首页> 外国专利> Detection of security vulnerabilities in computer programs

Detection of security vulnerabilities in computer programs

机译:检测计算机程序中的安全漏洞

摘要

Methods and systems for analyzing a computer program use static and interprocedural analysis techniques and engines. A data processing operation, such as a function, is automatically identified within the computer program. It is determined whether the function represents a potential source for entry of untrusted data into the computer program. A course of the untrusted data is modeled through the identified function to produce a validation result, such as a call stack. Based on an attribute of the untrusted data (for example, whether the untrusted data is an unbounded integer or a string), it is determined whether the validation result identifies a security vulnerability of the computer program. A security vulnerability may exist, for example, when the modeled course of an unbounded integer through the function produces a buffer overrun in a call stack. The validation result is provided, via an API, software development tool, or user interface, for example.
机译:用于分析计算机程序的方法和系统使用静态和过程间分析技术和引擎。在计算机程序中会自动识别数据处理操作,例如功能。确定该功能是否代表将不可信数据输入计算机程序的潜在来源。通过所识别的函数对不可信数据的过程进行建模,以产生验证结果,例如调用堆栈。基于不信任数据的属性(例如,不信任数据是无界整数还是字符串),确定验证结果是否标识了计算机程序的安全漏洞。例如,当通过函数的无界整数的建模过程在调用堆栈中产生缓冲区溢出时,可能存在安全漏洞。例如,通过API,软件开发工具或用户界面提供验证结果。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号