Software application unauthorized risk detection method, electronic equipment and storage medium
One or more embodiments of the present specification provide a software application unauthorized risk detection method, an electronic device and a storage medium, which can comprehensively and accurately detect logical vulnerabilities of unauthorized behavior classes. The method comprises steps of o...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | One or more embodiments of the present specification provide a software application unauthorized risk detection method, an electronic device and a storage medium, which can comprehensively and accurately detect logical vulnerabilities of unauthorized behavior classes. The method comprises steps of obtaining and analyzing a source code of a to-be-detected software program, determining an authorityverification related code and an action range, and generating an authority range mapping table; according to the authority range mapping table, authority verification logic instrumentation being carried out on the source code, an instrumentation intermediate representation code being generated, and a corresponding information flow graph being determined; and performing unauthorized risk path detection by using the information flow graph, and determining an unauthorized risk path. The electronic device includes a memory, a processor, and a computer program stored on the memory and operable on the processor to implement |
---|