首页> 外国专利> Computer security vulnerability assessment

Computer security vulnerability assessment

机译:计算机安全漏洞评估

摘要

Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.
机译:计算机安全漏洞评估是使用与产品识别数据相对应的产品二进制数据和产品漏洞数据进行。 确定产品二进制数据和产品漏洞数据之间的对应关系,并生成二进制文件数据库。 二进制文件到漏洞数据库用于扫描来自目标设备的二进制数据,以查找与产品二进制数据的匹配项。 基于扫描和漏洞数据之间的扫描和对应关系来确定目标设备的已知安全漏洞。 在一些实施例中,目标设备被断电并用作外部存储设备以从其接收二进制数据。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号