CN112668025A - Vulnerability mining management method, system, equipment and readable storage medium - Google Patents

Vulnerability mining management method, system, equipment and readable storage medium Download PDF

Info

Publication number
CN112668025A
CN112668025A CN202011626928.2A CN202011626928A CN112668025A CN 112668025 A CN112668025 A CN 112668025A CN 202011626928 A CN202011626928 A CN 202011626928A CN 112668025 A CN112668025 A CN 112668025A
Authority
CN
China
Prior art keywords
vulnerability
test object
information
subsystem
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011626928.2A
Other languages
Chinese (zh)
Inventor
蔡晶晶
陈俊
郑斐斐
张雅弛
张雪峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wuyi Jiayu Technology Co ltd
Beijing Yongxin Zhicheng Technology Co Ltd
Original Assignee
Beijing Wuyi Jiayu Technology Co ltd
Beijing Yongxin Zhicheng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wuyi Jiayu Technology Co ltd, Beijing Yongxin Zhicheng Technology Co Ltd filed Critical Beijing Wuyi Jiayu Technology Co ltd
Priority to CN202011626928.2A priority Critical patent/CN112668025A/en
Publication of CN112668025A publication Critical patent/CN112668025A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The embodiment of the application discloses a vulnerability mining management method, a vulnerability mining management system, vulnerability mining management equipment and a readable storage medium, wherein an identity verification subsystem is used for performing identity verification and capability authentication on a test object; the secure channel subsystem establishes a secure path with a system for authorized vulnerability discovery; the real-time monitoring subsystem carries out real-time monitoring on the vulnerability mining operation behavior, the service log and the network flow of the test object; and the vulnerability information security protection subsystem carries out security protection on the vulnerability information submitted by the test object, verifies the validity of the vulnerability information and carries out security delivery. Therefore, illegal or non-compliant system attack behaviors of unknown attackers can be prevented, leakage, diffusion, illegal buying and selling of real loophole information can be prevented, and system network safety is guaranteed.

Description

Vulnerability mining management method, system, equipment and readable storage medium
Technical Field
The embodiment of the application relates to the technical field of information security, in particular to a vulnerability mining management method, a vulnerability mining management system, vulnerability mining management equipment and a readable storage medium.
Background
A vulnerability is a defect in a system or software due to a poor design, thereby allowing an attacker to access or destroy the system without authorization. Vulnerability mining is the exploration of unknown vulnerabilities, and potential vulnerabilities in the system are found as far as possible. The vulnerability mining management aims to standardize vulnerability mining processes and prevent vulnerability information from being leaked, so that the system security is guaranteed.
At present, vulnerability mining management is relatively extensive, and various problems of non-conformity and non-legality exist, such as unauthorized vulnerability mining, vulnerability information arbitrary disclosure or black market transaction, and even some attackers directly utilize the mined vulnerability to carry out system attack.
In order to promote the healthy development of vulnerability mining and guarantee the network security of the system, a vulnerability mining management mechanism which is compliant and safe is urgently needed.
Disclosure of Invention
Therefore, the embodiment of the application provides a vulnerability mining management method, a system, equipment and a readable storage medium, on one hand, mechanisms required by system vulnerability mining can be fully met, the business requirements of vulnerability mining are integrated, legal authorization of vulnerability mining is obtained, white hat hackers with the technical capability of system vulnerability mining can be fully organized, a channel platform which legally exerts the technical capability of the channel platform is provided, and illegal unauthorized vulnerability mining and illegal unauthorized channel vulnerability mining which is not in compliance are prevented; on the other hand, the identity information of the white cap hacker is strictly authenticated, the operation behavior of the hack is monitored in real time, the excavated loophole information is verified in authenticity and protected in confidentiality, the illegal or non-compliant system attack behavior of an unknown attacker is prevented, the leakage diffusion and illegal buying and selling of the real loophole information can be prevented, and the network security of the system is guaranteed.
In order to achieve the above object, the embodiments of the present application provide the following technical solutions:
according to a first aspect of an embodiment of the present application, a vulnerability discovery management method is provided, where the method is applied to a vulnerability discovery management system platform, and the method includes:
the identity recognition subsystem carries out identity verification and capability authentication on the test object;
the secure channel subsystem establishes a secure path with a system for authorized vulnerability discovery;
the real-time monitoring subsystem carries out real-time monitoring on the vulnerability mining operation behavior, the service log and the network flow of the test object;
and the vulnerability information security protection subsystem carries out security protection on the vulnerability information submitted by the test object, verifies the validity of the vulnerability information and carries out security delivery.
Optionally, the security protection subsystem of vulnerability information performs security protection on the vulnerability information submitted by the test object, including:
access control is carried out on vulnerability information viewing through system user roles and permission setting so as to prevent unauthorized access;
and (4) carrying out data encryption on the hole leakage information by using a cryptographic technology so as to prevent the plaintext leakage of the hole leakage information.
Optionally, the real-time monitoring subsystem performs real-time monitoring on the vulnerability discovery operation behavior, the service log and the network traffic of the test object, and further includes:
and monitoring the vulnerability mining operation behavior execution state of the test object in real time, and outputting a test analysis report through monitoring and analyzing the execution state, wherein the test analysis report comprises version information of the configured mining method, the file position and the file name of the test object.
According to a second aspect of the embodiments of the present application, there is provided a vulnerability mining management system, the system including:
the identity recognition subsystem is used for performing identity verification and capability authentication on the test object;
the secure channel subsystem is used for establishing a secure path with a system for authorized vulnerability discovery;
the real-time monitoring subsystem is used for monitoring the vulnerability mining operation behavior, the service log and the network flow of the test object in real time;
and the vulnerability information security protection subsystem is used for carrying out security protection on the vulnerability information submitted by the test object, verifying the validity of the vulnerability information and carrying out security delivery.
Optionally, the vulnerability information security protection subsystem is specifically configured to:
access control is carried out on vulnerability information viewing through system user roles and permission setting so as to prevent unauthorized access;
and (4) carrying out data encryption on the hole leakage information by using a cryptographic technology so as to prevent the plaintext leakage of the hole leakage information.
Optionally, the real-time monitoring subsystem is specifically configured to:
and monitoring the vulnerability mining operation behavior execution state of the test object in real time, and outputting a test analysis report through monitoring and analyzing the execution state, wherein the test analysis report comprises version information of the configured mining method, the file position and the file name of the test object.
According to a third aspect of embodiments herein, there is provided an apparatus comprising: the device comprises a data acquisition device, a processor and a memory; the data acquisition device is used for acquiring data; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform the method of any of the first aspect.
According to a fourth aspect of embodiments herein, there is provided a computer-readable storage medium having one or more program instructions embodied therein for performing the method of any of the first aspects.
In summary, the embodiment of the present application provides a vulnerability discovery management method, system, device and readable storage medium, which performs identity verification and capability authentication on a test object through an identity recognition subsystem; the secure channel subsystem establishes a secure path with a system for authorized vulnerability discovery; the real-time monitoring subsystem carries out real-time monitoring on the vulnerability mining operation behavior, the service log and the network flow of the test object; and the vulnerability information security protection subsystem carries out security protection on the vulnerability information submitted by the test object, verifies the validity of the vulnerability information and carries out security delivery. Therefore, illegal or non-compliant system attack behaviors of unknown attackers can be prevented, leakage, diffusion, illegal buying and selling of real loophole information can be prevented, and system network safety is guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so that those skilled in the art can understand and read the present invention, and do not limit the conditions for implementing the present invention, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the functions and purposes of the present invention, should still fall within the scope of the present invention.
Fig. 1 is a schematic flowchart of a vulnerability mining management method according to an embodiment of the present disclosure;
fig. 2 is a vulnerability mining management system according to an embodiment of the present disclosure.
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The white cap hacker network parlance refers to a programmer who stands in the hacker's position to attack his system for security hole investigation. They use the traditional destructive attack of hackers (commonly referred to as "black hat hackers") to maintain security.
The technical scheme is a vulnerability mining management scheme based on a system platform, firstly, identity recognition and real-name authentication are carried out on a white cap hacker through the system platform, a safe and controllable data channel is established with an information system of a mined vulnerability, then, real-time monitoring and operation auditing are carried out on vulnerability mining behaviors of the white cap hacker, and confidentiality protection is carried out on mined vulnerability information.
Fig. 1 is a schematic flowchart of a vulnerability mining management method provided in an embodiment of the present application, and as shown in fig. 1, the method includes:
step 101: and the identity identification subsystem carries out identity verification and capability authentication on the test object.
Step 102: the secure channel subsystem establishes a secure path with the system for authorized vulnerability discovery.
Step 103: and the real-time monitoring subsystem carries out real-time monitoring on the vulnerability mining operation behavior, the service log and the network flow of the test object.
Step 104: and the vulnerability information security protection subsystem carries out security protection on the vulnerability information submitted by the test object, verifies the validity of the vulnerability information and carries out security delivery.
In a possible implementation manner, in step 103, the real-time monitoring subsystem performs real-time monitoring on the vulnerability discovery operation behavior, the service log, and the network traffic of the test object, and further includes: and monitoring the vulnerability mining operation behavior execution state of the test object in real time, and outputting a test analysis report through monitoring and analyzing the execution state, wherein the test analysis report comprises version information of the configured mining method, the file position and the file name of the test object.
In a possible implementation manner, in step 104, the security protection subsystem for vulnerability information submitted by the test object performs security protection on the vulnerability information, including: access control is carried out on vulnerability information viewing through system user roles and permission setting so as to prevent unauthorized access; and (4) carrying out data encryption on the hole leakage information by using a cryptographic technology so as to prevent the plaintext leakage of the hole leakage information.
The vulnerability discovery management system platform comprises an identity recognition subsystem, a safe channel subsystem, a real-time monitoring subsystem, a vulnerability information safety protection subsystem and the like. Performing identity verification and capability authentication on the white cap hacker; establishing a secure path with a system authorized for vulnerability discovery; monitoring the operation behavior of hacking vulnerability mining in real time; security protection is carried out on the vulnerability information submitted by the hacker; and verifying the validity of the vulnerability information and carrying out safe delivery. The following is explained in detail from three points:
(1) a centralized service platform: through a centralized business system platform, a plurality of white-hat hackers with authenticated identities and over-hard business capabilities can be integrated, the system loopholes are mined in a compliance mode through a uniform permission path, confidentiality protection is carried out on loophole information in the platform, strict access control measures are carried out, and the problems that in the prior art, the white-hat hackers are dispersed and independent during loophole mining, resultant force cannot be formed, and private illegal mining, inconsistent mining paths, inconsistent loophole information disposal and the like caused by the fact that no compliance platform exists are solved.
(2) And (3) monitoring the test behavior in real time: and recording the operation instruction of the white cap hacker in the vulnerability discovery process in real time, and monitoring the attack behavior in real time through the service log and the network flow of the secure channel.
(3) And (3) vulnerability information confidentiality protection: strict access control is carried out on vulnerability information check through system user roles and permission setting, and unauthorized access is prevented; and the data encryption of the loophole information is realized by utilizing a cryptographic technology, so that the plaintext leakage of the loophole information is prevented.
It can be seen that the vulnerability discovery method and device have the advantages of being clear in identity of vulnerability miners, clear in vulnerability discovery paths, clear in vulnerability discovery process and safe in vulnerability information. On one hand, mechanisms for meeting the needs of system vulnerability excavation can be fully met, the business requirements of vulnerability excavation are integrated, legal authorization of vulnerability excavation is obtained, white cap hackers with the technical capability of system vulnerability excavation can be fully organized, a channel platform for legally exerting the technical capability of the channel platform is provided, and illegal unauthorized vulnerability excavation and illegal unauthorized channel vulnerability excavation are prevented; on the other hand, the identity information of the white cap hacker is strictly authenticated, the operation behavior of the hack is monitored in real time, the excavated loophole information is verified in authenticity and protected in confidentiality, the illegal or non-compliant system attack behavior of an unknown attacker is prevented, the leakage diffusion and illegal buying and selling of the real loophole information can be prevented, and the network security of the system is guaranteed.
In summary, the embodiment of the present application provides a vulnerability discovery management method, which performs identity verification and capability authentication on a test object through an identity recognition subsystem; the secure channel subsystem establishes a secure path with a system for authorized vulnerability discovery; the real-time monitoring subsystem carries out real-time monitoring on the vulnerability mining operation behavior, the service log and the network flow of the test object; and the vulnerability information security protection subsystem carries out security protection on the vulnerability information submitted by the test object, verifies the validity of the vulnerability information and carries out security delivery. Therefore, illegal or non-compliant system attack behaviors of unknown attackers can be prevented, leakage, diffusion, illegal buying and selling of real loophole information can be prevented, and system network safety is guaranteed.
Based on the same technical concept, an embodiment of the present application further provides a vulnerability discovery management system, and fig. 2 shows a vulnerability discovery management system provided by the embodiment of the present application, where the system includes:
and the identity recognition subsystem 201 is used for performing identity verification and capability authentication on the test object.
A secure channel subsystem 202 for establishing a secure path with a system authorizing vulnerability discovery.
And the real-time monitoring subsystem 203 is used for monitoring the vulnerability mining operation behavior, the service log and the network flow of the test object in real time.
And the vulnerability information security protection subsystem 204 is used for performing security protection on the vulnerability information submitted by the test object, verifying the validity of the vulnerability information and performing security delivery.
In a possible implementation manner, the vulnerability information security protection subsystem 204 is specifically configured to: access control is carried out on vulnerability information viewing through system user roles and permission setting so as to prevent unauthorized access; and (4) carrying out data encryption on the hole leakage information by using a cryptographic technology so as to prevent the plaintext leakage of the hole leakage information.
In a possible implementation, the real-time monitoring subsystem 203 is specifically configured to: and monitoring the vulnerability mining operation behavior execution state of the test object in real time, and outputting a test analysis report through monitoring and analyzing the execution state, wherein the test analysis report comprises version information of the configured mining method, the file position and the file name of the test object.
Based on the same technical concept, an embodiment of the present application further provides an apparatus, including: the device comprises a data acquisition device, a processor and a memory; the data acquisition device is used for acquiring data; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform the method.
Based on the same technical concept, the embodiment of the present application also provides a computer-readable storage medium, wherein the computer-readable storage medium contains one or more program instructions, and the one or more program instructions are used for executing the method.
In the present specification, each embodiment of the method is described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. Reference is made to the description of the method embodiments.
It is noted that while the operations of the methods of the present invention are depicted in the drawings in a particular order, this is not a requirement or suggestion that the operations must be performed in this particular order or that all of the illustrated operations must be performed to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
Although the present application provides method steps as in embodiments or flowcharts, additional or fewer steps may be included based on conventional or non-inventive approaches. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an apparatus or client product in practice executes, it may execute sequentially or in parallel (e.g., in a parallel processor or multithreaded processing environment, or even in a distributed data processing environment) according to the embodiments or methods shown in the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded.
The units, devices, modules, etc. set forth in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, in implementing the present application, the functions of each module may be implemented in one or more software and/or hardware, or a module implementing the same function may be implemented by a combination of a plurality of sub-modules or sub-units, and the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, classes, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, or the like, and includes several instructions for enabling a computer device (which may be a personal computer, a mobile terminal, a server, or a network device) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same or similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable electronic devices, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The above-mentioned embodiments are further described in detail for the purpose of illustrating the invention, and it should be understood that the above-mentioned embodiments are only illustrative of the present invention and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

1. A vulnerability discovery management method is applied to a vulnerability discovery management system platform and comprises the following steps:
the identity recognition subsystem carries out identity verification and capability authentication on the test object;
the secure channel subsystem establishes a secure path with a system for authorized vulnerability discovery;
the real-time monitoring subsystem carries out real-time monitoring on the vulnerability mining operation behavior, the service log and the network flow of the test object;
and the vulnerability information security protection subsystem carries out security protection on the vulnerability information submitted by the test object, verifies the validity of the vulnerability information and carries out security delivery.
2. The method of claim 1, wherein the vulnerability information security protection subsystem securely protects vulnerability information submitted by the test object, comprising:
access control is carried out on vulnerability information viewing through system user roles and permission setting so as to prevent unauthorized access;
and (4) carrying out data encryption on the hole leakage information by using a cryptographic technology so as to prevent the plaintext leakage of the hole leakage information.
3. The method of claim 1, wherein the real-time monitoring subsystem monitors vulnerability mining operation behaviors, service logs, and network traffic of the test object in real time, further comprising:
and monitoring the vulnerability mining operation behavior execution state of the test object in real time, and outputting a test analysis report through monitoring and analyzing the execution state, wherein the test analysis report comprises version information of the configured mining method, the file position and the file name of the test object.
4. A vulnerability mining management system, the system comprising:
the identity recognition subsystem is used for performing identity verification and capability authentication on the test object;
the secure channel subsystem is used for establishing a secure path with a system for authorized vulnerability discovery;
the real-time monitoring subsystem is used for monitoring the vulnerability mining operation behavior, the service log and the network flow of the test object in real time;
and the vulnerability information security protection subsystem is used for carrying out security protection on the vulnerability information submitted by the test object, verifying the validity of the vulnerability information and carrying out security delivery.
5. The system of claim 4, wherein the vulnerability information security protection subsystem is specifically configured to:
access control is carried out on vulnerability information viewing through system user roles and permission setting so as to prevent unauthorized access;
and (4) carrying out data encryption on the hole leakage information by using a cryptographic technology so as to prevent the plaintext leakage of the hole leakage information.
6. The system of claim 4, wherein the real-time monitoring subsystem is specifically configured to:
and monitoring the vulnerability mining operation behavior execution state of the test object in real time, and outputting a test analysis report through monitoring and analyzing the execution state, wherein the test analysis report comprises version information of the configured mining method, the file position and the file name of the test object.
7. An apparatus, characterized in that the apparatus comprises: the device comprises a data acquisition device, a processor and a memory;
the data acquisition device is used for acquiring data; the memory is to store one or more program instructions; the processor, configured to execute one or more program instructions to perform the method of any of claims 1-3.
8. A computer-readable storage medium having one or more program instructions embodied therein for performing the method of any of claims 1-3.
CN202011626928.2A 2020-12-30 2020-12-30 Vulnerability mining management method, system, equipment and readable storage medium Pending CN112668025A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011626928.2A CN112668025A (en) 2020-12-30 2020-12-30 Vulnerability mining management method, system, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011626928.2A CN112668025A (en) 2020-12-30 2020-12-30 Vulnerability mining management method, system, equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN112668025A true CN112668025A (en) 2021-04-16

Family

ID=75412544

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011626928.2A Pending CN112668025A (en) 2020-12-30 2020-12-30 Vulnerability mining management method, system, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN112668025A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113592034A (en) * 2021-08-23 2021-11-02 广州梦源信息科技有限公司 Content push method and AI (Artificial Intelligence) management and control system based on big data visualization mining processing

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932782A (en) * 2012-10-12 2013-02-13 中国科学院软件研究所 Mobile intelligent terminal leak inquiring and pushing method based on two-dimensional code under cloud environment
US20150242515A1 (en) * 2014-02-25 2015-08-27 Sap Ag Mining Security Vulnerabilities Available from Social Media
CN107368417A (en) * 2017-07-25 2017-11-21 中国人民解放军63928部队 A kind of bug excavation technical testing model and method of testing
CN108040070A (en) * 2017-12-29 2018-05-15 北京奇虎科技有限公司 A kind of network security test platform and method
CN109818903A (en) * 2017-11-21 2019-05-28 中国电信股份有限公司 Data transmission method, system, device and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932782A (en) * 2012-10-12 2013-02-13 中国科学院软件研究所 Mobile intelligent terminal leak inquiring and pushing method based on two-dimensional code under cloud environment
US20150242515A1 (en) * 2014-02-25 2015-08-27 Sap Ag Mining Security Vulnerabilities Available from Social Media
CN107368417A (en) * 2017-07-25 2017-11-21 中国人民解放军63928部队 A kind of bug excavation technical testing model and method of testing
CN109818903A (en) * 2017-11-21 2019-05-28 中国电信股份有限公司 Data transmission method, system, device and computer readable storage medium
CN108040070A (en) * 2017-12-29 2018-05-15 北京奇虎科技有限公司 A kind of network security test platform and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113592034A (en) * 2021-08-23 2021-11-02 广州梦源信息科技有限公司 Content push method and AI (Artificial Intelligence) management and control system based on big data visualization mining processing

Similar Documents

Publication Publication Date Title
Serpanos et al. Security challenges in embedded systems
Borky et al. Protecting information with cybersecurity
EP1280042A2 (en) Privacy of data on a computer platform
CN113014539B (en) Internet of things equipment safety protection system and method
Casati et al. The dangers of rooting: data leakage detection in android applications
CN112668025A (en) Vulnerability mining management method, system, equipment and readable storage medium
Srivastava et al. Security Issues in Cloud Computing
Al-Wosabi et al. Framework for software tampering detection in embedded systems
Yousif et al. Proposed security framework for mobile data management system
Szczepanik et al. Security of mobile banking applications
Mancini Modern mobile platforms from a security perspective
Mahmoodi et al. A secure communication in mobile agent system
Nowfeek et al. A Review of Android operating system security issues
Rouzaud-Cornabas et al. An information flow approach for preventing race conditions: Dynamic protection of the Linux OS
Chalkoo et al. Challenges of data protection and security in cloud computing
Yang Cryptocurrency Security Study based on Static Taint Analysis
EP4332802A1 (en) Pki smart-card threat detection and endpoint use visibility
Skoularidou et al. Security architectures for network clients
US20220327205A1 (en) Method of blocking access of threatening user and program security application method
Khavya et al. Forensic analysis and security assessment in Android m-Banking applications: A survey
De General and Specific Security Services, Risks, and Their Modeling
Maidl et al. Threat Modeling for Cyber-Physical Systems: A Two-dimensional Taxonomy Approach for Structuring Attack Actions.
Feng et al. Security audit in mobile apps security design
CN115329315A (en) Service authentication method, device, storage medium and electronic equipment
Shin et al. Threat and Security Modeling for Secure Software Requirements and Architecture.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Cai Jingjing

Inventor after: Chen Jun

Inventor after: Zheng Feifei

Inventor after: Zhang Xuefeng

Inventor before: Cai Jingjing

Inventor before: Chen Jun

Inventor before: Zheng Feifei

Inventor before: Zhang Yachi

Inventor before: Zhang Xuefeng

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210416