首页>
外国专利>
METHOD AND APPARATUS FOR IDENTIFYING SECURITY VULNERABILITY IN BINARY AND LOCATION OF CAUSE OF SECURITY VULNERABILITY
METHOD AND APPARATUS FOR IDENTIFYING SECURITY VULNERABILITY IN BINARY AND LOCATION OF CAUSE OF SECURITY VULNERABILITY
展开▼
机译:识别二进制中的安全漏洞的方法和装置以及引起安全漏洞的原因的位置
展开▼
页面导航
摘要
著录项
相似文献
摘要
Provided are a binary vulnerability analysis method performed by a computing device is provided, and the binary vulnerability analysis method includes a primary execution step of recording a symbolic constraint of a vulnerability associated with an execution flow path causing a crash to a target binary to be analyzed and a suspicious element on the execution flow path by performing taint analysis through a primary execution of the target binary; and a secondary execution step of performing a secondary execution, which is a symbolic execution, on the execution flow path and, if an instruction satisfying the symbolic constraint is found, determining that the vulnerability exists in the target binary by comparing the suspicious element and the found instruction.
展开▼