Dynamic symbol execution path searching method for finding vulnerabilities

The invention provides a dynamic symbol execution path searching method for finding vulnerabilities, relates to the field of software test, and aims at quickly triggering the vulnerabilities and improving the vulnerabilities detection efficiency of large software. The method is characterized in that...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: LI JINSHUAN, NIU WEINA, CHEN RUIDONG, BAI JIN, HUANG JIN, ZHANG XIAOSONG, WANG DONG, XU HAORAN, LAI TE, YU ZHOU
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator LI JINSHUAN
NIU WEINA
CHEN RUIDONG
BAI JIN
HUANG JIN
ZHANG XIAOSONG
WANG DONG
XU HAORAN
LAI TE
YU ZHOU
description The invention provides a dynamic symbol execution path searching method for finding vulnerabilities, relates to the field of software test, and aims at quickly triggering the vulnerabilities and improving the vulnerabilities detection efficiency of large software. The method is characterized in that a path of the vulnerabilities that are triggered during actually executing a program under test is marked while searching a possible execution path of the program under test through a dynamic symbol; as every new use case under test is generated during exploiting the path, the relevancy gamma between the execution path of the use case under test and the previous vulnerabilities-triggered path is calculated, accordingly, the weight fraction score of the execution path corresponding to the use test under test is calculated, and thus the next test can be executed based on the use case with the maximum score value under test.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN104008053A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN104008053A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN104008053A3</originalsourceid><addsrcrecordid>eNrjZPByqcxLzM1MViiuzE3Kz1FIrUhNLi3JzM9TKEgsyVAoTk0sSs7IzEtXyE0tychPUUjLL1JIy8xLAQmVlebkpRYlJmXmZJZkphbzMLCmJeYUp_JCaW4GRTfXEGcP3dSC_PjU4oLE5NS81JJ4Zz9DAxMDAwsDU2NHY2LUAABqXjWk</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Dynamic symbol execution path searching method for finding vulnerabilities</title><source>esp@cenet</source><creator>LI JINSHUAN ; NIU WEINA ; CHEN RUIDONG ; BAI JIN ; HUANG JIN ; ZHANG XIAOSONG ; WANG DONG ; XU HAORAN ; LAI TE ; YU ZHOU</creator><creatorcontrib>LI JINSHUAN ; NIU WEINA ; CHEN RUIDONG ; BAI JIN ; HUANG JIN ; ZHANG XIAOSONG ; WANG DONG ; XU HAORAN ; LAI TE ; YU ZHOU</creatorcontrib><description>The invention provides a dynamic symbol execution path searching method for finding vulnerabilities, relates to the field of software test, and aims at quickly triggering the vulnerabilities and improving the vulnerabilities detection efficiency of large software. The method is characterized in that a path of the vulnerabilities that are triggered during actually executing a program under test is marked while searching a possible execution path of the program under test through a dynamic symbol; as every new use case under test is generated during exploiting the path, the relevancy gamma between the execution path of the use case under test and the previous vulnerabilities-triggered path is calculated, accordingly, the weight fraction score of the execution path corresponding to the use test under test is calculated, and thus the next test can be executed based on the use case with the maximum score value under test.</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2014</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20140827&amp;DB=EPODOC&amp;CC=CN&amp;NR=104008053A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76294</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20140827&amp;DB=EPODOC&amp;CC=CN&amp;NR=104008053A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>LI JINSHUAN</creatorcontrib><creatorcontrib>NIU WEINA</creatorcontrib><creatorcontrib>CHEN RUIDONG</creatorcontrib><creatorcontrib>BAI JIN</creatorcontrib><creatorcontrib>HUANG JIN</creatorcontrib><creatorcontrib>ZHANG XIAOSONG</creatorcontrib><creatorcontrib>WANG DONG</creatorcontrib><creatorcontrib>XU HAORAN</creatorcontrib><creatorcontrib>LAI TE</creatorcontrib><creatorcontrib>YU ZHOU</creatorcontrib><title>Dynamic symbol execution path searching method for finding vulnerabilities</title><description>The invention provides a dynamic symbol execution path searching method for finding vulnerabilities, relates to the field of software test, and aims at quickly triggering the vulnerabilities and improving the vulnerabilities detection efficiency of large software. The method is characterized in that a path of the vulnerabilities that are triggered during actually executing a program under test is marked while searching a possible execution path of the program under test through a dynamic symbol; as every new use case under test is generated during exploiting the path, the relevancy gamma between the execution path of the use case under test and the previous vulnerabilities-triggered path is calculated, accordingly, the weight fraction score of the execution path corresponding to the use test under test is calculated, and thus the next test can be executed based on the use case with the maximum score value under test.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2014</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPByqcxLzM1MViiuzE3Kz1FIrUhNLi3JzM9TKEgsyVAoTk0sSs7IzEtXyE0tychPUUjLL1JIy8xLAQmVlebkpRYlJmXmZJZkphbzMLCmJeYUp_JCaW4GRTfXEGcP3dSC_PjU4oLE5NS81JJ4Zz9DAxMDAwsDU2NHY2LUAABqXjWk</recordid><startdate>20140827</startdate><enddate>20140827</enddate><creator>LI JINSHUAN</creator><creator>NIU WEINA</creator><creator>CHEN RUIDONG</creator><creator>BAI JIN</creator><creator>HUANG JIN</creator><creator>ZHANG XIAOSONG</creator><creator>WANG DONG</creator><creator>XU HAORAN</creator><creator>LAI TE</creator><creator>YU ZHOU</creator><scope>EVB</scope></search><sort><creationdate>20140827</creationdate><title>Dynamic symbol execution path searching method for finding vulnerabilities</title><author>LI JINSHUAN ; NIU WEINA ; CHEN RUIDONG ; BAI JIN ; HUANG JIN ; ZHANG XIAOSONG ; WANG DONG ; XU HAORAN ; LAI TE ; YU ZHOU</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN104008053A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2014</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>LI JINSHUAN</creatorcontrib><creatorcontrib>NIU WEINA</creatorcontrib><creatorcontrib>CHEN RUIDONG</creatorcontrib><creatorcontrib>BAI JIN</creatorcontrib><creatorcontrib>HUANG JIN</creatorcontrib><creatorcontrib>ZHANG XIAOSONG</creatorcontrib><creatorcontrib>WANG DONG</creatorcontrib><creatorcontrib>XU HAORAN</creatorcontrib><creatorcontrib>LAI TE</creatorcontrib><creatorcontrib>YU ZHOU</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LI JINSHUAN</au><au>NIU WEINA</au><au>CHEN RUIDONG</au><au>BAI JIN</au><au>HUANG JIN</au><au>ZHANG XIAOSONG</au><au>WANG DONG</au><au>XU HAORAN</au><au>LAI TE</au><au>YU ZHOU</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Dynamic symbol execution path searching method for finding vulnerabilities</title><date>2014-08-27</date><risdate>2014</risdate><abstract>The invention provides a dynamic symbol execution path searching method for finding vulnerabilities, relates to the field of software test, and aims at quickly triggering the vulnerabilities and improving the vulnerabilities detection efficiency of large software. The method is characterized in that a path of the vulnerabilities that are triggered during actually executing a program under test is marked while searching a possible execution path of the program under test through a dynamic symbol; as every new use case under test is generated during exploiting the path, the relevancy gamma between the execution path of the use case under test and the previous vulnerabilities-triggered path is calculated, accordingly, the weight fraction score of the execution path corresponding to the use test under test is calculated, and thus the next test can be executed based on the use case with the maximum score value under test.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN104008053A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Dynamic symbol execution path searching method for finding vulnerabilities
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T18%3A48%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=LI%20JINSHUAN&rft.date=2014-08-27&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN104008053A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true