CN110275828B - Method for optimizing test data payload by computer software - Google Patents

Method for optimizing test data payload by computer software Download PDF

Info

Publication number
CN110275828B
CN110275828B CN201910490001.1A CN201910490001A CN110275828B CN 110275828 B CN110275828 B CN 110275828B CN 201910490001 A CN201910490001 A CN 201910490001A CN 110275828 B CN110275828 B CN 110275828B
Authority
CN
China
Prior art keywords
computer
copy
software
payload
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910490001.1A
Other languages
Chinese (zh)
Other versions
CN110275828A (en
Inventor
邓志娟
钟少君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Internet Service Co ltd
Jingchuang United Beijing Intellectual Property Service Co ltd
Original Assignee
Jiangxi University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi University of Science and Technology filed Critical Jiangxi University of Science and Technology
Priority to CN201910490001.1A priority Critical patent/CN110275828B/en
Publication of CN110275828A publication Critical patent/CN110275828A/en
Application granted granted Critical
Publication of CN110275828B publication Critical patent/CN110275828B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3692Test management for test results analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a method for optimizing and testing data payload by computer software, and particularly relates to the field of computer software optimization. The invention divides the tested computer software into three copies, and respectively transfers the three copies into three computers with the same specification configuration for hierarchical processing, when the copy software is decoded, the computer can automatically store the generated data, thereby avoiding the phenomenon of data loss in the testing process, increasing the safety of the computer software test, and people can visually see that the difference between the data is detected by different processing, thereby avoiding the occurrence of bugs when the effective load of the test data is optimized by the computer software.

Description

Method for optimizing test data payload by computer software
Technical Field
The invention relates to the field of computer software optimization, in particular to a method for optimizing test data payload by computer software.
Background
Dynamic analysis tools are often used by computer software developers to test computer software applications by, first, exploring the computer software application to discover its interfaces, including those through which data may be provided to the application, then interacting with the interfaces of the application, and monitoring the application's response to such interactions.
Patent application publication No. CN105164691A discloses optimizing the selection of test data payloads for testing computer software applications using a computer network by configuring a first computer to execute a data inspection software copy test computer software application for use by a computer software application at a second computer, processing a first copy of a test data payload using the data inspection software at the first computer, wherein the test data payload is configured to test for an associated security breach, determining that the first copy of the test data payload is approved for further processing by the data inspection software at the first computer, and sending a second copy of the test data payload to the computer software application at the second computer via a computer network for handling a threat.
However, when the method is actually used, for example, when the effective load of the test data is optimized through computer software in the prior art, the method cannot be comprehensively processed, and bugs are easy to appear to influence the optimization effect.
Disclosure of Invention
The invention aims to provide a method for optimizing and testing data payload by computer software, which divides the tested computer software into three copies, decodes the three copies into three payloads, and respectively transfers the payloads into three computers with the same specification configuration for hierarchical processing, when the copies are decoded, the computers can automatically store the generated data, thereby avoiding the phenomenon of data loss in the testing process, increasing the safety of the computer software testing, an application tester and an evaluator can carry out data detection on the using effect of the payloads after hierarchical processing, and people can visually see the difference between the data detected by different processing through comparison, thereby avoiding the occurrence of a leak in the data payload optimized and tested by the computer software, and increasing the comprehensive optimization to solve the problems in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme: a method for optimizing test data payload by computer software comprises a main computer, wherein the output end of the main computer is provided with a first computer, a second computer and a third computer, the output end of the third computer is provided with an application tester, the output end of the application tester is provided with an evaluator, and the method specifically comprises the following steps:
a) Creating a plurality of copies of computer software to be optimized through a host computer, and moving the copies to different computer equipment;
b) Decoding the software copy through computer equipment, and storing the payload data generated by decoding through pluggable storage equipment;
c) Transferring the effective load data analyzed by the computer equipment to a database of effective loads through the pluggable storage equipment for storage;
d) Moving the effective load copies to different computer equipment, carrying out different levels of processing, then using, and detecting the using effect of the computer equipment by using a tester;
e) And transmitting the data used by the computer equipment to be tested to an evaluator, and evaluating the use effect of the software.
In a preferred embodiment, the computer software creates three copies, marked as a first copy, a second copy and a third copy, to be handed over to the first computer, the second computer and the second computer, respectively.
In a preferred embodiment, the first computer, the second computer and the second computer are all configured in the same specification, the first copy of the payload, the second copy of the payload and the third copy of the payload are generated by decoding the first copy, the second copy and the third copy of the payload, and data generated when the data are decoded by the first computer, the second computer and the second computer are automatically stored in the corresponding computers.
In a preferred embodiment, the first copy is approved for further processing by data inspection software in a first computer, and a second copy of the test data payload is sent over a computer network to a computer software application at a second computer for handling the threat.
In a preferred embodiment, the pluggable storage device comprises a storage hard disk, a U disk, an electronic device with a storage function and the like, and the second computer does not perform any processing on the third copy of the payload.
In a preferred embodiment, the first copy is processed by a data checking software of the first computer to test its associated security vulnerabilities.
In a preferred embodiment, the database of payloads is embodied as a web site and the evaluator may provide a description of data inspection software for use by a computer software application to a payload application tester at the computer.
In a preferred embodiment, the output of the application tester is electrically connected to the input of the evaluator.
The invention has the technical effects and advantages that: the computer software to be tested is divided into three copies, three copies of software are decoded into three payloads, the payloads are respectively transferred into three computers with the same specification configuration for hierarchical processing, when the copies of software are decoded, the computers can automatically store generated data, the phenomenon of data loss in the testing process is avoided, the safety of computer software testing is improved, the application tester and the evaluator can carry out data detection on the using effect of the payloads after hierarchical processing, through comparison, people can visually see that the differences among the data are detected through different processing, and therefore the situation that the payloads of the data are optimized and tested through the computer software is prevented from being leaked, and the optimization comprehensiveness is improved.
Drawings
FIG. 1 is a flow chart of the present invention as a whole.
Fig. 2 is an overall system block diagram of the present invention.
The reference signs are: the system comprises a main computer 1, a first computer 2, a second computer 3, a third computer 4, an application tester 5 and an evaluator 6.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
the invention provides a method for optimizing test data payload by computer software, which comprises a main computer 1, wherein the output end of the main computer 1 is provided with a first computer 2, a second computer 3 and a third computer 4, the output end of the third computer 4 is provided with an application tester 5, the output end of the application tester 5 is provided with an evaluator 6, and the specific steps are as follows:
a) Creating a plurality of copies of computer software to be optimized through a host computer 1, moving the computer software into different computer equipment, wherein the number of the created copies of the computer software is three, the created copies are marked as a first copy, a second copy and a third copy, and are respectively handed over into a first computer 2, a second computer 3 and a second computer 4, and the specification configurations of the first computer 2, the second computer 3 and the second computer 4 are the same;
b) Decoding the first copy, the second copy and the third copy of the software through computer equipment, storing the first copy of a payload, the second copy of the payload and the third copy of the payload which are generated by decoding the first copy, the second copy and the third copy of the software through pluggable storage equipment, wherein the pluggable storage equipment comprises a storage hard disk, a U disk, electronic equipment with a storage function and the like, and data generated when the first computer 2, the second computer 3 and the second computer 4 decode can be automatically stored in the corresponding computers;
c) Transferring the effective load data analyzed by the computer equipment to a database of the effective load through the pluggable storage equipment for storage, wherein the database of the effective load is a network website;
d) Respectively transferring the first copy of the payload, the second copy of the payload and the third copy of the payload into a first computer 2, a second computer 3 and a second computer 4, testing the relevant security loopholes of the first copy after the first copy is processed by data inspection software of the first computer 2, processing the security loopholes, using the security loopholes, and detecting the using effect of computer equipment by using a tester 5;
e) Data used by the computer device to which the test is applied is transmitted to an evaluator 6, which evaluates the effect of the use of the software, and the evaluator 6 can provide a description of the data-checking software used by the computer software application to a payload application tester 5 at the computer.
Example 2:
the invention provides a method for optimizing test data payload by computer software, which comprises a main computer 1, wherein the output end of the main computer 1 is provided with a first computer 2, a second computer 3 and a third computer 4, the output end of the third computer 4 is provided with an application tester 5, the output end of the application tester 5 is provided with an evaluator 6, and the specific steps are as follows:
a) Creating a plurality of copies of computer software to be optimized through a host computer 1, moving the computer software into different computer equipment, wherein the number of the created copies of the computer software is three, the created copies are marked as a first copy, a second copy and a third copy, and are respectively handed over into a first computer 2, a second computer 3 and a second computer 4, and the specification configurations of the first computer 2, the second computer 3 and the second computer 4 are the same;
b) Decoding the first copy, the second copy and the third copy of the software through computer equipment, storing the first copy of a payload, the second copy of the payload and the third copy of the payload which are generated by decoding the first copy, the second copy and the third copy of the software through pluggable storage equipment, wherein the pluggable storage equipment comprises a storage hard disk, a U disk, electronic equipment with a storage function and the like, and data generated when the first computer 2, the second computer 3 and the second computer 4 decode can be automatically stored in the corresponding computers;
c) Transferring the effective load data analyzed by the computer equipment to a database of the effective load through the pluggable storage equipment for storage, wherein the database of the effective load is a network website;
d) Respectively transferring the first copy of the payload, the second copy of the payload and the third copy of the payload into a first computer 2, a second computer 3 and a second computer 4, testing the related security loopholes of the second copy after the second copy is processed by data inspection software of the second computer 3, processing the security loopholes, sending the second copy of the payload of test data to a computer software application of the second computer 3 by using a computer network for processing threats, using the second copy of the payload of test data, and detecting the using effect of computer equipment by using an application tester 5;
e) Data used by the computer device to which the test is applied is transmitted to an evaluator 6 for data evaluation of the effect of the use of the software, the evaluator 6 being operable to provide a description of the data inspection software used by the computer software application to a payload application tester 5 at the computer.
Example 3:
the invention provides a method for optimizing test data payload by computer software, which comprises a main computer 1, wherein the output end of the main computer 1 is provided with a first computer 2, a second computer 3 and a third computer 4, the output end of the third computer 4 is provided with an application tester 5, the output end of the application tester 5 is provided with an evaluator 6, and the specific steps are as follows:
a) Creating a plurality of copies of computer software to be optimized through a host computer 1, moving the computer software into different computer equipment, wherein the number of the created copies of the computer software is three, the created copies are marked as a first copy, a second copy and a third copy, and are respectively handed over into a first computer 2, a second computer 3 and a second computer 4, and the specification configurations of the first computer 2, the second computer 3 and the second computer 4 are the same;
b) Decoding the first copy, the second copy and the third copy of the software through computer equipment, storing the first copy of a payload, the second copy of the payload and the third copy of the payload which are generated by decoding the first copy, the second copy and the third copy of the software through pluggable storage equipment, wherein the pluggable storage equipment comprises a storage hard disk, a U disk, electronic equipment with a storage function and the like, and data generated when the first computer 2, the second computer 3 and the second computer 4 decode can be automatically stored in the corresponding computers;
c) Transferring the effective load data analyzed by the computer equipment to a database of the effective load through the pluggable storage equipment for storage, wherein the database of the effective load is a network website;
d) Respectively handing over the first copy of the payload, the second copy of the payload and the third copy of the payload into the first computer 2, the second computer 3 and the second computer 4, wherein the third copy of the payload is not processed by the third computer 4 and is used, and the use effect of the computer equipment is detected by the application tester 5;
e) Data used by the computer device to which the test is applied is transmitted to an evaluator 6, which evaluates the effect of the use of the software, and the evaluator 6 can provide a description of the data-checking software used by the computer software application to a payload application tester 5 at the computer.
Example 4:
respectively taking 30 optimized software of the embodiments 1 to 3, averagely taking out 10 software of each embodiment, respectively dividing 3 optimized software of the embodiments 1 to 3 into 10 hands of users, wherein each user is a test group, and totally dividing the test groups into 10 groups for testing to obtain the following data:
number of test persons Fluency of software use (compare with usual) Power consumption (mA) of software in 1h How fast the software loads the data (compared to usual)
Example 1 10 Is relatively smooth 25 Is quicker
Example 2 10 Is very smooth 20 Quickly get rid of
Example 3 10 Is normal 30 Is normal
As can be seen from the above table, the optimization scheme for software in embodiment 2 is used the most, the fluency of the optimized software is greatly improved, the time for loading data is also shortened, and the power consumption of the software is greatly reduced when the software is used.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, those skilled in the art can still make modifications to the technical solutions described in the foregoing embodiments, or make equivalent substitutions and improvements to part of the technical features of the foregoing embodiments, and any modifications, equivalent substitutions and improvements made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (5)

1. A method for optimizing test data payloads by computer software, comprising: the device comprises a main computer (1), wherein the output end of the main computer (1) is provided with a first computer (2), a second computer (3) and a third computer (4), the output end of the third computer (4) is provided with an application tester (5), the output end of the application tester (5) is provided with an evaluator (6), and the specific steps are as follows:
a) Creating a plurality of copies of computer software needing optimization through a host computer (1), and moving the copies to different computer equipment; the number of the copies created by the computer software is three, the copies are marked as a first copy, a second copy and a third copy, and the copies are respectively handed over to a first computer (2), a second computer (3) and a second computer (4);
b) Decoding the software copy through computer equipment, and storing the payload data generated by decoding through pluggable storage equipment; the first computer (2), the second computer (3) and the second computer (4) have the same specification configuration, a first copy of a payload, a second copy of the payload and a third copy of the payload are generated by decoding the first copy, the second copy and the third copy, and data generated when the first computer (2), the second computer (3) and the second computer (4) decode can be automatically stored in the corresponding computers;
c) Transferring the effective load data analyzed by the computer equipment to a database of effective loads through the pluggable storage equipment for storage;
d) Moving the effective load copies to different computer equipment, carrying out different levels of processing, then using, and detecting the using effect of the computer equipment by using a tester (5); the first copy is further processed by data inspection software in the first computer (2) and a second copy of the test data payload is sent to a computer software application at the second computer (3) using the computer network for handling the threat;
e) And transmitting data used by the computer equipment applying the test to an evaluator (6) to evaluate the use effect of the software.
2. The method of claim 1, wherein the method comprises: the pluggable storage device comprises a storage hard disk, a U disk and an electronic device with a storage function, and the second computer (4) does not process any third copy of the payload.
3. The method of claim 1, wherein the method comprises: and the first copy is processed by data inspection software of the first computer (2) and then relevant security vulnerabilities of the first copy are tested for processing.
4. The method of claim 1, wherein the method comprises: the database of payloads is in particular a web site, and the evaluator (6) provides a description of data inspection software used by the computer software application to a payload application tester (5) at the computer.
5. The method of claim 1, wherein the method comprises: the output end of the application tester (5) is electrically connected with the input end of the evaluator (6).
CN201910490001.1A 2019-06-06 2019-06-06 Method for optimizing test data payload by computer software Active CN110275828B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910490001.1A CN110275828B (en) 2019-06-06 2019-06-06 Method for optimizing test data payload by computer software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910490001.1A CN110275828B (en) 2019-06-06 2019-06-06 Method for optimizing test data payload by computer software

Publications (2)

Publication Number Publication Date
CN110275828A CN110275828A (en) 2019-09-24
CN110275828B true CN110275828B (en) 2022-11-22

Family

ID=67962085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910490001.1A Active CN110275828B (en) 2019-06-06 2019-06-06 Method for optimizing test data payload by computer software

Country Status (1)

Country Link
CN (1) CN110275828B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1345488A (en) * 1999-04-02 2002-04-17 D·S·P·C·技术有限公司 Method and device for managing power consumption of receiver in stand-by mode
CN106716432A (en) * 2014-09-22 2017-05-24 迈克菲股份有限公司 Pre-launch process vulnerability assessment
CN107077851A (en) * 2014-08-27 2017-08-18 弗劳恩霍夫应用研究促进协会 Using for strengthening encoder, decoder and method that hiding parameter is coded and decoded to audio content
CN109155705A (en) * 2016-06-20 2019-01-04 英特尔Ip公司 For being combined and decoded equipment to encoding block

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7313564B2 (en) * 2002-12-03 2007-12-25 Symbioware, Inc. Web-interactive software testing management method and computer system including an integrated test case authoring tool
US9135152B2 (en) * 2013-05-29 2015-09-15 International Business Machines Corporation Optimizing test data payload selection for testing computer software applications via computer networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1345488A (en) * 1999-04-02 2002-04-17 D·S·P·C·技术有限公司 Method and device for managing power consumption of receiver in stand-by mode
CN107077851A (en) * 2014-08-27 2017-08-18 弗劳恩霍夫应用研究促进协会 Using for strengthening encoder, decoder and method that hiding parameter is coded and decoded to audio content
CN106716432A (en) * 2014-09-22 2017-05-24 迈克菲股份有限公司 Pre-launch process vulnerability assessment
CN109155705A (en) * 2016-06-20 2019-01-04 英特尔Ip公司 For being combined and decoded equipment to encoding block

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Low-latency software successive cancellation list polar decoder using stage-located copy;Shen Y 等;《 2016 IEEE International Conference on Digital Signal Processing (DSP)》;20170302;84-88 *
基于软件漏洞的克隆代码稳定性评估;赵玉武 等;《计算机应用研究》;20180529;第35卷(第02期);497-502 *

Also Published As

Publication number Publication date
CN110275828A (en) 2019-09-24

Similar Documents

Publication Publication Date Title
US20230206131A1 (en) Clustering analysis for deduplication of training set samples for machine learning based computer threat analysis
US10474826B2 (en) Methods and apparatuses for improved app security testing
Khalid et al. Examining the relationship between findbugs warnings and app ratings
US9838412B2 (en) Computer software application self-testing
US8910293B2 (en) Determining the vulnerability of computer software applications to privilege-escalation attacks
Ali-Gombe et al. AspectDroid: Android app analysis system
Tanana Behavior-based detection of cryptojacking malware
CN105164691B (en) A kind of method and system for calculation machine software application
CN105793860A (en) Method for anti-debugging
US20120311712A1 (en) Testing web applications for file upload vulnerabilities
CN106355092B (en) System and method for optimizing anti-virus measurement
US9298926B2 (en) Remediation of security vulnerabilities in computer software
CN110287701A (en) A kind of malicious file detection method, device, system and associated component
Choi et al. All‐in‐One Framework for Detection, Unpacking, and Verification for Malware Analysis
US20160378626A1 (en) Efficiency of cycle-reproducible debug processes in a multi-core environment
CN103714293A (en) Correcting workflow security vulnerability via static analysis and virtual patching
US10176186B2 (en) Systems and methods for detecting matching content in code files
CN110275828B (en) Method for optimizing test data payload by computer software
US8949991B2 (en) Testing web services that are accessible via service oriented architecture (SOA) interceptors
Zhou et al. SC-VDM: A lightweight smart contract vulnerability detection model
Vurdelja et al. Detection of linux malware using system tracers–An overview of solutions
US9703676B2 (en) Testing application internal modules with instrumentation
US20200334353A1 (en) Method and system for detecting and classifying malware based on families
EP3679475B1 (en) Identifying functions prone to logic errors in binary software components
US9830253B2 (en) Eliminating redundant interactions when testing computer software applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221230

Address after: Room 02A-084, Building C (Second Floor), No. 28, Xinxi Road, Haidian District, Beijing 100085

Patentee after: Jingchuang United (Beijing) Intellectual Property Service Co.,Ltd.

Address before: 341000 No. 86 Hongqi Avenue, Jiangxi, Ganzhou

Patentee before: Jiangxi University of Science and Technology

Effective date of registration: 20221230

Address after: Room 606-609, Compound Office Complex Building, No. 757, Dongfeng East Road, Yuexiu District, Guangzhou, Guangdong Province, 510699

Patentee after: China Southern Power Grid Internet Service Co.,Ltd.

Address before: Room 02A-084, Building C (Second Floor), No. 28, Xinxi Road, Haidian District, Beijing 100085

Patentee before: Jingchuang United (Beijing) Intellectual Property Service Co.,Ltd.