CN112257077A - Automatic vulnerability mining method based on deep learning - Google Patents

Automatic vulnerability mining method based on deep learning Download PDF

Info

Publication number
CN112257077A
CN112257077A CN202011256543.1A CN202011256543A CN112257077A CN 112257077 A CN112257077 A CN 112257077A CN 202011256543 A CN202011256543 A CN 202011256543A CN 112257077 A CN112257077 A CN 112257077A
Authority
CN
China
Prior art keywords
vulnerability
deep learning
application program
analysis
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011256543.1A
Other languages
Chinese (zh)
Inventor
陈鹭菲
石小川
肖清林
张晶
陈瑜靓
赵昆杨
黄靓
王榕腾
杜鑫
杨国林
杨昆强
刘健养
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Useear Information Technology Co ltd
Original Assignee
Fujian Qidian Space Time Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Qidian Space Time Digital Technology Co ltd filed Critical Fujian Qidian Space Time Digital Technology Co ltd
Priority to CN202011256543.1A priority Critical patent/CN112257077A/en
Publication of CN112257077A publication Critical patent/CN112257077A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3676Test management for coverage analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

An automatic vulnerability mining method based on deep learning, S1, generating a vulnerability database; s2, generating a deep learning model; s3, determining an object to be detected included in the application program, and setting test parameters by taking the object to be detected as a target to obtain a test object; s4, sending a test request aiming at the test object to the application program, and testing according to the response result; s5, determining the type of the source code data; s6, performing static analysis and learning on the static characteristics of the code; s7, correcting the analysis result of the static analysis through the dynamic analysis; s8, carrying out vulnerability mining; s9, judging whether a leak exists according to the mining result; and S10, completing the deep learning model. The method automatically excavates the bugs in the software and the application program based on deep learning, has high excavation efficiency and good excavation effect, solves the problems of high missing report rate of static analysis and low code coverage rate of dynamic analysis, obviously improves the performance in the aspect of bug excavation and has excellent use effect.

Description

Automatic vulnerability mining method based on deep learning
Technical Field
The invention relates to the technical field of vulnerability mining, in particular to an automatic vulnerability mining method based on deep learning.
Background
With the rapid development of social information technology, various application software in the market comes along with the operation, most of the software is put into use without standard examination and strict test, and a great amount of software bugs which can be attacked and utilized exist in the software; at present, the main factor threatening the system security is that unknown vulnerabilities exist in application software, various communication security protocols, an operating system forming an information system and the like. For various reasons, the existence of vulnerabilities cannot be avoided, and if some relatively serious unknown vulnerabilities are discovered by an attacker, the unknown vulnerabilities are likely to be exploited by the attacker, and the attacker can access or destroy the computer system without authorization. The method can effectively reduce the threat of the potential vulnerability to the safety of the information system by discovering and repairing the vulnerability in time before an attacker; the vulnerability mining technology is to explore unknown vulnerabilities, comprehensively apply various technologies and tools, find hidden vulnerabilities in software as much as possible, deeply analyze the details of the discovered vulnerabilities, and lay a cushion for processing measures such as vulnerability utilization and remediation;
with the rise of the artificial intelligence industry, a large amount of vulnerability mining research based on machine learning comes to the fore, a large amount of vulnerability mining methods or tools are also developed, as vulnerability mining is a long-term process, but as the types of equipment, systems, protocols, applications, networks, signals and the like are various, vulnerability mining in the fields becomes a very complicated and difficult problem, even if the vulnerability is mined, continuous and efficient mining and defense ecology are difficult to form, malicious software detection is mainly carried out on the basis of a 'shallow' machine learning algorithm at present, static analysis is still the main means for analyzing software vulnerabilities at present, the mining efficiency is low, the mining effect is poor, the report missing rate of static analysis is high, and the performance of the 'shallow' machine learning algorithm is not good and needs to be improved.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background art, the invention provides an automatic vulnerability mining method based on deep learning, vulnerabilities in software and application programs are automatically mined based on the deep learning, the mining efficiency is high, the mining effect is good, the problems of high missing report rate of static analysis and low code coverage rate of dynamic analysis are solved, the vulnerability mining performance is obviously improved, and the using effect is excellent.
(II) technical scheme
The invention provides an automatic vulnerability mining method based on deep learning, which comprises the following steps:
s1, acquiring vulnerability information, sorting the vulnerability information, and generating a vulnerability database based on the vulnerability information, wherein the vulnerability database comprises a general vulnerability CVE number, a general vulnerability scoring system CVSS score and a vulnerability description field;
s2, introducing a deep learning method, and analyzing the vulnerability database based on the deep learning method to generate a deep learning model;
s3, acquiring application program information, determining an application program to be detected, and then determining an object to be detected included in the application program; setting test parameters by taking an object to be detected as a target to obtain a test object;
s4, sending a test request aiming at the test object to the application program, wherein the test request is used for indicating the application program to run the test object based on the test parameters, obtaining the response result of the application program to the test parameters, and testing according to the response result;
s5, identifying the source code data of the test object through the automatic code mode, determining the source code data type according to the identification result, performing correlation analysis and heuristic search according to the source code data type, and finding out the threat problems of the same source and the same parcel from the vulnerability database;
s6, receiving the test result and the source code analysis information sent by the application program, and performing static analysis and learning on the static characteristics of the code through a machine learning method based on the corresponding result; wherein the static features include lexical, grammatical, control flow and data flow of the code;
s7, correcting the analysis result of the static analysis through the dynamic analysis, and integrating the static characteristics obtained by the code analysis and the dynamic characteristics obtained by the dynamic execution to solve the problems of high missing report rate of the static analysis and low code coverage rate of the dynamic analysis;
s8, sending related information to the deep learning model for recognition, automatically selecting vulnerability characteristics by using the deep learning model, and combining deep learning and grammar semantic characteristics for vulnerability mining;
s9, judging whether a vulnerability exists according to the mining result, and if the vulnerability exists, determining the vulnerability included in the vulnerability mining result as the vulnerability of the application program;
and S10, the vulnerability database stores the identified vulnerabilities in a classified manner, and the vulnerability database is continuously analyzed based on a deep learning method so as to continuously improve a deep learning model.
Preferably, in S1, the vulnerability information is derived from the national vulnerability database, i.e., the vulnerability database itself is constructed by using the national vulnerability database NVD as a data source.
Preferably, in S1, the vulnerability database further includes the ease of acquisition, confidentiality impact, whether authentication is required, integrity impact, prerequisite privilege set, availability impact, result privilege set, and whether a network is required.
Preferably, in S1, the vulnerability description field refers to a natural language for describing vulnerability characteristics.
Preferably, in S2, the method further includes constructing an adaptive vulnerability mining operating environment based on the existing static and dynamic vulnerability mining methods.
Preferably, in S3, the process of determining the object to be detected included in the application program is specifically as follows:
acquiring a target URL of an application program to be detected and crawling the target URL to obtain a crawling response result; and acquiring the object to be detected included in the application program based on the target URL and the crawling response result.
Preferably, in S4, the test procedure is as follows:
establishing a configuration file for the application program, wherein the configuration file comprises a taint analysis strategy; starting the application program through a dynamic binary instrumentation frame Pin, and initializing a dynamic instrumentation analysis tool; and analyzing the conditional branch instruction of the application program through a dynamic instrumentation analysis tool, generating a control flow graph and control dependence information data, and finishing the marking and the propagation of the taint information flow.
Preferably, in S5, the association analysis and heuristic search includes verifying the threat problem from multiple dimensions of the authoring style, the framework structure, the module resources, and the homologous code.
Preferably, in S8, the method further includes the steps of:
and comparing the vulnerability response characteristics and the normal response characteristics in the deep learning model with the response characteristics corresponding to the related information to obtain a vulnerability identification result.
Preferably, an integrated test platform is designed based on the deep learning model, and the integrated test platform is used for verifying the feasibility and the effectiveness of the deep learning model.
The technical scheme of the invention has the following beneficial technical effects:
firstly, acquiring vulnerability information, arranging the vulnerability information, and generating a vulnerability database based on the vulnerability information; then, a deep learning method is introduced to generate a deep learning model; then acquiring application program information, determining an application program to be detected, and setting test parameters by taking an object to be detected as a target to obtain a test object; then sending a test request aiming at the test object to the application program to obtain a response result of the application program to the test parameters, and testing according to the response result; then determining the data type of the source code, performing correlation analysis and heuristic search according to the data type of the source code, and finding out the threat problems of the homologous and homologous files from the vulnerability database; then receiving a test result and source code analysis information sent by an application program, and performing static analysis and learning on the static characteristics of the codes through a machine learning method based on the corresponding result; then, the analysis result of the static analysis is corrected through the dynamic analysis, and the static characteristics obtained by the code analysis and the dynamic characteristics obtained by the dynamic execution are synthesized; then, relevant information is sent to a deep learning model for recognition, automatic selection of vulnerability characteristics is carried out by using the deep learning model, and deep learning and grammatical semantic characteristics are combined for vulnerability mining; judging whether a vulnerability exists according to the mining result; the vulnerability database stores the identified vulnerabilities in a classified manner, and the vulnerability database is continuously analyzed based on a deep learning method so as to continuously perfect a deep learning model;
the method automatically excavates the bugs in the software and the application program based on deep learning, has high excavation efficiency and good excavation effect, solves the problems of high missing report rate of static analysis and low code coverage rate of dynamic analysis, obviously improves the performance in the aspect of bug excavation and has excellent use effect.
Drawings
Fig. 1 is a flowchart of an automated vulnerability mining method based on deep learning according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1, the automatic vulnerability mining method based on deep learning provided by the present invention includes the following steps:
s1, acquiring vulnerability information, sorting the vulnerability information, and generating a vulnerability database based on the vulnerability information, wherein the vulnerability database comprises a general vulnerability CVE number, a general vulnerability scoring system CVSS score and a vulnerability description field;
s2, introducing a deep learning method, and analyzing the vulnerability database based on the deep learning method to generate a deep learning model;
s3, acquiring application program information, determining an application program to be detected, and then determining an object to be detected included in the application program; setting test parameters by taking an object to be detected as a target to obtain a test object;
s4, sending a test request aiming at the test object to the application program, wherein the test request is used for indicating the application program to run the test object based on the test parameters, obtaining the response result of the application program to the test parameters, and testing according to the response result;
s5, identifying the source code data of the test object through the automatic code mode, determining the source code data type according to the identification result, performing correlation analysis and heuristic search according to the source code data type, and finding out the threat problems of the same source and the same parcel from the vulnerability database;
s6, receiving the test result and the source code analysis information sent by the application program, and performing static analysis and learning on the static characteristics of the code through a machine learning method based on the corresponding result; wherein the static features include lexical, grammatical, control flow and data flow of the code;
s7, correcting the analysis result of the static analysis through the dynamic analysis, and integrating the static characteristics obtained by the code analysis and the dynamic characteristics obtained by the dynamic execution to solve the problems of high missing report rate of the static analysis and low code coverage rate of the dynamic analysis;
s8, sending related information to the deep learning model for recognition, automatically selecting vulnerability characteristics by using the deep learning model, and combining deep learning and grammar semantic characteristics for vulnerability mining;
s9, judging whether a vulnerability exists according to the mining result, and if the vulnerability exists, determining the vulnerability included in the vulnerability mining result as the vulnerability of the application program;
and S10, the vulnerability database stores the identified vulnerabilities in a classified manner, and the vulnerability database is continuously analyzed based on a deep learning method so as to continuously improve a deep learning model.
In an alternative embodiment, in S1, the vulnerability information is derived from the national vulnerability database, that is, the vulnerability database itself is constructed by using the national vulnerability database NVD as a data source; the vulnerability database also comprises the acquisition easiness, confidentiality influence, whether authentication is needed or not, integrity influence, a precondition privilege set, availability influence, a result privilege set and whether a network is needed or not; the vulnerability description field refers to a natural language for describing vulnerability characteristics.
In an optional embodiment, in S2, the method further includes constructing an adaptive vulnerability mining operation environment based on existing static and dynamic vulnerability mining methods.
In an alternative embodiment, in S3, the process of determining the object to be detected included in the application program is specifically as follows: acquiring a target URL of an application program to be detected and crawling the target URL to obtain a crawling response result; and acquiring the object to be detected included in the application program based on the target URL and the crawling response result.
In an alternative embodiment, in S4, the test procedure is as follows: establishing a configuration file for the application program, wherein the configuration file comprises a taint analysis strategy; starting the application program through a dynamic binary instrumentation frame Pin, and initializing a dynamic instrumentation analysis tool; and analyzing the conditional branch instruction of the application program through a dynamic instrumentation analysis tool, generating a control flow graph and control dependence information data, and finishing the marking and the propagation of the taint information flow.
In an alternative embodiment, in S5, the association analysis and heuristic search includes verifying threat issues from multiple dimensions of the authoring style, the framework structure, the module resources, and the homologous code.
In an optional embodiment, in S8, the method further includes the following steps: and comparing the vulnerability response characteristics and the normal response characteristics in the deep learning model with the response characteristics corresponding to the related information to obtain a vulnerability identification result.
In an alternative embodiment, it is also desirable to design an integrated test platform based on the deep learning model, and the integrated test platform is used to verify the feasibility and effectiveness of the deep learning model.
When the method is used, firstly, vulnerability information is obtained and is sorted, and a vulnerability database is generated based on the vulnerability information; then, introducing a deep learning method, and analyzing the vulnerability database based on the deep learning method to generate a deep learning model; then acquiring application program information and defining an application program to be detected, and then determining an object to be detected included in the application program; setting test parameters by taking an object to be detected as a target to obtain a test object; then sending a test request aiming at the test object to the application program, wherein the test request is used for indicating the application program to operate the test object based on the test parameters, obtaining the response result of the application program to the test parameters, and testing according to the response result; then, identifying source code data of the test object through an automatic code mode, determining the type of the source code data according to an identification result, performing correlation analysis and heuristic search according to the type of the source code data, and finding out the threat problems of the same source and the same parcel from a vulnerability database; then receiving a test result and source code analysis information sent by an application program, and performing static analysis and learning on the static characteristics of the codes through a machine learning method based on the corresponding result; wherein the static features include lexical, grammatical, control flow and data flow of the code; then, the analysis result of the static analysis is corrected through the dynamic analysis, and the static characteristics obtained by the code analysis and the dynamic characteristics obtained by the dynamic execution are integrated to solve the problems of high missing report rate of the static analysis and low code coverage rate of the dynamic analysis; then, relevant information is sent to a deep learning model for recognition, automatic selection of vulnerability characteristics is carried out by using the deep learning model, and deep learning and grammatical semantic characteristics are combined for vulnerability mining; judging whether a vulnerability exists according to the mining result, and if the vulnerability mining result is that the vulnerability exists, determining the vulnerability included in the vulnerability mining result as the vulnerability of the application program; the vulnerability database stores the identified vulnerabilities in a classified manner, and the vulnerability database is continuously analyzed based on a deep learning method so as to continuously perfect a deep learning model;
the method automatically excavates the bugs in the software and the application program based on deep learning, has high excavation efficiency and good excavation effect, solves the problems of high missing report rate of static analysis and low code coverage rate of dynamic analysis, obviously improves the performance in the aspect of bug excavation and has excellent use effect.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (10)

1. An automatic vulnerability mining method based on deep learning is characterized by comprising the following steps:
s1, acquiring vulnerability information, sorting the vulnerability information, and generating a vulnerability database based on the vulnerability information, wherein the vulnerability database comprises a general vulnerability CVE number, a general vulnerability scoring system CVSS score and a vulnerability description field;
s2, introducing a deep learning method, and analyzing the vulnerability database based on the deep learning method to generate a deep learning model;
s3, acquiring application program information, determining an application program to be detected, and then determining an object to be detected included in the application program; setting test parameters by taking an object to be detected as a target to obtain a test object;
s4, sending a test request aiming at the test object to the application program, wherein the test request is used for indicating the application program to run the test object based on the test parameters, obtaining the response result of the application program to the test parameters, and testing according to the response result;
s5, identifying the source code data of the test object through the automatic code mode, determining the source code data type according to the identification result, performing correlation analysis and heuristic search according to the source code data type, and finding out the threat problems of the same source and the same parcel from the vulnerability database;
s6, receiving the test result and the source code analysis information sent by the application program, and performing static analysis and learning on the static characteristics of the code through a machine learning method based on the corresponding result; wherein the static features include lexical, grammatical, control flow and data flow of the code;
s7, correcting the analysis result of the static analysis through the dynamic analysis, and integrating the static characteristics obtained by the code analysis and the dynamic characteristics obtained by the dynamic execution to solve the problems of high missing report rate of the static analysis and low code coverage rate of the dynamic analysis;
s8, sending related information to the deep learning model for recognition, automatically selecting vulnerability characteristics by using the deep learning model, and combining deep learning and grammar semantic characteristics for vulnerability mining;
s9, judging whether a vulnerability exists according to the mining result, and if the vulnerability exists, determining the vulnerability included in the vulnerability mining result as the vulnerability of the application program;
and S10, the vulnerability database stores the identified vulnerabilities in a classified manner, and the vulnerability database is continuously analyzed based on a deep learning method so as to continuously improve a deep learning model.
2. The method for automated vulnerability discovery based on deep learning of claim 1, wherein in S1, vulnerability information is derived from National Vulnerability Database (NVD), i.e. its own vulnerability database is constructed by using NVD as a data source.
3. The automated vulnerability mining method based on deep learning of claim 1, wherein in S1, the vulnerability database further comprises the obtaining ease, confidentiality influence, whether authentication is required, integrity influence, precondition privilege set, availability influence, result privilege set, whether network is required.
4. The automatic vulnerability mining method based on deep learning of claim 1, wherein in S1, the vulnerability description field refers to natural language for describing vulnerability characteristics.
5. The automated vulnerability mining method based on deep learning of claim 1, wherein in S2, further comprising constructing an adaptive vulnerability mining operation environment based on existing static and dynamic vulnerability mining methods.
6. The method for automatic vulnerability discovery based on deep learning of claim 1, wherein in S3, the process of determining the object to be detected included in the application program is specifically as follows:
acquiring a target URL of an application program to be detected and crawling the target URL to obtain a crawling response result; and acquiring the object to be detected included in the application program based on the target URL and the crawling response result.
7. The automatic vulnerability mining method based on deep learning of claim 1, wherein in S4, the testing process is specifically as follows:
establishing a configuration file for the application program, wherein the configuration file comprises a taint analysis strategy; starting the application program through a dynamic binary instrumentation frame Pin, and initializing a dynamic instrumentation analysis tool; and analyzing the conditional branch instruction of the application program through a dynamic instrumentation analysis tool, generating a control flow graph and control dependence information data, and finishing the marking and the propagation of the taint information flow.
8. The automated vulnerability mining method based on deep learning of claim 1, wherein in S5, the association analysis and heuristic search comprises multiple dimension verification threat problem from writing style, framework structure, module resource and homologous code.
9. The automatic vulnerability mining method based on deep learning of claim 1, wherein in S8, further comprising the following steps:
and comparing the vulnerability response characteristics and the normal response characteristics in the deep learning model with the response characteristics corresponding to the related information to obtain a vulnerability identification result.
10. The automatic vulnerability mining method based on deep learning of claim 1, characterized in that an integrated test platform is further required to be designed based on the deep learning model, and the integrated test platform is used for verifying feasibility and effectiveness of the deep learning model.
CN202011256543.1A 2020-11-11 2020-11-11 Automatic vulnerability mining method based on deep learning Pending CN112257077A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011256543.1A CN112257077A (en) 2020-11-11 2020-11-11 Automatic vulnerability mining method based on deep learning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011256543.1A CN112257077A (en) 2020-11-11 2020-11-11 Automatic vulnerability mining method based on deep learning

Publications (1)

Publication Number Publication Date
CN112257077A true CN112257077A (en) 2021-01-22

Family

ID=74265422

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011256543.1A Pending CN112257077A (en) 2020-11-11 2020-11-11 Automatic vulnerability mining method based on deep learning

Country Status (1)

Country Link
CN (1) CN112257077A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996715A (en) * 2022-06-14 2022-09-02 上海久之润信息技术有限公司 Game vulnerability intelligent repairing method based on deep learning
CN115664787A (en) * 2022-10-24 2023-01-31 惠州市德赛西威智能交通技术研究院有限公司 Automobile network vulnerability protection method, system, terminal equipment and medium
CN118445809A (en) * 2024-05-06 2024-08-06 广州锦高信息科技有限公司 System vulnerability restoration method and system based on big data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106897625A (en) * 2017-01-22 2017-06-27 北京理工大学 The leak automatic classification method for supporting vulnerability correlation to excavate
CN107368417A (en) * 2017-07-25 2017-11-21 中国人民解放军63928部队 A kind of bug excavation technical testing model and method of testing
CN109002721A (en) * 2018-07-12 2018-12-14 南方电网科学研究院有限责任公司 Mining analysis method for information security vulnerability
CN110110525A (en) * 2019-04-26 2019-08-09 北京中润国盛科技有限公司 A kind of bug excavation method based on machine learning and deep learning
CN110874475A (en) * 2018-08-30 2020-03-10 重庆小雨点小额贷款有限公司 Vulnerability mining method, vulnerability mining platform and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106897625A (en) * 2017-01-22 2017-06-27 北京理工大学 The leak automatic classification method for supporting vulnerability correlation to excavate
CN107368417A (en) * 2017-07-25 2017-11-21 中国人民解放军63928部队 A kind of bug excavation technical testing model and method of testing
CN109002721A (en) * 2018-07-12 2018-12-14 南方电网科学研究院有限责任公司 Mining analysis method for information security vulnerability
CN110874475A (en) * 2018-08-30 2020-03-10 重庆小雨点小额贷款有限公司 Vulnerability mining method, vulnerability mining platform and computer readable storage medium
CN110110525A (en) * 2019-04-26 2019-08-09 北京中润国盛科技有限公司 A kind of bug excavation method based on machine learning and deep learning

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
孙鸿宇等: "人工智能技术在安全漏洞领域的应用", 《通信学报》 *
李韵等: "基于机器学习的软件漏洞挖掘方法综述", 《软件学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996715A (en) * 2022-06-14 2022-09-02 上海久之润信息技术有限公司 Game vulnerability intelligent repairing method based on deep learning
CN115664787A (en) * 2022-10-24 2023-01-31 惠州市德赛西威智能交通技术研究院有限公司 Automobile network vulnerability protection method, system, terminal equipment and medium
CN118445809A (en) * 2024-05-06 2024-08-06 广州锦高信息科技有限公司 System vulnerability restoration method and system based on big data

Similar Documents

Publication Publication Date Title
CN112134761B (en) Electric power Internet of things terminal vulnerability detection method and system based on firmware analysis
CN112257077A (en) Automatic vulnerability mining method based on deep learning
CN110443045B (en) Fuzzy test case generation method based on machine learning method
US10558805B2 (en) Method for detecting malware within a linux platform
CN101359352B (en) API use action discovering and malice deciding method after confusion of multi-tier synergism
CN114077741B (en) Software supply chain safety detection method and device, electronic equipment and storage medium
Savenko et al. Metamorphic Viruses' Detection Technique Based on the Equivalent Functional Block Search.
KR101640479B1 (en) Software vulnerability attack behavior analysis system based on the source code
CN103390130A (en) Rogue program searching and killing method and device based on cloud security as well as server
JP2014507718A (en) Method, computer program, and system for determining vulnerability of a computer software application to an elevation of privilege attack
US20210334371A1 (en) Malicious File Detection Technology Based on Random Forest Algorithm
CN113297580B (en) Code semantic analysis-based electric power information system safety protection method and device
CN112506564B (en) Method, system and medium for establishing control flow graph
CN115270131A (en) Java anti-serialization vulnerability detection method and system
CN111177731A (en) Software source code vulnerability detection method based on artificial neural network
Partenza et al. Automatic identification of vulnerable code: Investigations with an ast-based neural network
CN113468524A (en) RASP-based machine learning model security detection method
Sadeghi et al. Mining the categorized software repositories to improve the analysis of security vulnerabilities
He et al. Firmware vulnerabilities homology detection based on clonal selection algorithm for IoT devices
Kim et al. Runtime detection framework for android malware
Feichtner et al. Obfuscation-resilient code recognition in Android apps
CN111309589A (en) Code security scanning system and method based on code dynamic analysis
Ladisa et al. On the feasibility of cross-language detection of malicious packages in npm and pypi
Mohamed et al. Malware detection techniques
Ravula et al. Learning attack features from static and dynamic analysis of malware

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220915

Address after: 361000 units 1702 and 1703, No. 59, Chengyi North Street, phase III, software park, Xiamen, Fujian

Applicant after: XIAMEN USEEAR INFORMATION TECHNOLOGY Co.,Ltd.

Address before: Unit 1701, 59 Chengyi North Street, phase III, software park, Xiamen City, Fujian Province, 361000

Applicant before: FUJIAN QIDIAN SPACE-TIME DIGITAL TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20210122

RJ01 Rejection of invention patent application after publication