage of the present invention of those of ordinary skill in the art through describe exemplary embodiment of the present invention in detail with reference to accompanying drawing below, in the accompanying drawing:
Fig. 1 is the schematic flow sheet of the method for test case for filtering of the present invention;
Fig. 2 is the composition structural representation of the device of test case for filtering of the present invention.
Embodiment
For making the object of the invention, technical scheme and advantage clearer, below with reference to the accompanying drawing embodiment that develops simultaneously, to further explain of the present invention.
Difference between the test case of participating in testing is big more, and the security breaches that can find out are many more, and therefore, the similarity of how assessing between the test case becomes the key that improves fuzz testing efficient.
Main thought of the present invention is: propose the notion of security feature, through the security feature of calculating test case, and in view of the above test case is divided into the different security equivalence class; Because it is of equal value belonging to the test case of same safe equivalence class; Therefore; When carrying out fuzz testing, from each safe equivalence class, only select a test case to test; Thereby avoided each test case in each safe equivalence class is tested, reached the purpose that improves fuzz testing efficient greatly.
Fig. 1 is the schematic flow sheet of the method for test case for filtering of the present invention.Referring to Fig. 1, this method comprises:
Step 101: the security feature of confirming each test case.
Here, at first need define the security feature of test case, this security feature can be used for test case is divided into the different security equivalence class.The test case that belongs to same safe equivalence class is tested the measured target system, will cause identical result, and therefore, whether a certain test case belongs to a certain safe equivalence class and depend on how security feature defines and calculate.
Although fuzz testing is a kind of black box safety test; It not the ghost of a chance gets access to design documentation or the execute file (source code) of tested software program to be used for safety test; But, really still very useful when which security feature of decision need be included in the assorting process of safe equivalence class about knowledge how to excavate security breaches.
At present, mainly contain following four types of security breaches attack methods, these security breaches are attacked the safety that possibly jeopardize system from different approach:
1, buffer overflow attack: this is to attempt a kind of abnormal conditions of when exceeding the area stores data on fixed length buffer memory border, taking place when certain process, and consequently extra data cover the data in the contiguous region of memory.The data that are capped possibly be data, variable or the program flow data in other buffer memory, and therefore, this covers possibility initiator abnormal behavior, internal memory denied access, program termination (collapse) or erroneous results etc.If especially this covering is implemented by malicious user malice, possibly destroy the security of system.The input that is used to carry out the input of malicious code or make software program unconsciously carry out that specially is provided with all can cause buffer zone and overflow.Therefore, buffer zone overflows and causes many software vulnerabilities, and becomes the basis of many leak abuse instruments.
2, code injection attacks: it is a kind of detection to computing machine bug, and this causes by handling invalid data.But code injection attacks victim is in order to introducing in software program (or injection) code, thereby the implementation of change software program.The possibility of result of code injection attacks is very serious, and for example: the code injection attacks once was used for transmitted virus by some computer worms, and the SQL injection attacks is that another kind of notorious code injects, and its target of attack is a database.
3, the format character string is attacked: the format character string is attacked and can be caused the software program collapse or carry out harmful code.In some C function of carrying out format manipulation, for example: in printf () function, user's input of filtering can be caused the format character string as the format string argument attack.Malicious user possibly utilize %s and %x format mark, print data from other position of storehouse or internal memory.Malicious user also possibly adopt %n format mark to write data arbitrarily to position arbitrarily, so just can utilize function that printf () function or other possess similar functions that the format byte of some is write certain address in the storehouse.
4, privilege upgrading attack: it is bug or the design mistake of utilizing in the software program that the privilege upgrading is attacked, and obtains being protected, do not allow the access rights of the resource of common applications or user capture.The higher franchise implementation and operation of software program consequently to be intended to give than software program development personnel or system manager.In some cases, the every input that offers it of highly privileged software program supposition all is the input that meets its interface standard, and its input is not verified.At this moment, the assailant just possibly survey whether there is this defective, makes uncommitted code utilize the Run Elevated of this software program.
In-depth analysis based on to above-mentioned four kinds of security breaches mechanism can be divided into two groups with these security breaches of four types, and these two groups two kinds of different characteristic with the input of software program are relevant respectively.
1) security breaches relevant with length, for example: the buffer area flooding.
2) security breaches relevant with content comprise: code injection attacks, format character string are attacked and the privilege upgrading is attacked.
Based on above-mentioned classification, the security feature vector V of the present invention's introducing shown in (1) formula representes the security feature of test case.This security feature vector V is used to characterize and calculate the length and the content character of the input data (that is: test case) of measured target system.
V=(L,C) (1)
(1) in the formula, L representes the length characteristic component of test case.When concrete calculating, can confirm the value of this length characteristic component according to the length of test case, for example: with the bit number of test case or byte number value as the length characteristic component of this test case.
C representes the content character component of test case.Different with length characteristic component is that the content character component statement of test case gets up very complicated.The present inventor is through analyzing and the relevant security breaches of content character of importing data; For example: code injection attacks, format character string are attacked and franchise upgrading is attacked, and find: the general character of these attacks is that they all comprise special character (that is: the character except that letter and numeral).For example: input string " cat/etc/password " once was used as input in the code injection attacks, in order to obtain the user profile in the systems such as Unix, Linux.Here, the input of injection comprises special character '/'.For other the security breaches relevant with content, the input data that are used to attack possibly comprise other special character, for example: and ' % ', ' ' etc.Reason is: nearly all system all gives certain semanteme to some special character, in order to trigger certain operations, therefore, injects input through these special characters and is easier to the security breaches of finding out and utilize goal systems potential.
In addition; Adopt at random method, can regard the time series of forming by character as based on the test case that method produces of predefine or type; So, reflect that the time response of periodicity, repeatability or the statistical property of these test cases also can be used to describe its content character.Here, time response can be: frequency, auto-correlation parameter etc.
Based on above-mentioned analysis, the present invention is expressed as 2 tuples shown in (2) formula with the content character parameters C:
C=(f,s) (2)
(2) in the formula, f representes the time response component of the content of test case.Its computing method can be: regard test case as a discrete series that is made up of character; And adopt DFT (DFT:Discrete Fourier Transform) to calculate its frequency characteristic, with the value of this frequency characteristic as the time response component; Perhaps add up the time response that special character repeats to occur, for example: special character '/' how many times occurred, has occurred how long waiting, and this time response is confirmed as the value of the time response component of this test case.If the f of two test cases equates that so, their time response component is identical.
S is the special character component, is used for describing test case which comprises/which special character and corresponding substring.If the s of two test cases equates (it is identical to comprise identical special character and/or corresponding each other substring), so, their s characteristic is identical.
Step 102: the security feature according to determined each test case filters test case, and the test case that security feature is identical only keeps one.
Through step 101, the security feature of each test case is able to confirm, if the security feature of two test cases is identical; Show that these two test cases are test cases of equal value; Select one and carry out fuzz testing and get final product, therefore, in this step; To test case be filtered according to the security feature of each test case, only keep one for the identical test case of security feature.When concrete the realization, can carry out according to following steps:
The 1st step: effective test set S is set; This Validity Test collection S is used to store all the treated test cases test case of different safe equivalence classes (that is: belong to); And the security feature of these test cases vector, under the original state, Validity Test collection S is empty.
The 2nd step:, the vectorial V ' of security feature of each test case among the security feature of this test case vector V and the Validity Test collection S is compared for each test case T:
If there is V '=V; That is: the value of the value of the value of length characteristic component L, time response component f and special character component s all equates; So; The corresponding test case T of expression V belongs to identical safe equivalence class with the corresponding test case T ' of V ', and for example: they are equivalent for the security breaches of detection of a target system.Because T ' has been among the Validity Test collection S, so, T is redundant for fuzz testing, should get rid of.
If there is not V '=V, so, expression test case T belongs to a new safe equivalence class, needs this test case T is added Validity Test collection S.
Accomplished a safe equivalence class classification processing after carrying out aforesaid operations; At this moment; Each test case among the Validity Test collection S belongs to the different security equivalence class respectively, has in the same safe equivalence class of identical security feature only to select a test case, and those redundant or test cases of equal value are filtered; Therefore, Validity Test collection S can be used for carrying out effective fuzz testing.
So far, finish the method for test case for filtering of the present invention.
The present invention proposes a kind of method of test case for filtering; This method is through calculating the security feature of test case; And eliminating redundancy in view of the above or test case of equal value; Thereby guaranteed only to have in each safe equivalence class a test case to be used to carry out fuzz testing, and avoided adopting a plurality of test cases in the identical safe equivalence class to test, thereby improved the efficient of fuzz testing greatly.
Corresponding to the method for above-mentioned test case for filtering, the invention allows for a kind of device of test case for filtering, as shown in Figure 2.The device of the test case for filtering among Fig. 2 comprises:
Security feature computing module 210 is used for confirming the security feature of each test case;
Preferably, the security feature of test case can adopt the security feature vector representation, and this security feature vector comprises: length characteristic component and content character component; At this moment, further comprise in the security feature computing module 210 in the device shown in Figure 2: length property calculation submodule 211 and content character calculating sub module 212; Wherein:
Length property calculation submodule 211 is used for confirming according to the length of each test case the length characteristic component of each test case;
Content character calculating sub module 212 is used for confirming according to the content of each test case the content character component of each test case.
Preferably, may further include in the content character component of security feature vector: time response component and special character component; At this moment, may further include in the content character calculating sub module 212 in the device shown in Figure 2: time response computing unit 213 and special character computing unit 214; Wherein:
Time response computing unit 213 is used for confirming according to periodicity, repeatability or the statistical property of the content of each test case the time response component of each test case;
Special character computing unit 214 is used for confirming according to the special character that content comprised of each test case the special character component of each test case.
Preferably, the length property calculation submodule 211 in the device shown in Figure 2, the value of the length characteristic component that is used for the bit number or the byte number of test case are confirmed as this test case.
Preferably, the time response computing unit 213 in the device shown in Figure 2 is used for test case calculating the frequency characteristic of this discrete series as discrete series, this frequency characteristic is confirmed as the value of the time response component of this test case; Or be used for the time response that statistical test use-case special character repeats to occur, this time response is confirmed as the value of the time response component of this test case.
Preferably, the special character computing unit 214 in the device shown in Figure 2, special character that is used for test case is comprised and corresponding substring are confirmed as the value of the special character component of this test case.
Preferably; Filtering module 220 in the device shown in Figure 2; Be used for test case is compared in twos; When the value of the value of the value of the length characteristic component of the security feature of two test cases vector, time response component and special character component all equates, judge that the security feature of these two test cases is identical.
Below through a specific embodiment the present invention is elaborated:
Test case with character string type in the present embodiment is an example, introduces the method for test case for filtering of the present invention in detail.Frequency is taken as the time response component of test case.The method of test case for filtering is carried out according to following steps in the present embodiment:
The 1st step: use a list storage Validity Test collection S, comprise in this tabulation: the security feature vector that belongs to test case and these test cases of different safe equivalence classes.Under the original state, Validity Test collection S is empty.
The 2nd step: in fuzz testing, with adopting at random method, producing the substantive test use-case based on predefined method or based on the method for type.For each test case T, present embodiment will calculate its security feature vector V according to (a)~(d) as follows:
(a) confirm the length of test case T according to the number of characters that comprises in the test case, with this length as the length characteristic component L among the security feature vector V of this test case.
(b) in the time response of frequency-domain calculations test case.Present embodiment is an example with the frequency domain, in practical application, also can adopt characteristic At All Other Times, perhaps the time domain specification of special character.
T is expressed as:
T=T[0]T[1]…T[l]…T[L-1]
Wherein: l character among T [l] the expression test case T, 0≤l≤L-1.
Utilize the frequency domain characteristic of DFT calculating character sequence T then, shown in (3) formula:
After carrying out frequency domain transform calculating, the f [k] that comprises the frequency domain characteristic of test case T is exactly the time response component f of the content character component C of test case T.
Because the equal in length of f and T possibly need a large amount of storage spaces to store the f of all test cases among effective test set S.In order to save storage space, can adopt the method for compression or sampling to handle.Below takeing two examples describes:
First example:
At first every m f [k] is added up, shown in (4) formula:
(4) in the formula, and n=[L/m ", m is the value that is provided with by the user according to the needs of practical application.
Make f '=f ' [j] (5)
F ' is preserved as the time parameter f of test case T.
Second example:
The HFS that only adopts f is as sample, shown in (6) formula:
f’=f[m],f[m+1],…,f[L-1] (6)
Likewise, the m in (6) formula also is that needs according to practical application are provided with by the user.
(c) calculate the content character component s relevant with special character.According to frequency characteristic f, can obtain and in T, repeat the substring that occurs, be s with the location records of special character in this substring.Another kind method is the special character that exists among the direct use test use-case T, and the position that it occurs is as s.
(d) through calculating L, f, s, confirm current test case T security feature vector V=(L, C) and C=(f, s).Then each the test case characteristic of correspondence vector V ' among V and the Validity Test collection S is compared.If there is a V '=V, so, T is redundant for fuzz testing, should get rid of.If there is not V '=V, so, expression test case T belongs to a new safe equivalence class, needs this test case T is added Validity Test collection S.
Repeat above-mentioned the 2nd the step in operation until having filtered all test cases.
Visible by the foregoing description; The present invention is through calculating the security feature of each test case; And according to the security feature of each test case test case is filtered, the test case that security feature is identical only keeps one, thereby has avoided a large amount of close or test cases of equal value are tested; Practice thrift the time of testing, improved the efficient of fuzz testing greatly.
The above is merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.All any modifications of within spirit of the present invention and principle, being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (11)
1. the method for a test case for filtering is characterized in that, comprising:
Confirm the security feature of each test case; Wherein, the security feature of said test case adopts the security feature vector representation, and said security feature vector comprises: length characteristic component and content character component further comprise in the said content character component: time response component and special character component; Confirm the length characteristic component of each test case according to the length of each test case; Confirm the time response component of each test case according to periodicity, repeatability or the statistical property of the content of each test case, the special character that is comprised in the content according to each test case is confirmed the special character component of each test case;
Security feature according to said definite each test case filters test case, and the test case that security feature is identical only keeps one.
2. method according to claim 1 is characterized in that:
Said length according to each test case confirms that the length characteristic component of each test case is: the value of the length characteristic component that the bit number or the byte number of test case are confirmed as said test case.
3. method according to claim 1 is characterized in that:
Periodicity, repeatability or the statistical property of said content according to each test case confirm that the time response component of each test case is: with test case as discrete series; Calculate the frequency characteristic of said discrete series, said frequency characteristic is confirmed as the value of the time response component of said test case; Or the time response that special character repeats to occur in the statistical test use-case, said time response is confirmed as the value of the time response component of said test case.
4. method according to claim 1 is characterized in that:
The special character that is comprised in the said content according to each test case confirms that the special character component of each test case is: the value of the substring of special character that is comprised in the test case and correspondence being confirmed as the special character component of said test case.
5. according to each described method of claim 1 to 4, it is characterized in that judge whether identical mode is for the security feature of two test cases:
The value of length characteristic component equates the security feature vector of judging said two test cases, the value of time response component equates and the value of special character component equates, if judge that then the security feature of said two test cases is identical.
6. the device of a test case for filtering is characterized in that, comprising:
Security feature computing module (210) is used for confirming the security feature of each test case; Wherein, the security feature of said test case adopts the security feature vector representation, and said security feature vector comprises: length characteristic component and content character component further comprise in the said content character component: time response component and special character component; Confirm the length characteristic component of each test case according to the length of each test case; Confirm the time response component of each test case according to periodicity, repeatability or the statistical property of the content of each test case, the special character that is comprised in the content according to each test case is confirmed the special character component of each test case;
Filtering module (220) is used for according to the security feature of determined each test case of security feature computing module (210) test case being filtered, and the test case that security feature is identical only keeps one.
7. device according to claim 6 is characterized in that:
Further comprise in the said security feature computing module (210): length property calculation submodule (211) and content character calculating sub module (212);
Said length property calculation submodule (211) is used for confirming according to the length of each test case the length characteristic component of each test case;
Further comprise in the said content character calculating sub module (212): time response computing unit (213) and special character computing unit (214);
Said time response computing unit (213) is used for confirming according to periodicity, repeatability or the statistical property of the content of each test case the time response component of each test case;
Said special character computing unit (214) is used for confirming according to the special character that content comprised of each test case the special character component of each test case.
8. device according to claim 7 is characterized in that:
Said length property calculation submodule (211), the value of the length characteristic component that is used for the bit number or the byte number of test case are confirmed as said test case.
9. device according to claim 7 is characterized in that:
Said time response computing unit (213) is used for test case calculating the frequency characteristic of said discrete series as discrete series, said frequency characteristic is confirmed as the value of the time response component of said test case; Or be used for the time response that statistical test use-case special character repeats to occur, said time response is confirmed as the value of the time response component of said test case.
10. device according to claim 7 is characterized in that:
Said special character computing unit (214), special character that is used for test case is comprised and corresponding substring are confirmed as the value of the special character component of said test case.
11., it is characterized in that according to each described device of claim 6 to 10:
Said filtering module (220); Be used for test case is compared in twos; When the value of the value of the value of the length characteristic component of the security feature of two test cases vector, time response component and special character component all equates, judge that the security feature of said two test cases is identical.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910143823A CN101901183B (en) | 2009-05-31 | 2009-05-31 | Method and device of test case for filtering |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910143823A CN101901183B (en) | 2009-05-31 | 2009-05-31 | Method and device of test case for filtering |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101901183A CN101901183A (en) | 2010-12-01 |
CN101901183B true CN101901183B (en) | 2012-09-19 |
Family
ID=43226732
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910143823A Active CN101901183B (en) | 2009-05-31 | 2009-05-31 | Method and device of test case for filtering |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101901183B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103136098B (en) * | 2011-11-30 | 2016-03-23 | 西门子公司 | The methods, devices and systems of fuzz testing |
CN103853650B (en) * | 2012-11-28 | 2017-03-01 | 西门子公司 | A kind of method for generating test case of fuzz testing and device |
CN104168161A (en) * | 2014-08-18 | 2014-11-26 | 国家电网公司 | Data construction variation algorithm based on node clone |
US10489557B2 (en) | 2016-08-19 | 2019-11-26 | International Business Machines Corporation | Synthesis of security exploits via self-amplifying deep learning |
CN116541854A (en) * | 2023-07-06 | 2023-08-04 | 北京华云安信息技术有限公司 | Vulnerability testing method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1920791A (en) * | 2005-08-22 | 2007-02-28 | 王彤 | Program testing system |
CN101046763A (en) * | 2006-03-29 | 2007-10-03 | 盛趣信息技术(上海)有限公司 | Implementing method of automatic test system based on scenario |
CN101075208A (en) * | 2007-07-19 | 2007-11-21 | 中兴通讯股份有限公司 | Method for generating examples of white-box path test |
CN101196817A (en) * | 2008-01-04 | 2008-06-11 | 福建星网锐捷网络有限公司 | Test case generating method and system |
CN101833508A (en) * | 2010-05-07 | 2010-09-15 | 北京大学 | JUnit test case simplification method based on execute sequences |
-
2009
- 2009-05-31 CN CN200910143823A patent/CN101901183B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1920791A (en) * | 2005-08-22 | 2007-02-28 | 王彤 | Program testing system |
CN101046763A (en) * | 2006-03-29 | 2007-10-03 | 盛趣信息技术(上海)有限公司 | Implementing method of automatic test system based on scenario |
CN101075208A (en) * | 2007-07-19 | 2007-11-21 | 中兴通讯股份有限公司 | Method for generating examples of white-box path test |
CN101196817A (en) * | 2008-01-04 | 2008-06-11 | 福建星网锐捷网络有限公司 | Test case generating method and system |
CN101833508A (en) * | 2010-05-07 | 2010-09-15 | 北京大学 | JUnit test case simplification method based on execute sequences |
Also Published As
Publication number | Publication date |
---|---|
CN101901183A (en) | 2010-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107368417B (en) | Testing method of vulnerability mining technology testing model | |
CN112866023B (en) | Network detection method, model training method, device, equipment and storage medium | |
CN107659570A (en) | Webshell detection methods and system based on machine learning and static and dynamic analysis | |
US20160004861A1 (en) | System and Method for Detection of Heap Spray Attack | |
Davies et al. | Differential area analysis for ransomware attack detection within mixed file datasets | |
KR100894331B1 (en) | Anomaly Detection System and Method of Web Application Attacks using Web Log Correlation | |
CN101901183B (en) | Method and device of test case for filtering | |
KR20160140316A (en) | Method and system for detecting a malicious code | |
CN101950338A (en) | Bug repair method based on hierarchical bug threat assessment | |
Ebad et al. | Measuring software obfuscation quality–a systematic literature review | |
CN106656924A (en) | Method and device for processing security vulnerabilities of device | |
CN103279710A (en) | Method and system for detecting malicious codes of Internet information system | |
US11423099B2 (en) | Classification apparatus, classification method, and classification program | |
Najari et al. | Malware detection using data mining techniques | |
CN114598504A (en) | Risk assessment method and device, electronic equipment and readable storage medium | |
CN107392027A (en) | A kind of website vulnerability method of testing, test system, electronic equipment and storage medium | |
Li et al. | Systematic testing of the data-poisoning robustness of KNN | |
Qiang | Research on software vulnerability detection method based on improved CNN model | |
Duan et al. | Security Risk Assessment for Trusted Chain Optimizing Based on Grey Fixed Weight Clustering. | |
Shi et al. | A new approach for SQL-injection detection | |
Munson et al. | Watcher: The missing piece of the security puzzle | |
Fathurrahmad et al. | Automatic Scanner Tools Analysis As A Website Penetration Testing: Automatic Scanner Tools Analysis As A Website Penetration Testing | |
CN115809204A (en) | SQL injection detection test method, device and medium for cloud platform WAF | |
CN115643044A (en) | Data processing method, device, server and storage medium | |
Suthaharan et al. | An approach for automatic selection of relevance features in intrusion detection systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |