首页>
外国专利>
CYBERSECURITY BY I/O INFERRED FROM EXECUTION TRACES
CYBERSECURITY BY I/O INFERRED FROM EXECUTION TRACES
展开▼
机译:从执行跟踪推断出的I / O网络安全
展开▼
页面导航
摘要
著录项
相似文献
摘要
A method can include for vulnerability analysis based on input or output points inferred from execution traces can include monitoring application access operations to a memory, monitoring responses from the memory to the access operations, generating execution traces based on the monitored access operations and responses, the execution traces including data identifying an instruction to be performed and a corresponding memory location to access in performing the operation, identifying and recording whether the instruction corresponds to an input or an output to the system based on the generated execution traces, and determining vulnerabilities of the application based on the generated execution traces and identification of the instruction corresponding to the input or output.
展开▼