CN109766697A - Vulnerability scanning method, storage medium, equipment and system applied to linux system - Google Patents

Vulnerability scanning method, storage medium, equipment and system applied to linux system Download PDF

Info

Publication number
CN109766697A
CN109766697A CN201811641037.7A CN201811641037A CN109766697A CN 109766697 A CN109766697 A CN 109766697A CN 201811641037 A CN201811641037 A CN 201811641037A CN 109766697 A CN109766697 A CN 109766697A
Authority
CN
China
Prior art keywords
vulnerability
unit
plug
stored
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811641037.7A
Other languages
Chinese (zh)
Inventor
郭健
曾军
张玉泉
魏明
徐萍
万晖
范添庆
石才
高鹏
汪忠武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Fiberhome Technical Services Co Ltd
Original Assignee
Wuhan Fiberhome Technical Services Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Fiberhome Technical Services Co Ltd filed Critical Wuhan Fiberhome Technical Services Co Ltd
Priority to CN201811641037.7A priority Critical patent/CN109766697A/en
Publication of CN109766697A publication Critical patent/CN109766697A/en
Withdrawn legal-status Critical Current

Links

Abstract

The invention discloses a kind of vulnerability scanning method, storage medium, equipment and systems applied to linux system, are related to field of information security technology, comprising steps of the plug-in unit for being used to search system vulnerability used in default poc testing;According to the variety classes of system vulnerability, classified using server fingerprint pair plug-in unit corresponding with system vulnerability;According to the difference of server fingerprint, corresponding plug-in unit is called to be scanned system, searches system vulnerability, and the system vulnerability found is stored to vulnerability database;Vulnerability scan is extracted, using all software versions of vulnerability scan comparison linux system, finds out leaky software version, system vulnerability is obtained, and obtained system vulnerability is stored to vulnerability database, completes version and compare;System vulnerability is searched using fuzz testing, and the system vulnerability found is stored to vulnerability database, completes fuzz testing;Using all system vulnerabilities in vulnerability database as the loophole of linux system, vulnerability scanning is completed.

Description

Vulnerability scanning method, storage medium, equipment and system applied to linux system
Technical field
The present invention relates to field of information security technology, and in particular to a kind of vulnerability scanning method applied to linux system, Storage medium, equipment and system.
Background technique
Present enterprise software closes the Hole Detection software that rule detection uses and is all from Ji Jia catenet security firm, a side Face, it is plug-in type Black-box Testing (i.e. poc testing) that these network security companies, which predominantly detect means, and the advantages of poc testing is not Based on user platform, already existing plug-in unit can be largely used, the disadvantage is that Hole Detection mode is more single, low efficiency, and Vulnerability database can not timely update.
On the other hand, loophole mode is collected by each network security company and acquisition time is different, single company be difficult with The publication of loophole update must be gone up, and the loophole announced is only the minority of known bugs, single company is difficult to provide in time Response.
Furthermore loophole exposure is very fast, and life cycle is shorter, and exploitation is time-consuming more, elimination is found in interconnection from loophole Net, which may be exactly one, forces the thing updated, and development cost is disproportionate with long-term gain, therefore many loopholes are ignored From vulnerability database may be not present, thus occur most of security products at present known bugs POC (Proof of Concept, Security verification test) library is only thousands of, it is far not enough to find loophole.
Based on existing situation, it is badly in need of developing a vulnerability scanning method for having both efficiency and cost consideration.
Summary of the invention
In view of the deficiencies in the prior art, the purpose of the present invention is to provide a kind of leakages applied to linux system Hole scan method, can quick scanning system loophole, and known system vulnerability and unknown system vulnerability can be scanned simultaneously, Accuracy is more preferable, and security reliability is good.
To achieve the above objectives, the technical solution adopted by the present invention is that:
A kind of vulnerability scanning method applied to linux system, comprising steps of
The plug-in unit for being used to search system vulnerability used in default poc testing;According to the variety classes of system vulnerability, make Classified with server fingerprint pair plug-in unit corresponding with system vulnerability;According to the difference of server fingerprint, corresponding insert is called Part is scanned system, searches system vulnerability, and the system vulnerability found is stored to vulnerability database, completes poc testing;
Vulnerability scan is extracted, using all software versions of vulnerability scan comparison linux system, has found out leakage The software version in hole obtains system vulnerability, and obtained system vulnerability is stored to vulnerability database, completes version and compares;
System vulnerability is searched using fuzz testing, and the system vulnerability found is stored to vulnerability database, completes fuzzy survey Examination;
Using all system vulnerabilities in vulnerability database as the loophole of linux system, vulnerability scanning is completed.
Based on the above technical solution, the type of the system vulnerability includes: Web service, open system service, is It is under unified central planning to set safety, open port, system type, system version, system software release.
Based on the above technical solution, what is used in the default poc testing is used to search inserting for system vulnerability Part specifically includes step:
The compiling form of the plug-in unit used in predefined poc testing;
The information to be checked picked holes in is filled according to predefined compiling form, completes the default of plug-in unit.
Based on the above technical solution, it further comprises the steps of: after finding system vulnerability, records the system vulnerability, and Alarm.
The present invention also provides a kind of storage medium, computer program is stored on the storage medium, it is characterised in that: institute It states when computer program is executed by processor and realizes the above method.
The present invention also provides a kind of electronic equipment, including memory and processor, store on memory in processor The computer program of upper operation, the processor realize the above method when executing the computer program.
The present invention also provides a kind of vulnerability scanning systems applied to linux system, comprising:
Poc testing module comprising default unit, taxon, scanning element,
The default unit is used to preset the plug-in unit for being used to search system vulnerability used in poc testing;
The taxon is used for the variety classes according to system vulnerability, corresponding with system vulnerability using server fingerprint pair Plug-in unit classify;
The scanning element is used for the difference according to server fingerprint, calls corresponding plug-in unit to be scanned system, looks into System vulnerability is looked for, and the system vulnerability found is stored to vulnerability database, completes poc testing;
Version comparison module is used to extract vulnerability scan, uses all of vulnerability scan comparison linux system Software version finds out leaky software version, obtains system vulnerability, and obtained system vulnerability is stored to vulnerability database, Version is completed to compare;
Fuzz testing module is used to be searched system vulnerability using fuzz testing, and the system vulnerability found is stored To vulnerability database, fuzz testing is completed;
Processing module is used to complete loophole using all system vulnerabilities in vulnerability database as the loophole of linux system and sweep It retouches.
Based on the above technical solution, the variety classes of the system vulnerability include: Web service, open system clothes Business, system configuration safety, open port, system type, system version, system software release.
Based on the above technical solution, the plug-in unit that the default unit is also used to use in predefined poc testing Compiling form, fill in the information to be checked picked holes according to predefined compiling form, complete the default of plug-in unit.
Based on the above technical solution, further include alarm module, be used for after finding system vulnerability, record The system vulnerability, and alert.
Compared with the prior art, the advantages of the present invention are as follows:
Vulnerability scanning method applied to linux system of the invention, can quick scanning system loophole, and can sweep simultaneously Known system vulnerability and unknown system vulnerability are described, accuracy is more preferable, and security reliability is good.
Detailed description of the invention
Fig. 1 is a kind of flow chart of the vulnerability scanning method applied to linux system in the embodiment of the present invention.
Specific embodiment
Invention is further described in detail with reference to the accompanying drawings and embodiments.
Shown in Figure 1, the embodiment of the present invention provides a kind of vulnerability scanning method applied to linux system, including step It is rapid:
S1: the plug-in unit for being used to search system vulnerability used in default poc testing;According to the not of the same race of system vulnerability Class is classified using server fingerprint pair plug-in unit corresponding with system vulnerability;According to the difference of server fingerprint, calls and correspond to Plug-in unit system is scanned, search system vulnerability, and the system vulnerability found is stored to vulnerability database, complete POC and survey Examination;
S2: extracting vulnerability scan from linux system official website and CVE, compares Linux using the vulnerability scan All software versions of system, find out leaky software version, obtain system vulnerability, and obtained system vulnerability is stored To vulnerability database, completes version and compare;
S3: system vulnerability is searched using fuzz testing, and the system vulnerability found is stored to vulnerability database, is completed fuzzy Test;
S4: after completing poc testing, version compares and Fuzzing test, all system vulnerabilities in vulnerability database are made For the loophole of linux system, vulnerability scanning is completed.
The variety classes of the system vulnerability include: Web service, open system service, system configuration safety, open end Mouth, system type, system version, system software release etc..For example, Web service is IIS, apache2, tomcat etc., system is opened The service of putting is mysql, sshd etc., open port 22,80,163,445 etc..
The vulnerability scanning method applied to linux system in the embodiment of the present invention, can by poc testing and version comparison With quick scanning system loophole, the system vulnerability that both modes obtain is the known bugs having been known for, and is passed through The system vulnerability that fuzz testing is found is the unknown loophole that do not known by people, and therefore, the embodiment of the present invention is applied to Linux system The vulnerability scanning method of system can scan known system vulnerability and unknown system vulnerability simultaneously, and accuracy is more preferable, safely may be used It is good by property.
Preset described in above-mentioned steps S1 in poc testing using to the plug-in unit for searching system vulnerability specifically include step It is rapid:
The compiling form of the plug-in unit used in predefined poc testing;
The information to be checked picked holes in is filled according to predefined compiling form, completes the default of plug-in unit.
In embodiments of the present invention, the compiling form of the plug-in unit used in predefined poc testing, so that POC plug-in unit lattice Formula solidification, common developer only need that POC plug-in type vulnerability scanning can be realized according to basic format fill message, reduce developer Realization difficulty.Also, POC executes the executive mode called using multi-threaded system, and data can do data dump or not remember Record, all POC plug-in units are uniformly placed on inside a fixed catalog classification, and when use can be directly straight by POC Scheduling Framework Connect calling.
Fuzz testing in above-mentioned steps S3 is denoted as Fuzzing test, is a kind of unexpected by providing to goal systems Input and monitor abnormal results come the method that finds software vulnerability.
Further, the vulnerability scanning method further includes step S5: after finding system vulnerability, recording system leakage Hole, and alert.
The embodiment of the invention also provides a kind of vulnerability scanning systems applied to linux system, comprising:
Poc testing module comprising default unit, taxon, scanning element,
The default unit is used to preset the plug-in unit for being used to search system vulnerability used in poc testing;
The taxon is used for the variety classes according to system vulnerability, corresponding with system vulnerability using server fingerprint pair Plug-in unit classify;
The scanning element is used for the difference according to server fingerprint, calls corresponding plug-in unit to be scanned system, looks into System vulnerability is looked for, and the system vulnerability found is stored to vulnerability database, completes poc testing;
Version comparison module is used to extract vulnerability scan from linux system official website and CVE, uses the leakage Hole database compares all software versions of linux system, finds out leaky software version, obtains system vulnerability, and will Obtained system vulnerability is stored to vulnerability database, is completed version and is compared;
Fuzz testing module is used to be searched system vulnerability using fuzz testing, and the system vulnerability found is stored To vulnerability database, fuzz testing is completed;
Processing module is used to complete loophole using all system vulnerabilities in vulnerability database as the loophole of linux system and sweep It retouches.
The vulnerability scanning system applied to linux system in the embodiment of the present invention, can by poc testing and version comparison With quick scanning system loophole, the system vulnerability that both modes obtain is the known bugs having been known for, and is passed through The system vulnerability that fuzz testing is found is the unknown loophole that do not known by people, and therefore, the embodiment of the present invention is applied to Linux system The vulnerability scanning system of system can scan known system vulnerability and unknown system vulnerability simultaneously, and accuracy is more preferable, safely may be used It is good by property.
Specifically, the variety classes of the system vulnerability include: Web service, open system service, system configuration safety, Open port, system type, system version, system software release.
The compiling form for the plug-in unit that the default unit is also used to use in predefined poc testing, according to predefined Compiling form fills in the information to be checked picked holes in, and completes the default of plug-in unit.
Further, the vulnerability scanning system further includes alarm module, is used for after finding system vulnerability, note The system vulnerability is recorded, and is alerted.
Based on the same inventive concept, this application provides the embodiments of the corresponding storage medium of embodiment of the method, specifically such as Under:
The embodiment of the invention provides a kind of computer readable storage mediums, are stored thereon with computer program, computer All method and steps or Part Methods step when program is executed by processor in implementation method embodiment.
The present invention realizes all or part of the process in above method embodiment, can also be instructed by computer program Relevant hardware is completed, and computer program can be stored in a computer readable storage medium, which is being located It manages when device executes, it can be achieved that the step of above-mentioned each embodiment of the method.Wherein, computer program includes computer program code, Computer program code can be source code form, object identification code form, executable file or certain intermediate forms etc..Computer Readable medium may include: any entity or device, recording medium, USB flash disk, mobile hard that can carry computer program code Disk, magnetic disk, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It needs to illustrate It is that the content that computer-readable medium includes can carry out appropriate according to the requirement made laws in jurisdiction with patent practice Increase and decrease, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include electric carrier signal and Telecommunication signal.
Based on the same inventive concept, this application provides the embodiments of the corresponding electronic equipment of embodiment of the method, specifically such as Under:
The embodiment of the present invention also provides a kind of electronic equipment, including memory and processor, stores and is locating on memory The computer program that runs on reason device, all method and steps when processor executes computer program in implementation method embodiment or Part Methods step.
Alleged processor can be central processing unit (Central Processing Unit, CPU), can also be it His general processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng processor is the control centre of computer installation, utilizes each portion of various interfaces and the entire computer installation of connection Point.
Memory can be used for storing computer program and/or module, and processor is stored in memory by operation or execution Interior computer program and/or module, and the data being stored in memory are called, realize the various function of computer installation Energy.Memory can mainly include storing program area and storage data area, wherein storing program area can storage program area, at least Application program needed for one function (such as sound-playing function, image player function etc.) etc.;Storage data area can store root Created data (such as audio data, video data etc.) etc. are used according to mobile phone.In addition, memory may include high speed with Machine accesses memory, can also include nonvolatile memory, such as hard disk, memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card), at least One disk memory, flush memory device or other volatile solid-state parts.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system, server or calculating Machine program product.Therefore, the present invention can be used complete hardware embodiment, complete software embodiment or combine software and hardware side The form of the embodiment in face.Moreover, it wherein includes computer usable program code that the present invention, which can be used in one or more, The computer program implemented in computer-usable storage medium (including but not limited to magnetic disk storage and optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, equipment (system), server and computer program product Flowchart and/or the block diagram describe.It should be understood that can be realized by computer program instructions in flowchart and/or the block diagram The combination of process and/or box in each flow and/or block and flowchart and/or the block diagram.It can provide these calculating Processing of the machine program instruction to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices Device is to generate a machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute For realizing the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram Device.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
The present invention is not limited to the above-described embodiments, for those skilled in the art, is not departing from Under the premise of the principle of the invention, several improvements and modifications can also be made, these improvements and modifications are also considered as protection of the invention Within the scope of.The content being not described in detail in this specification belongs to the prior art well known to professional and technical personnel in the field.

Claims (10)

1. a kind of vulnerability scanning method applied to linux system, which is characterized in that comprising steps of
The plug-in unit for being used to search system vulnerability used in default poc testing;According to the variety classes of system vulnerability, clothes are used Business device fingerprint pair plug-in unit corresponding with system vulnerability is classified;According to the difference of server fingerprint, corresponding plug-in unit pair is called System is scanned, and is searched system vulnerability, and the system vulnerability found is stored to vulnerability database, is completed poc testing;
Vulnerability scan is extracted, using all software versions of vulnerability scan comparison linux system, is found out leaky Software version obtains system vulnerability, and obtained system vulnerability is stored to vulnerability database, completes version and compares;
System vulnerability is searched using fuzz testing, and the system vulnerability found is stored to vulnerability database, completes fuzz testing;
Using all system vulnerabilities in vulnerability database as the loophole of linux system, vulnerability scanning is completed.
2. vulnerability scanning method as described in claim 1, which is characterized in that the type of the system vulnerability includes: Web clothes Business, open system service, system configuration safety, open port, system type, system version, system software release.
3. vulnerability scanning method as described in claim 1, which is characterized in that is used in the default poc testing is used for The plug-in unit for searching system vulnerability specifically includes step:
The compiling form of the plug-in unit used in predefined poc testing;
The information to be checked picked holes in is filled according to predefined compiling form, completes the default of plug-in unit.
4. vulnerability scanning method as described in claim 1, which is characterized in that further comprise the steps of: after finding system vulnerability, remember The system vulnerability is recorded, and is alerted.
5. a kind of storage medium, computer program is stored on the storage medium, it is characterised in that: the computer program is located It manages when device executes and realizes the described in any item methods of Claims 1-4.
6. a kind of electronic equipment, including memory and processor, the computer journey run on a processor is stored on memory Sequence, it is characterised in that: the processor realizes the described in any item methods of Claims 1-4 when executing the computer program.
7. a kind of vulnerability scanning system applied to linux system characterized by comprising
Poc testing module comprising default unit, taxon, scanning element,
The default unit is used to preset the plug-in unit for being used to search system vulnerability used in poc testing;
The taxon is used for the variety classes according to system vulnerability, inserts using server fingerprint pair is corresponding with system vulnerability Part is classified;
The scanning element is used for the difference according to server fingerprint, and corresponding plug-in unit is called to be scanned system, searches system System loophole, and the system vulnerability found is stored to vulnerability database, complete poc testing;
Version comparison module is used to extract vulnerability scan, uses all softwares of vulnerability scan comparison linux system Version finds out leaky software version, obtains system vulnerability, and obtained system vulnerability is stored to vulnerability database, completes Version compares;
Fuzz testing module is used to search system vulnerability using fuzz testing, and the system vulnerability found is stored to leakage Cave depot completes fuzz testing;
Processing module is used to complete vulnerability scanning using all system vulnerabilities in vulnerability database as the loophole of linux system.
8. vulnerability scanning system as claimed in claim 7, which is characterized in that the variety classes of the system vulnerability include: Web Service, open system service, system configuration safety, open port, system type, system version, system software release.
9. vulnerability scanning system as claimed in claim 7, it is characterised in that: the default unit is also used to predefined POC and surveys The compiling form of the plug-in unit used in examination fills in the information to be checked picked holes according to predefined compiling form, completes plug-in unit It is default.
10. vulnerability scanning system as claimed in claim 7, which is characterized in that further include alarm module, be used to find and be It unites after loophole, records the system vulnerability, and alert.
CN201811641037.7A 2018-12-29 2018-12-29 Vulnerability scanning method, storage medium, equipment and system applied to linux system Withdrawn CN109766697A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811641037.7A CN109766697A (en) 2018-12-29 2018-12-29 Vulnerability scanning method, storage medium, equipment and system applied to linux system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811641037.7A CN109766697A (en) 2018-12-29 2018-12-29 Vulnerability scanning method, storage medium, equipment and system applied to linux system

Publications (1)

Publication Number Publication Date
CN109766697A true CN109766697A (en) 2019-05-17

Family

ID=66453184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811641037.7A Withdrawn CN109766697A (en) 2018-12-29 2018-12-29 Vulnerability scanning method, storage medium, equipment and system applied to linux system

Country Status (1)

Country Link
CN (1) CN109766697A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110334513A (en) * 2019-06-25 2019-10-15 广州嘉为科技有限公司 A kind of restorative procedure based on (SuSE) Linux OS loophole
CN110348218A (en) * 2019-06-06 2019-10-18 国家计算机网络与信息安全管理中心 A kind of loophole test method and device based on vehicle-mounted terminal system
CN110460571A (en) * 2019-07-05 2019-11-15 深圳壹账通智能科技有限公司 Operation system loophole processing method, device, computer equipment and storage medium
CN110708344A (en) * 2019-11-22 2020-01-17 中电科仪器仪表有限公司 Vulnerability detection method and system based on fuzzy technology
CN112668010A (en) * 2020-12-17 2021-04-16 哈尔滨工大天创电子有限公司 Method, system and computing device for scanning industrial control system for bugs
WO2022062924A1 (en) * 2020-09-23 2022-03-31 华为云计算技术有限公司 Vulnerability assessment method and apparatus, computation device and storage medium
CN115225342A (en) * 2022-06-28 2022-10-21 杭州安恒信息技术股份有限公司 Vulnerability scanning method, device, system, electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103065095A (en) * 2013-01-29 2013-04-24 四川大学 WEB vulnerability scanning method and vulnerability scanner based on fingerprint recognition technology
CN106503563A (en) * 2016-10-17 2017-03-15 成都知道创宇信息技术有限公司 Batch leak detection method based on general framework
CN107273751A (en) * 2017-06-21 2017-10-20 北京计算机技术及应用研究所 Security breaches based on multi-mode matching find method online
CN108063759A (en) * 2017-12-05 2018-05-22 西安交大捷普网络科技有限公司 Web vulnerability scanning methods
CN108920963A (en) * 2018-07-23 2018-11-30 国网浙江省电力有限公司电力科学研究院 A kind of industrial control system automation Hole Detection plug-in unit generation method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103065095A (en) * 2013-01-29 2013-04-24 四川大学 WEB vulnerability scanning method and vulnerability scanner based on fingerprint recognition technology
CN106503563A (en) * 2016-10-17 2017-03-15 成都知道创宇信息技术有限公司 Batch leak detection method based on general framework
CN107273751A (en) * 2017-06-21 2017-10-20 北京计算机技术及应用研究所 Security breaches based on multi-mode matching find method online
CN108063759A (en) * 2017-12-05 2018-05-22 西安交大捷普网络科技有限公司 Web vulnerability scanning methods
CN108920963A (en) * 2018-07-23 2018-11-30 国网浙江省电力有限公司电力科学研究院 A kind of industrial control system automation Hole Detection plug-in unit generation method and system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110348218A (en) * 2019-06-06 2019-10-18 国家计算机网络与信息安全管理中心 A kind of loophole test method and device based on vehicle-mounted terminal system
CN110348218B (en) * 2019-06-06 2021-10-01 国家计算机网络与信息安全管理中心 Vulnerability testing method and device based on vehicle-mounted terminal system
CN110334513A (en) * 2019-06-25 2019-10-15 广州嘉为科技有限公司 A kind of restorative procedure based on (SuSE) Linux OS loophole
CN110460571A (en) * 2019-07-05 2019-11-15 深圳壹账通智能科技有限公司 Operation system loophole processing method, device, computer equipment and storage medium
CN110460571B (en) * 2019-07-05 2022-11-04 深圳壹账通智能科技有限公司 Business system vulnerability processing method and device, computer equipment and storage medium
CN110708344A (en) * 2019-11-22 2020-01-17 中电科仪器仪表有限公司 Vulnerability detection method and system based on fuzzy technology
CN110708344B (en) * 2019-11-22 2022-03-04 中电科思仪科技股份有限公司 Vulnerability detection method and system based on fuzzy technology
WO2022062924A1 (en) * 2020-09-23 2022-03-31 华为云计算技术有限公司 Vulnerability assessment method and apparatus, computation device and storage medium
CN112668010A (en) * 2020-12-17 2021-04-16 哈尔滨工大天创电子有限公司 Method, system and computing device for scanning industrial control system for bugs
CN115225342A (en) * 2022-06-28 2022-10-21 杭州安恒信息技术股份有限公司 Vulnerability scanning method, device, system, electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN109766697A (en) Vulnerability scanning method, storage medium, equipment and system applied to linux system
CN106844217B (en) Method and device for embedding point of applied control and readable storage medium
US9600403B1 (en) Method and system for creating functional model of test cases
US9251046B2 (en) Method and system for generating and processing black box test cases
CN105283848B (en) Application tracking is carried out with distributed object
US20210182031A1 (en) Methods and apparatus for automatic detection of software bugs
US11256712B2 (en) Rapid design, development, and reuse of blockchain environment and smart contracts
KR102090423B1 (en) Method of application malware detection based on dynamic api extraction, readable medium and apparatus for performing the method
Shihab An exploration of challenges limiting pragmatic software defect prediction
CN106201886A (en) The Proxy Method of the checking of a kind of real time data task and device
CN111160783B (en) Digital asset value evaluation method and system and electronic equipment
CN105095207A (en) Methods for retrieving and obtaining contents of application software, and devices for retrieving and obtaining contents of application software
Zhang et al. BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation
CN110554962A (en) Regression testing process covering method, server and computer readable storage medium
CN112818357A (en) Automated batch IoT firmware risk assessment method and system
CN110287700A (en) A kind of iOS application safety analytical method and device
CN111222181B (en) AI model supervision method, system, server and storage medium
CN116881979A (en) Method, device and equipment for detecting data safety compliance
CN114328168A (en) Anomaly detection method and device, computer equipment and storage medium
CN110221933A (en) Aacode defect assists restorative procedure and system
CN109101234B (en) Method and device for determining corresponding relation between page and business module
CN114490413A (en) Test data preparation method and device, storage medium and electronic equipment
CN103577758A (en) Program code verification method and device
EP3543882A1 (en) Method and system for identifying original data by using data order
Garg et al. Android malware classification using ensemble classifiers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190517