首页 | 本学科首页   官方微博 | 高级检索  
     

漏洞挖掘技术研究
作者姓名:王希忠  黄俊强
作者单位:黑龙江省电子信息产品监督检验院,黑龙江哈尔滨150090
摘    要:漏洞挖掘是网络攻防技术的重要组成部分。首先介绍了漏洞的概念、漏洞的成因、漏洞的主要分类以及漏洞挖掘一般流程,然后研究了补丁分析和测试技术两种漏洞挖掘方法,重点对二进制补丁比较、白盒测试、黑盒测试等具体漏洞挖掘技术进行了分析,比较了各种漏洞挖掘技术的优缺点。

关 键 词:漏洞  漏洞挖掘  测试技术

Research on the Discovering Vulnerabilities Technology
Authors:Wang Xi-zhong  Huang Jun-qiang
Affiliation:( Heilongjiang Province Electronic & Information Products Supervision Inspection Institute HeilongjiangHarbin 150090)
Abstract:Vulnerabilities mining is an important part of network at ack and defense technology. First, the concept of vulnerabilities, the causes of vulnerabilities, the vulnerabilities of the main classification and general vulnerabilities mining process are introduced;and then the two vulnerabilities mining methods of patch analysis and testing techniques are discussed, and some specific vulnerabilities mining technologies such as the binary patches technology, white box testing technology, and black box testing technology etc. are simultaneously analyzed, with the comparing the advantages and disadvantages of the various vulnerabilities mining technologies.
Keywords:vulnerability  vulnerabilities mining  testing technology
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号